Sample records for decoy state protocol

  1. Practical decoy state for quantum key distribution

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ma Xiongfeng; Qi Bing; Zhao Yi

    2005-07-15

    Decoy states have recently been proposed as a useful method for substantially improving the performance of quantum key distribution (QKD). Here, we present a general theory of the decoy state protocol based on only two decoy states and one signal state. We perform optimization on the choice of intensities of the two decoy states and the signal state. Our result shows that a decoy state protocol with only two types of decoy states - the vacuum and a weak decoy state - asymptotically approaches the theoretical limit of the most general type of decoy state protocol (with an infinite numbermore » of decoy states). We also present a one-decoy-state protocol. Moreover, we provide estimations on the effects of statistical fluctuations and suggest that, even for long-distance (larger than 100 km) QKD, our two-decoy-state protocol can be implemented with only a few hours of experimental data. In conclusion, decoy state quantum key distribution is highly practical.« less

  2. Finite-key analysis for the 1-decoy state QKD protocol

    NASA Astrophysics Data System (ADS)

    Rusca, Davide; Boaron, Alberto; Grünenfelder, Fadri; Martin, Anthony; Zbinden, Hugo

    2018-04-01

    It has been shown that in the asymptotic case of infinite-key length, the 2-decoy state Quantum Key Distribution (QKD) protocol outperforms the 1-decoy state protocol. Here, we present a finite-key analysis of the 1-decoy method. Interestingly, we find that for practical block sizes of up to 108 bits, the 1-decoy protocol achieves for almost all experimental settings higher secret key rates than the 2-decoy protocol. Since using only one decoy is also easier to implement, we conclude that it is the best choice for QKD, in most common practical scenarios.

  3. Finite-data-size study on practical universal blind quantum computation

    NASA Astrophysics Data System (ADS)

    Zhao, Qiang; Li, Qiong

    2018-07-01

    The universal blind quantum computation with weak coherent pulses protocol is a practical scheme to allow a client to delegate a computation to a remote server while the computation hidden. However, in the practical protocol, a finite data size will influence the preparation efficiency in the remote blind qubit state preparation (RBSP). In this paper, a modified RBSP protocol with two decoy states is studied in the finite data size. The issue of its statistical fluctuations is analyzed thoroughly. The theoretical analysis and simulation results show that two-decoy-state case with statistical fluctuation is closer to the asymptotic case than the one-decoy-state case with statistical fluctuation. Particularly, the two-decoy-state protocol can achieve a longer communication distance than the one-decoy-state case in this statistical fluctuation situation.

  4. Round-robin differential-phase-shift quantum key distribution with a passive decoy state method

    PubMed Central

    Liu, Li; Guo, Fen-Zhuo; Qin, Su-Juan; Wen, Qiao-Yan

    2017-01-01

    Recently, a new type of protocol named Round-robin differential-phase-shift quantum key distribution (RRDPS QKD) was proposed, where the security can be guaranteed without monitoring conventional signal disturbances. The active decoy state method can be used in this protocol to overcome the imperfections of the source. But, it may lead to side channel attacks and break the security of QKD systems. In this paper, we apply the passive decoy state method to the RRDPS QKD protocol. Not only can the more environment disturbance be tolerated, but in addition it can overcome side channel attacks on the sources. Importantly, we derive a new key generation rate formula for our RRDPS protocol using passive decoy states and enhance the key generation rate. We also compare the performance of our RRDPS QKD to that using the active decoy state method and the original RRDPS QKD without any decoy states. From numerical simulations, the performance improvement of the RRDPS QKD by our new method can be seen. PMID:28198808

  5. Practical passive decoy state measurement-device-independent quantum key distribution with unstable sources.

    PubMed

    Liu, Li; Guo, Fen-Zhuo; Wen, Qiao-Yan

    2017-09-12

    Measurement-device-independent quantum key distribution (MDI-QKD) with the active decoy state method can remove all detector loopholes, and resist the imperfections of sources. But it may lead to side channel attacks and break the security of QKD system. In this paper, we apply the passive decoy state method to the MDI-QKD based on polarization encoding mode. Not only all attacks on detectors can be removed, but also the side channel attacks on sources can be overcome. We get that the MDI-QKD with our passive decoy state method can have a performance comparable to the protocol with the active decoy state method. To fit for the demand of practical application, we discuss intensity fluctuation in the security analysis of MDI-QKD protocol using passive decoy state method, and derive the key generation rate for our protocol with intensity fluctuation. It shows that intensity fluctuation has an adverse effect on the key generation rate which is non-negligible, especially in the case of small data size of total transmitting signals and long distance transmission. We give specific simulations on the relationship between intensity fluctuation and the key generation rate. Furthermore, the statistical fluctuation due to the finite length of data is also taken into account.

  6. Finite-key security analyses on passive decoy-state QKD protocols with different unstable sources.

    PubMed

    Song, Ting-Ting; Qin, Su-Juan; Wen, Qiao-Yan; Wang, Yu-Kun; Jia, Heng-Yue

    2015-10-16

    In quantum communication, passive decoy-state QKD protocols can eliminate many side channels, but the protocols without any finite-key analyses are not suitable for in practice. The finite-key securities of passive decoy-state (PDS) QKD protocols with two different unstable sources, type-II parametric down-convention (PDC) and phase randomized weak coherent pulses (WCPs), are analyzed in our paper. According to the PDS QKD protocols, we establish an optimizing programming respectively and obtain the lower bounds of finite-key rates. Under some reasonable values of quantum setup parameters, the lower bounds of finite-key rates are simulated. The simulation results show that at different transmission distances, the affections of different fluctuations on key rates are different. Moreover, the PDS QKD protocol with an unstable PDC source can resist more intensity fluctuations and more statistical fluctuation.

  7. Finite-key security analyses on passive decoy-state QKD protocols with different unstable sources

    PubMed Central

    Song, Ting-Ting; Qin, Su-Juan; Wen, Qiao-Yan; Wang, Yu-Kun; Jia, Heng-Yue

    2015-01-01

    In quantum communication, passive decoy-state QKD protocols can eliminate many side channels, but the protocols without any finite-key analyses are not suitable for in practice. The finite-key securities of passive decoy-state (PDS) QKD protocols with two different unstable sources, type-II parametric down-convention (PDC) and phase randomized weak coherent pulses (WCPs), are analyzed in our paper. According to the PDS QKD protocols, we establish an optimizing programming respectively and obtain the lower bounds of finite-key rates. Under some reasonable values of quantum setup parameters, the lower bounds of finite-key rates are simulated. The simulation results show that at different transmission distances, the affections of different fluctuations on key rates are different. Moreover, the PDS QKD protocol with an unstable PDC source can resist more intensity fluctuations and more statistical fluctuation. PMID:26471947

  8. Biased decoy-state measurement-device-independent quantum cryptographic conferencing with finite resources.

    PubMed

    Chen, RuiKe; Bao, WanSu; Zhou, Chun; Li, Hongwei; Wang, Yang; Bao, HaiZe

    2016-03-21

    In recent years, a large quantity of work have been done to narrow the gap between theory and practice in quantum key distribution (QKD). However, most of them are focus on two-party protocols. Very recently, Yao Fu et al proposed a measurement-device-independent quantum cryptographic conferencing (MDI-QCC) protocol and proved its security in the limit of infinitely long keys. As a step towards practical application for MDI-QCC, we design a biased decoy-state measurement-device-independent quantum cryptographic conferencing protocol and analyze the performance of the protocol in both the finite-key and infinite-key regime. From numerical simulations, we show that our decoy-state analysis is tighter than Yao Fu et al. That is, we can achieve the nonzero asymptotic secret key rate in long distance with approximate to 200km and we also demonstrate that with a finite size of data (say 1011 to 1013 signals) it is possible to perform secure MDI-QCC over reasonable distances.

  9. Beating the photon-number-splitting attack in practical quantum cryptography.

    PubMed

    Wang, Xiang-Bin

    2005-06-17

    We propose an efficient method to verify the upper bound of the fraction of counts caused by multiphoton pulses in practical quantum key distribution using weak coherent light, given whatever type of Eve's action. The protocol simply uses two coherent states for the signal pulses and vacuum for the decoy pulse. Our verified upper bound is sufficiently tight for quantum key distribution with a very lossy channel, in both the asymptotic and nonasymptotic case. So far our protocol is the only decoy-state protocol that works efficiently for currently existing setups.

  10. Quantum key distribution with an unknown and untrusted source

    NASA Astrophysics Data System (ADS)

    Zhao, Yi; Qi, Bing; Lo, Hoi-Kwong

    2009-03-01

    The security of a standard bi-directional ``plug & play'' quantum key distribution (QKD) system has been an open question for a long time. This is mainly because its source is equivalently controlled by an eavesdropper, which means the source is unknown and untrusted. Qualitative discussion on this subject has been made previously. In this paper, we present the first quantitative security analysis on a general class of QKD protocols whose sources are unknown and untrusted. The securities of standard BB84 protocol, weak+vacuum decoy state protocol, and one-decoy decoy state protocol, with unknown and untrusted sources are rigorously proved. We derive rigorous lower bounds to the secure key generation rates of the above three protocols. Our numerical simulation results show that QKD with an untrusted source gives a key generation rate that is close to that with a trusted source. Our work is published in [1]. [4pt] [1] Y. Zhao, B. Qi, and H.-K. Lo, Phys. Rev. A, 77:052327 (2008).

  11. Discrimination of Native-like States of Membrane Proteins with Implicit Membrane-based Scoring Functions.

    PubMed

    Dutagaci, Bercem; Wittayanarakul, Kitiyaporn; Mori, Takaharu; Feig, Michael

    2017-06-13

    A scoring protocol based on implicit membrane-based scoring functions and a new protocol for optimizing the positioning of proteins inside the membrane was evaluated for its capacity to discriminate native-like states from misfolded decoys. A decoy set previously established by the Baker lab (Proteins: Struct., Funct., Genet. 2006, 62, 1010-1025) was used along with a second set that was generated to cover higher resolution models. The Implicit Membrane Model 1 (IMM1), IMM1 model with CHARMM 36 parameters (IMM1-p36), generalized Born with simple switching (GBSW), and heterogeneous dielectric generalized Born versions 2 (HDGBv2) and 3 (HDGBv3) were tested along with the new HDGB van der Waals (HDGBvdW) model that adds implicit van der Waals contributions to the solvation free energy. For comparison, scores were also calculated with the distance-scaled finite ideal-gas reference (DFIRE) scoring function. Z-scores for native state discrimination, energy vs root-mean-square deviation (RMSD) correlations, and the ability to select the most native-like structures as top-scoring decoys were evaluated to assess the performance of the scoring functions. Ranking of the decoys in the Baker set that were relatively far from the native state was challenging and dominated largely by packing interactions that were captured best by DFIRE with less benefit of the implicit membrane-based models. Accounting for the membrane environment was much more important in the second decoy set where especially the HDGB-based scoring functions performed very well in ranking decoys and providing significant correlations between scores and RMSD, which shows promise for improving membrane protein structure prediction and refinement applications. The new membrane structure scoring protocol was implemented in the MEMScore web server ( http://feiglab.org/memscore ).

  12. Making the decoy-state measurement-device-independent quantum key distribution practically useful

    NASA Astrophysics Data System (ADS)

    Zhou, Yi-Heng; Yu, Zong-Wen; Wang, Xiang-Bin

    2016-04-01

    The relatively low key rate seems to be the major barrier to its practical use for the decoy-state measurement-device-independent quantum key distribution (MDI-QKD). We present a four-intensity protocol for the decoy-state MDI-QKD that hugely raises the key rate, especially in the case in which the total data size is not large. Also, calculations show that our method makes it possible for secure private communication with fresh keys generated from MDI-QKD with a delay time of only a few seconds.

  13. Quantum key distribution with an unknown and untrusted source

    NASA Astrophysics Data System (ADS)

    Zhao, Yi; Qi, Bing; Lo, Hoi-Kwong

    2008-05-01

    The security of a standard bidirectional “plug-and-play” quantum key distribution (QKD) system has been an open question for a long time. This is mainly because its source is equivalently controlled by an eavesdropper, which means the source is unknown and untrusted. Qualitative discussion on this subject has been made previously. In this paper, we solve this question directly by presenting the quantitative security analysis on a general class of QKD protocols whose sources are unknown and untrusted. The securities of standard Bennett-Brassard 1984 protocol, weak+vacuum decoy state protocol, and one-decoy state protocol, with unknown and untrusted sources are rigorously proved. We derive rigorous lower bounds to the secure key generation rates of the above three protocols. Our numerical simulation results show that QKD with an untrusted source gives a key generation rate that is close to that with a trusted source.

  14. An Efficient Multiparty Quantum Secret Sharing Protocol Based on Bell States in the High Dimension Hilbert Space

    NASA Astrophysics Data System (ADS)

    Gao, Gan; Wang, Li-Ping

    2010-11-01

    We propose a quantum secret sharing protocol, in which Bell states in the high dimension Hilbert space are employed. The biggest advantage of our protocol is the high source capacity. Compared with the previous secret sharing protocol, ours has the higher controlling efficiency. In addition, as decoy states in the high dimension Hilbert space are used, we needn’t destroy quantum entanglement for achieving the goal to check the channel security.

  15. Free-space measurement-device-independent quantum-key-distribution protocol using decoy states with orbital angular momentum

    NASA Astrophysics Data System (ADS)

    Wang, Le; Zhao, Sheng-Mei; Gong, Long-Yan; Cheng, Wei-Wen

    2015-12-01

    In this paper, we propose a measurement-device-independent quantum-key-distribution (MDI-QKD) protocol using orbital angular momentum (OAM) in free space links, named the OAM-MDI-QKD protocol. In the proposed protocol, the OAM states of photons, instead of polarization states, are used as the information carriers to avoid the reference frame alignment, the decoy-state is adopted to overcome the security loophole caused by the weak coherent pulse source, and the high efficient OAM-sorter is adopted as the measurement tool for Charlie to obtain the output OAM state. Here, Charlie may be an untrusted third party. The results show that the authorized users, Alice and Bob, could distill a secret key with Charlie’s successful measurements, and the key generation performance is slightly better than that of the polarization-based MDI-QKD protocol in the two-dimensional OAM cases. Simultaneously, Alice and Bob can reduce the number of flipping the bits in the secure key distillation. It is indicated that a higher key generation rate performance could be obtained by a high dimensional OAM-MDI-QKD protocol because of the unlimited degree of freedom on OAM states. Moreover, the results show that the key generation rate and the transmission distance will decrease as the growth of the strength of atmospheric turbulence (AT) and the link attenuation. In addition, the decoy states used in the proposed protocol can get a considerable good performance without the need for an ideal source. Project supported by the National Natural Science Foundation of China (Grant Nos. 61271238 and 61475075), the Specialized Research Fund for the Doctoral Program of Higher Education of China (Grant No. 20123223110003), the Natural Science Research Foundation for Universities of Jiangsu Province of China (Grant No. 11KJA510002), the Open Research Fund of Key Laboratory of Broadband Wireless Communication and Sensor Network Technology, Ministry of Education, China (Grant No. NYKL2015011), and the Innovation Program of Graduate Education of Jiangsu Province, China (Grant No. KYLX0810). Gong Long-Yan is partially supported by Qinglan Project of Jiangsu Province, China.

  16. Improved False Discovery Rate Estimation Procedure for Shotgun Proteomics.

    PubMed

    Keich, Uri; Kertesz-Farkas, Attila; Noble, William Stafford

    2015-08-07

    Interpreting the potentially vast number of hypotheses generated by a shotgun proteomics experiment requires a valid and accurate procedure for assigning statistical confidence estimates to identified tandem mass spectra. Despite the crucial role such procedures play in most high-throughput proteomics experiments, the scientific literature has not reached a consensus about the best confidence estimation methodology. In this work, we evaluate, using theoretical and empirical analysis, four previously proposed protocols for estimating the false discovery rate (FDR) associated with a set of identified tandem mass spectra: two variants of the target-decoy competition protocol (TDC) of Elias and Gygi and two variants of the separate target-decoy search protocol of Käll et al. Our analysis reveals significant biases in the two separate target-decoy search protocols. Moreover, the one TDC protocol that provides an unbiased FDR estimate among the target PSMs does so at the cost of forfeiting a random subset of high-scoring spectrum identifications. We therefore propose the mix-max procedure to provide unbiased, accurate FDR estimates in the presence of well-calibrated scores. The method avoids biases associated with the two separate target-decoy search protocols and also avoids the propensity for target-decoy competition to discard a random subset of high-scoring target identifications.

  17. Improved False Discovery Rate Estimation Procedure for Shotgun Proteomics

    PubMed Central

    2016-01-01

    Interpreting the potentially vast number of hypotheses generated by a shotgun proteomics experiment requires a valid and accurate procedure for assigning statistical confidence estimates to identified tandem mass spectra. Despite the crucial role such procedures play in most high-throughput proteomics experiments, the scientific literature has not reached a consensus about the best confidence estimation methodology. In this work, we evaluate, using theoretical and empirical analysis, four previously proposed protocols for estimating the false discovery rate (FDR) associated with a set of identified tandem mass spectra: two variants of the target-decoy competition protocol (TDC) of Elias and Gygi and two variants of the separate target-decoy search protocol of Käll et al. Our analysis reveals significant biases in the two separate target-decoy search protocols. Moreover, the one TDC protocol that provides an unbiased FDR estimate among the target PSMs does so at the cost of forfeiting a random subset of high-scoring spectrum identifications. We therefore propose the mix-max procedure to provide unbiased, accurate FDR estimates in the presence of well-calibrated scores. The method avoids biases associated with the two separate target-decoy search protocols and also avoids the propensity for target-decoy competition to discard a random subset of high-scoring target identifications. PMID:26152888

  18. Optimized decoy state QKD for underwater free space communication

    NASA Astrophysics Data System (ADS)

    Lopes, Minal; Sarwade, Nisha

    Quantum cryptography (QC) is envisioned as a solution for global key distribution through fiber optic, free space and underwater optical communication due to its unconditional security. In view of this, this paper investigates underwater free space quantum key distribution (QKD) model for enhanced transmission distance, secret key rates and security. It is reported that secure underwater free space QKD is feasible in the clearest ocean water with the sifted key rates up to 207kbps. This paper extends this work by testing performance of optimized decoy state QKD protocol with underwater free space communication model. The attenuation of photons, quantum bit error rate and the sifted key generation rate of underwater quantum communication is obtained with vector radiative transfer theory and Monte Carlo method. It is observed from the simulations that optimized decoy state QKD evidently enhances the underwater secret key transmission distance as well as secret key rates.

  19. Multiparty quantum key agreement protocol based on locally indistinguishable orthogonal product states

    NASA Astrophysics Data System (ADS)

    Jiang, Dong-Huan; Xu, Guang-Bao

    2018-07-01

    Based on locally indistinguishable orthogonal product states, we propose a novel multiparty quantum key agreement (QKA) protocol. In this protocol, the private key information of each party is encoded as some orthogonal product states that cannot be perfectly distinguished by local operations and classical communications. To ensure the security of the protocol with small amount of decoy particles, the different particles of each product state are transmitted separately. This protocol not only can make each participant fairly negotiate a shared key, but also can avoid information leakage in the maximum extent. We give a detailed security proof of this protocol. From comparison result with the existing QKA protocols, we can know that the new protocol is more efficient.

  20. Field test of a practical secure communication network with decoy-state quantum cryptography.

    PubMed

    Chen, Teng-Yun; Liang, Hao; Liu, Yang; Cai, Wen-Qi; Ju, Lei; Liu, Wei-Yue; Wang, Jian; Yin, Hao; Chen, Kai; Chen, Zeng-Bing; Peng, Cheng-Zhi; Pan, Jian-Wei

    2009-04-13

    We present a secure network communication system that operated with decoy-state quantum cryptography in a real-world application scenario. The full key exchange and application protocols were performed in real time among three nodes, in which two adjacent nodes were connected by approximate 20 km of commercial telecom optical fiber. The generated quantum keys were immediately employed and demonstrated for communication applications, including unbreakable real-time voice telephone between any two of the three communication nodes, or a broadcast from one node to the other two nodes by using one-time pad encryption.

  1. Measurement-device-independent quantum key distribution with source state errors and statistical fluctuation

    NASA Astrophysics Data System (ADS)

    Jiang, Cong; Yu, Zong-Wen; Wang, Xiang-Bin

    2017-03-01

    We show how to calculate the secure final key rate in the four-intensity decoy-state measurement-device-independent quantum key distribution protocol with both source errors and statistical fluctuations with a certain failure probability. Our results rely only on the range of only a few parameters in the source state. All imperfections in this protocol have been taken into consideration without assuming any specific error patterns of the source.

  2. Improved key-rate bounds for practical decoy-state quantum-key-distribution systems

    NASA Astrophysics Data System (ADS)

    Zhang, Zhen; Zhao, Qi; Razavi, Mohsen; Ma, Xiongfeng

    2017-01-01

    The decoy-state scheme is the most widely implemented quantum-key-distribution protocol in practice. In order to account for the finite-size key effects on the achievable secret key generation rate, a rigorous statistical fluctuation analysis is required. Originally, a heuristic Gaussian-approximation technique was used for this purpose, which, despite its analytical convenience, was not sufficiently rigorous. The fluctuation analysis has recently been made rigorous by using the Chernoff bound. There is a considerable gap, however, between the key-rate bounds obtained from these techniques and that obtained from the Gaussian assumption. Here we develop a tighter bound for the decoy-state method, which yields a smaller failure probability. This improvement results in a higher key rate and increases the maximum distance over which secure key exchange is possible. By optimizing the system parameters, our simulation results show that our method almost closes the gap between the two previously proposed techniques and achieves a performance similar to that of conventional Gaussian approximations.

  3. Continuous-variable quantum-key-distribution protocols with a non-Gaussian modulation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Leverrier, Anthony; Grangier, Philippe; Laboratoire Charles Fabry, Institut d'Optique, CNRS, Univ. Paris-Sud, Campus Polytechnique, RD 128, F-91127 Palaiseau Cedex

    2011-04-15

    In this paper, we consider continuous-variable quantum-key-distribution (QKD) protocols which use non-Gaussian modulations. These specific modulation schemes are compatible with very efficient error-correction procedures, hence allowing the protocols to outperform previous protocols in terms of achievable range. In their simplest implementation, these protocols are secure for any linear quantum channels (hence against Gaussian attacks). We also show how the use of decoy states makes the protocols secure against arbitrary collective attacks, which implies their unconditional security in the asymptotic limit.

  4. Robust quantum secure direct communication and authentication protocol against decoherence noise based on six-qubit DF state

    NASA Astrophysics Data System (ADS)

    Chang, Yan; Zhang, Shi-Bin; Yan, Li-Li; Han, Gui-Hua

    2015-05-01

    By using six-qubit decoherence-free (DF) states as quantum carriers and decoy states, a robust quantum secure direct communication and authentication (QSDCA) protocol against decoherence noise is proposed. Four six-qubit DF states are used in the process of secret transmission, however only the |0‧⟩ state is prepared. The other three six-qubit DF states can be obtained by permuting the outputs of the setup for |0‧⟩. By using the |0‧⟩ state as the decoy state, the detection rate and the qubit error rate reach 81.3%, and they will not change with the noise level. The stability and security are much higher than those of the ping-pong protocol both in an ideal scenario and a decoherence noise scenario. Even if the eavesdropper measures several qubits, exploiting the coherent relationship between these qubits, she can gain one bit of secret information with probability 0.042. Project supported by the National Natural Science Foundation of China (Grant No. 61402058), the Science and Technology Support Project of Sichuan Province of China (Grant No. 2013GZX0137), the Fund for Young Persons Project of Sichuan Province of China (Grant No. 12ZB017), and the Foundation of Cyberspace Security Key Laboratory of Sichuan Higher Education Institutions, China (Grant No. szjj2014-074).

  5. Deterministic Secure Quantum Communication and Authentication Protocol based on Extended GHZ-W State and Quantum One-time Pad

    NASA Astrophysics Data System (ADS)

    Li, Na; Li, Jian; Li, Lei-Lei; Wang, Zheng; Wang, Tao

    2016-08-01

    A deterministic secure quantum communication and authentication protocol based on extended GHZ-W state and quantum one-time pad is proposed. In the protocol, state | φ -> is used as the carrier. One photon of | φ -> state is sent to Alice, and Alice obtains a random key by measuring photons with bases determined by ID. The information of bases is secret to others except Alice and Bob. Extended GHZ-W states are used as decoy photons, the positions of which in information sequence are encoded with identity string ID of the legal user, and the eavesdropping detection rate reaches 81%. The eavesdropping detection based on extended GHZ-W state combines with authentication and the secret ID ensures the security of the protocol.

  6. Three-party quantum secure direct communication against collective noise

    NASA Astrophysics Data System (ADS)

    He, Ye-Feng; Ma, Wen-Ping

    2017-10-01

    Based on logical quantum states, two three-party quantum secure direct communication protocols are proposed, which can realize the exchange of the secret messages between three parties with the help of the measurement correlation property of six-particle entangled states. These two protocols can be immune to the collective-dephasing noise and the collective-rotation noise, respectively; neither of them has information leakage problem. The one-way transmission mode ensures that they can congenitally resist against the Trojan horse attacks and the teleportation attack. Furthermore, these two protocols are secure against other active attacks because of the use of the decoy state technology.

  7. Simple scheme to implement decoy-state reference-frame-independent quantum key distribution

    NASA Astrophysics Data System (ADS)

    Zhang, Chunmei; Zhu, Jianrong; Wang, Qin

    2018-06-01

    We propose a simple scheme to implement decoy-state reference-frame-independent quantum key distribution (RFI-QKD), where signal states are prepared in Z, X, and Y bases, decoy states are prepared in X and Y bases, and vacuum states are set to no bases. Different from the original decoy-state RFI-QKD scheme whose decoy states are prepared in Z, X and Y bases, in our scheme decoy states are only prepared in X and Y bases, which avoids the redundancy of decoy states in Z basis, saves the random number consumption, simplifies the encoding device of practical RFI-QKD systems, and makes the most of the finite pulses in a short time. Numerical simulations show that, considering the finite size effect with reasonable number of pulses in practical scenarios, our simple decoy-state RFI-QKD scheme exhibits at least comparable or even better performance than that of the original decoy-state RFI-QKD scheme. Especially, in terms of the resistance to the relative rotation of reference frames, our proposed scheme behaves much better than the original scheme, which has great potential to be adopted in current QKD systems.

  8. Simple and high-speed polarization-based QKD

    NASA Astrophysics Data System (ADS)

    Grünenfelder, Fadri; Boaron, Alberto; Rusca, Davide; Martin, Anthony; Zbinden, Hugo

    2018-01-01

    We present a simplified BB84 protocol with only three quantum states and one decoy-state level. We implement this scheme using the polarization degree of freedom at telecom wavelength. Only one pulsed laser is used in order to reduce possible side-channel attacks. The repetition rate of 625 MHz and the achieved secret bit rate of 23 bps over 200 km of standard fiber are the actual state of the art.

  9. An improved scheme on decoy-state method for measurement-device-independent quantum key distribution.

    PubMed

    Wang, Dong; Li, Mo; Guo, Guang-Can; Wang, Qin

    2015-10-14

    Quantum key distribution involving decoy-states is a significant application of quantum information. By using three-intensity decoy-states of single-photon-added coherent sources, we propose a practically realizable scheme on quantum key distribution which approaches very closely the ideal asymptotic case of an infinite number of decoy-states. We make a comparative study between this scheme and two other existing ones, i.e., two-intensity decoy-states with single-photon-added coherent sources, and three-intensity decoy-states with weak coherent sources. Through numerical analysis, we demonstrate the advantages of our scheme in secure transmission distance and the final key generation rate.

  10. An improved scheme on decoy-state method for measurement-device-independent quantum key distribution

    PubMed Central

    Wang, Dong; Li, Mo; Guo, Guang-Can; Wang, Qin

    2015-01-01

    Quantum key distribution involving decoy-states is a significant application of quantum information. By using three-intensity decoy-states of single-photon-added coherent sources, we propose a practically realizable scheme on quantum key distribution which approaches very closely the ideal asymptotic case of an infinite number of decoy-states. We make a comparative study between this scheme and two other existing ones, i.e., two-intensity decoy-states with single-photon-added coherent sources, and three-intensity decoy-states with weak coherent sources. Through numerical analysis, we demonstrate the advantages of our scheme in secure transmission distance and the final key generation rate. PMID:26463580

  11. Security of quantum key distribution with multiphoton components

    PubMed Central

    Yin, Hua-Lei; Fu, Yao; Mao, Yingqiu; Chen, Zeng-Bing

    2016-01-01

    Most qubit-based quantum key distribution (QKD) protocols extract the secure key merely from single-photon component of the attenuated lasers. However, with the Scarani-Acin-Ribordy-Gisin 2004 (SARG04) QKD protocol, the unconditionally secure key can be extracted from the two-photon component by modifying the classical post-processing procedure in the BB84 protocol. Employing the merits of SARG04 QKD protocol and six-state preparation, one can extract secure key from the components of single photon up to four photons. In this paper, we provide the exact relations between the secure key rate and the bit error rate in a six-state SARG04 protocol with single-photon, two-photon, three-photon, and four-photon sources. By restricting the mutual information between the phase error and bit error, we obtain a higher secure bit error rate threshold of the multiphoton components than previous works. Besides, we compare the performances of the six-state SARG04 with other prepare-and-measure QKD protocols using decoy states. PMID:27383014

  12. Parameter optimization in biased decoy-state quantum key distribution with both source errors and statistical fluctuations

    NASA Astrophysics Data System (ADS)

    Zhu, Jian-Rong; Li, Jian; Zhang, Chun-Mei; Wang, Qin

    2017-10-01

    The decoy-state method has been widely used in commercial quantum key distribution (QKD) systems. In view of the practical decoy-state QKD with both source errors and statistical fluctuations, we propose a universal model of full parameter optimization in biased decoy-state QKD with phase-randomized sources. Besides, we adopt this model to carry out simulations of two widely used sources: weak coherent source (WCS) and heralded single-photon source (HSPS). Results show that full parameter optimization can significantly improve not only the secure transmission distance but also the final key generation rate. And when taking source errors and statistical fluctuations into account, the performance of decoy-state QKD using HSPS suffered less than that of decoy-state QKD using WCS.

  13. One-sided measurement-device-independent quantum key distribution

    NASA Astrophysics Data System (ADS)

    Cao, Wen-Fei; Zhen, Yi-Zheng; Zheng, Yu-Lin; Li, Li; Chen, Zeng-Bing; Liu, Nai-Le; Chen, Kai

    2018-01-01

    Measurement-device-independent quantum key distribution (MDI-QKD) protocol was proposed to remove all the detector side channel attacks, while its security relies on the trusted encoding systems. Here we propose a one-sided MDI-QKD (1SMDI-QKD) protocol, which enjoys detection loophole-free advantage, and at the same time weakens the state preparation assumption in MDI-QKD. The 1SMDI-QKD can be regarded as a modified MDI-QKD, in which Bob's encoding system is trusted, while Alice's is uncharacterized. For the practical implementation, we also provide a scheme by utilizing coherent light source with an analytical two decoy state estimation method. Simulation with realistic experimental parameters shows that the protocol has a promising performance, and thus can be applied to practical QKD applications.

  14. Simple 2.5 GHz time-bin quantum key distribution

    NASA Astrophysics Data System (ADS)

    Boaron, Alberto; Korzh, Boris; Houlmann, Raphael; Boso, Gianluca; Rusca, Davide; Gray, Stuart; Li, Ming-Jun; Nolan, Daniel; Martin, Anthony; Zbinden, Hugo

    2018-04-01

    We present a 2.5 GHz quantum key distribution setup with the emphasis on a simple experimental realization. It features a three-state time-bin protocol based on a pulsed diode laser and a single intensity modulator. Implementing an efficient one-decoy scheme and finite-key analysis, we achieve record breaking secret key rates of 1.5 kbps over 200 km of standard optical fibers.

  15. Residue contacts predicted by evolutionary covariance extend the application of ab initio molecular replacement to larger and more challenging protein folds.

    PubMed

    Simkovic, Felix; Thomas, Jens M H; Keegan, Ronan M; Winn, Martyn D; Mayans, Olga; Rigden, Daniel J

    2016-07-01

    For many protein families, the deluge of new sequence information together with new statistical protocols now allow the accurate prediction of contacting residues from sequence information alone. This offers the possibility of more accurate ab initio (non-homology-based) structure prediction. Such models can be used in structure solution by molecular replacement (MR) where the target fold is novel or is only distantly related to known structures. Here, AMPLE, an MR pipeline that assembles search-model ensembles from ab initio structure predictions ('decoys'), is employed to assess the value of contact-assisted ab initio models to the crystallographer. It is demonstrated that evolutionary covariance-derived residue-residue contact predictions improve the quality of ab initio models and, consequently, the success rate of MR using search models derived from them. For targets containing β-structure, decoy quality and MR performance were further improved by the use of a β-strand contact-filtering protocol. Such contact-guided decoys achieved 14 structure solutions from 21 attempted protein targets, compared with nine for simple Rosetta decoys. Previously encountered limitations were superseded in two key respects. Firstly, much larger targets of up to 221 residues in length were solved, which is far larger than the previously benchmarked threshold of 120 residues. Secondly, contact-guided decoys significantly improved success with β-sheet-rich proteins. Overall, the improved performance of contact-guided decoys suggests that MR is now applicable to a significantly wider range of protein targets than were previously tractable, and points to a direct benefit to structural biology from the recent remarkable advances in sequencing.

  16. Decoy-state quantum key distribution with more than three types of photon intensity pulses

    NASA Astrophysics Data System (ADS)

    Chau, H. F.

    2018-04-01

    The decoy-state method closes source security loopholes in quantum key distribution (QKD) using a laser source. In this method, accurate estimates of the detection rates of vacuum and single-photon events plus the error rate of single-photon events are needed to give a good enough lower bound of the secret key rate. Nonetheless, the current estimation method for these detection and error rates, which uses three types of photon intensities, is accurate up to about 1 % relative error. Here I report an experimentally feasible way that greatly improves these estimates and hence increases the one-way key rate of the BB84 QKD protocol with unbiased bases selection by at least 20% on average in realistic settings. The major tricks are the use of more than three types of photon intensities plus the fact that estimating bounds of the above detection and error rates is numerically stable, although these bounds are related to the inversion of a high condition number matrix.

  17. An Efficient and Secure Arbitrary N-Party Quantum Key Agreement Protocol Using Bell States

    NASA Astrophysics Data System (ADS)

    Liu, Wen-Jie; Xu, Yong; Yang, Ching-Nung; Gao, Pei-Pei; Yu, Wen-Bin

    2018-01-01

    Two quantum key agreement protocols using Bell states and Bell measurement were recently proposed by Shukla et al. (Quantum Inf. Process. 13(11), 2391-2405, 2014). However, Zhu et al. pointed out that there are some security flaws and proposed an improved version (Quantum Inf. Process. 14(11), 4245-4254, 2015). In this study, we will show Zhu et al.'s improvement still exists some security problems, and its efficiency is not high enough. For solving these problems, we utilize four Pauli operations { I, Z, X, Y} to encode two bits instead of the original two operations { I, X} to encode one bit, and then propose an efficient and secure arbitrary N-party quantum key agreement protocol. In the protocol, the channel checking with decoy single photons is introduced to avoid the eavesdropper's flip attack, and a post-measurement mechanism is used to prevent against the collusion attack. The security analysis shows the present protocol can guarantee the correctness, security, privacy and fairness of quantum key agreement.

  18. Decoy-state quantum key distribution with biased basis choice

    PubMed Central

    Wei, Zhengchao; Wang, Weilong; Zhang, Zhen; Gao, Ming; Ma, Zhi; Ma, Xiongfeng

    2013-01-01

    We propose a quantum key distribution scheme that combines a biased basis choice with the decoy-state method. In this scheme, Alice sends all signal states in the Z basis and decoy states in the X and Z basis with certain probabilities, and Bob measures received pulses with optimal basis choice. This scheme simplifies the system and reduces the random number consumption. From the simulation result taking into account of statistical fluctuations, we find that in a typical experimental setup, the proposed scheme can increase the key rate by at least 45% comparing to the standard decoy-state scheme. In the postprocessing, we also apply a rigorous method to upper bound the phase error rate of the single-photon components of signal states. PMID:23948999

  19. Decoy-state quantum key distribution with biased basis choice.

    PubMed

    Wei, Zhengchao; Wang, Weilong; Zhang, Zhen; Gao, Ming; Ma, Zhi; Ma, Xiongfeng

    2013-01-01

    We propose a quantum key distribution scheme that combines a biased basis choice with the decoy-state method. In this scheme, Alice sends all signal states in the Z basis and decoy states in the X and Z basis with certain probabilities, and Bob measures received pulses with optimal basis choice. This scheme simplifies the system and reduces the random number consumption. From the simulation result taking into account of statistical fluctuations, we find that in a typical experimental setup, the proposed scheme can increase the key rate by at least 45% comparing to the standard decoy-state scheme. In the postprocessing, we also apply a rigorous method to upper bound the phase error rate of the single-photon components of signal states.

  20. Security proof of a three-state quantum-key-distribution protocol without rotational symmetry

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Fung, C.-H.F.; Lo, H.-K.

    2006-10-15

    Standard security proofs of quantum-key-distribution (QKD) protocols often rely on symmetry arguments. In this paper, we prove the security of a three-state protocol that does not possess rotational symmetry. The three-state QKD protocol we consider involves three qubit states, where the first two states |0{sub z}> and |1{sub z}> can contribute to key generation, and the third state |+>=(|0{sub z}>+|1{sub z}>)/{radical}(2) is for channel estimation. This protocol has been proposed and implemented experimentally in some frequency-based QKD systems where the three states can be prepared easily. Thus, by founding on the security of this three-state protocol, we prove that thesemore » QKD schemes are, in fact, unconditionally secure against any attacks allowed by quantum mechanics. The main task in our proof is to upper bound the phase error rate of the qubits given the bit error rates observed. Unconditional security can then be proved not only for the ideal case of a single-photon source and perfect detectors, but also for the realistic case of a phase-randomized weak coherent light source and imperfect threshold detectors. Our result in the phase error rate upper bound is independent of the loss in the channel. Also, we compare the three-state protocol with the Bennett-Brassard 1984 (BB84) protocol. For the single-photon source case, our result proves that the BB84 protocol strictly tolerates a higher quantum bit error rate than the three-state protocol, while for the coherent-source case, the BB84 protocol achieves a higher key generation rate and secure distance than the three-state protocol when a decoy-state method is used.« less

  1. High-capacity quantum secure direct communication with two-photon six-qubit hyperentangled states

    NASA Astrophysics Data System (ADS)

    Wu, FangZhou; Yang, GuoJian; Wang, HaiBo; Xiong, Jun; Alzahrani, Faris; Hobiny, Aatef; Deng, FuGuo

    2017-12-01

    This study proposes the first high-capacity quantum secure direct communication (QSDC) with two-photon six-qubit hyper-entangled Bell states in two longitudinal momentum and polarization degrees of freedom (DOFs) of photon pairs, which can be generated using two 0.5 mm-thick type-I β barium borate crystal slabs aligned one behind the other and an eight-hole screen. The secret message can be independently encoded on the photon pairs with 64 unitary operations in all three DOFs. This protocol has a higher capacity than previous QSDC protocols because each photon pair can carry 6 bits of information, not just 2 or 4 bits. Our QSDC protocol decreases the influence of decoherence from environment noise by exploiting the decoy photons to check the security of the transmission of the first photon sequence. Compared with two-way QSDC protocols, our QSDC protocol is immune to an attack by an eavesdropper using Trojan horse attack strategies because it is a one-way quantum communication. The QSDC protocol has good applications in the future quantum communication because of all these features.

  2. Residue contacts predicted by evolutionary covariance extend the application of ab initio molecular replacement to larger and more challenging protein folds

    PubMed Central

    Simkovic, Felix; Thomas, Jens M. H.; Keegan, Ronan M.; Winn, Martyn D.; Mayans, Olga; Rigden, Daniel J.

    2016-01-01

    For many protein families, the deluge of new sequence information together with new statistical protocols now allow the accurate prediction of contacting residues from sequence information alone. This offers the possibility of more accurate ab initio (non-homology-based) structure prediction. Such models can be used in structure solution by molecular replacement (MR) where the target fold is novel or is only distantly related to known structures. Here, AMPLE, an MR pipeline that assembles search-model ensembles from ab initio structure predictions (‘decoys’), is employed to assess the value of contact-assisted ab initio models to the crystallographer. It is demonstrated that evolutionary covariance-derived residue–residue contact predictions improve the quality of ab initio models and, consequently, the success rate of MR using search models derived from them. For targets containing β-structure, decoy quality and MR performance were further improved by the use of a β-strand contact-filtering protocol. Such contact-guided decoys achieved 14 structure solutions from 21 attempted protein targets, compared with nine for simple Rosetta decoys. Previously encountered limitations were superseded in two key respects. Firstly, much larger targets of up to 221 residues in length were solved, which is far larger than the previously benchmarked threshold of 120 residues. Secondly, contact-guided decoys significantly improved success with β-sheet-rich proteins. Overall, the improved performance of contact-guided decoys suggests that MR is now applicable to a significantly wider range of protein targets than were previously tractable, and points to a direct benefit to structural biology from the recent remarkable advances in sequencing. PMID:27437113

  3. FPGA and USB based control board for quantum random number generator

    NASA Astrophysics Data System (ADS)

    Wang, Jian; Wan, Xu; Zhang, Hong-Fei; Gao, Yuan; Chen, Teng-Yun; Liang, Hao

    2009-09-01

    The design and implementation of FPGA-and-USB-based control board for quantum experiments are discussed. The usage of quantum true random number generator, control- logic in FPGA and communication with computer through USB protocol are proposed in this paper. Programmable controlled signal input and output ports are implemented. The error-detections of data frame header and frame length are designed. This board has been used in our decoy-state based quantum key distribution (QKD) system successfully.

  4. Revealing of photon-number splitting attack on quantum key distribution system by photon-number resolving devices

    NASA Astrophysics Data System (ADS)

    Gaidash, A. A.; Egorov, V. I.; Gleim, A. V.

    2016-08-01

    Quantum cryptography allows distributing secure keys between two users so that any performed eavesdropping attempt would be immediately discovered. However, in practice an eavesdropper can obtain key information from multi-photon states when attenuated laser radiation is used as a source of quantum states. In order to prevent actions of an eavesdropper, it is generally suggested to implement special cryptographic protocols, like decoy states or SARG04. In this paper, we describe an alternative method based on monitoring photon number statistics after detection. We provide a useful rule of thumb to estimate approximate order of difference of expected distribution and distribution in case of attack. Formula for calculating a minimum value of total pulses or time-gaps to resolve attack is shown. Also formulas for actual fraction of raw key known to Eve were derived. This method can therefore be used with any system and even combining with mentioned special protocols.

  5. Decoys Selection in Benchmarking Datasets: Overview and Perspectives

    PubMed Central

    Réau, Manon; Langenfeld, Florent; Zagury, Jean-François; Lagarde, Nathalie; Montes, Matthieu

    2018-01-01

    Virtual Screening (VS) is designed to prospectively help identifying potential hits, i.e., compounds capable of interacting with a given target and potentially modulate its activity, out of large compound collections. Among the variety of methodologies, it is crucial to select the protocol that is the most adapted to the query/target system under study and that yields the most reliable output. To this aim, the performance of VS methods is commonly evaluated and compared by computing their ability to retrieve active compounds in benchmarking datasets. The benchmarking datasets contain a subset of known active compounds together with a subset of decoys, i.e., assumed non-active molecules. The composition of both the active and the decoy compounds subsets is critical to limit the biases in the evaluation of the VS methods. In this review, we focus on the selection of decoy compounds that has considerably changed over the years, from randomly selected compounds to highly customized or experimentally validated negative compounds. We first outline the evolution of decoys selection in benchmarking databases as well as current benchmarking databases that tend to minimize the introduction of biases, and secondly, we propose recommendations for the selection and the design of benchmarking datasets. PMID:29416509

  6. Improved statistical fluctuation analysis for measurement-device-independent quantum key distribution with four-intensity decoy-state method.

    PubMed

    Mao, Chen-Chen; Zhou, Xing-Yu; Zhu, Jian-Rong; Zhang, Chun-Hui; Zhang, Chun-Mei; Wang, Qin

    2018-05-14

    Recently Zhang et al [ Phys. Rev. A95, 012333 (2017)] developed a new approach to estimate the failure probability for the decoy-state BB84 QKD system when taking finite-size key effect into account, which offers security comparable to Chernoff bound, while results in an improved key rate and transmission distance. Based on Zhang et al's work, now we extend this approach to the case of the measurement-device-independent quantum key distribution (MDI-QKD), and for the first time implement it onto the four-intensity decoy-state MDI-QKD system. Moreover, through utilizing joint constraints and collective error-estimation techniques, we can obviously increase the performance of practical MDI-QKD systems compared with either three- or four-intensity decoy-state MDI-QKD using Chernoff bound analysis, and achieve much higher level security compared with those applying Gaussian approximation analysis.

  7. Airborne target tracking algorithm against oppressive decoys in infrared imagery

    NASA Astrophysics Data System (ADS)

    Sun, Xiechang; Zhang, Tianxu

    2009-10-01

    This paper presents an approach for tracking airborne target against oppressive infrared decoys. Oppressive decoy lures infrared guided missile by its high infrared radiation. Traditional tracking algorithms have degraded stability even come to tracking failure when airborne target continuously throw out many decoys. The proposed approach first determines an adaptive tracking window. The center of the tracking window is set at a predicted target position which is computed based on uniform motion model. Different strategies are applied for determination of tracking window size according to target state. The image within tracking window is segmented and multi features of candidate targets are extracted. The most similar candidate target is associated to the tracking target by using a decision function, which calculates a weighted sum of normalized feature differences between two comparable targets. Integrated intensity ratio of association target and tracking target, and target centroid are examined to estimate target state in the presence of decoys. The tracking ability and robustness of proposed approach has been validated by processing available real-world and simulated infrared image sequences containing airborne targets and oppressive decoys.

  8. Feasibility of satellite quantum key distribution

    NASA Astrophysics Data System (ADS)

    Bonato, C.; Tomaello, A.; Da Deppo, V.; Naletto, G.; Villoresi, P.

    2009-04-01

    In this paper, we present a novel analysis of the feasibility of quantum key distribution between a LEO satellite and a ground station. First of all, we study signal propagation through a turbulent atmosphere for uplinks and downlinks, discussing the contribution of beam spreading and beam wandering. Then we introduce a model for the background noise of the channel during night-time and day-time, calculating the signal-to-noise ratio for different configurations. We also discuss the expected error-rate due to imperfect polarization compensation in the channel. Finally, we calculate the expected key generation rate of a secure key for different configurations (uplink, downlink) and for different protocols (BB84 with and without decoy states, entanglement-based Ekert91 protocol).

  9. Semi-quantum Dialogue Based on Single Photons

    NASA Astrophysics Data System (ADS)

    Ye, Tian-Yu; Ye, Chong-Qiang

    2018-02-01

    In this paper, we propose two semi-quantum dialogue (SQD) protocols by using single photons as the quantum carriers, where one requires the classical party to possess the measurement capability and the other does not have this requirement. The security toward active attacks from an outside Eve in the first SQD protocol is guaranteed by the complete robustness of present semi-quantum key distribution (SQKD) protocols, the classical one-time pad encryption, the classical party's randomization operation and the decoy photon technology. The information leakage problem of the first SQD protocol is overcome by the classical party' classical basis measurements on the single photons carrying messages which makes him share their initial states with the quantum party. The security toward active attacks from Eve in the second SQD protocol is guaranteed by the classical party's randomization operation, the complete robustness of present SQKD protocol and the classical one-time pad encryption. The information leakage problem of the second SQD protocol is overcome by the quantum party' classical basis measurements on each two adjacent single photons carrying messages which makes her share their initial states with the classical party. Compared with the traditional information leakage resistant QD protocols, the advantage of the proposed SQD protocols lies in that they only require one party to have quantum capabilities. Compared with the existing SQD protocol, the advantage of the proposed SQD protocols lies in that they only employ single photons rather than two-photon entangled states as the quantum carriers. The proposed SQD protocols can be implemented with present quantum technologies.

  10. Round-robin differential-phase-shift quantum key distribution with heralded pair-coherent sources

    NASA Astrophysics Data System (ADS)

    Wang, Le; Zhao, Shengmei

    2017-04-01

    Round-robin differential-phase-shift (RRDPS) quantum key distribution (QKD) scheme provides an effective way to overcome the signal disturbance from the transmission process. However, most RRDPS-QKD schemes use weak coherent pulses (WCPs) as the replacement of the perfect single-photon source. Considering the heralded pair-coherent source (HPCS) can efficiently remove the shortcomings of WCPs, we propose a RRDPS-QKD scheme with HPCS in this paper. Both infinite-intensity decoy-state method and practical three-intensity decoy-state method are adopted to discuss the tight bound of the key rate of the proposed scheme. The results show that HPCS is a better candidate for the replacement of the perfect single-photon source, and both the key rate and the transmission distance are greatly increased in comparison with those results with WCPs when the length of the pulse trains is small. Simultaneously, the performance of the proposed scheme using three-intensity decoy states is close to that result using infinite-intensity decoy states when the length of pulse trains is small.

  11. Passive decoy-state quantum key distribution with practical light sources

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Curty, Marcos; Ma, Xiongfeng; Qi, Bing

    2010-02-15

    Decoy states have been proven to be a very useful method for significantly enhancing the performance of quantum key distribution systems with practical light sources. Although active modulation of the intensity of the laser pulses is an effective way of preparing decoy states in principle, in practice passive preparation might be desirable in some scenarios. Typical passive schemes involve parametric down-conversion. More recently, it has been shown that phase-randomized weak coherent pulses (WCP) can also be used for the same purpose [M. Curty et al., Opt. Lett. 34, 3238 (2009).] This proposal requires only linear optics together with a simplemore » threshold photon detector, which shows the practical feasibility of the method. Most importantly, the resulting secret key rate is comparable to the one delivered by an active decoy-state setup with an infinite number of decoy settings. In this article we extend these results, now showing specifically the analysis for other practical scenarios with different light sources and photodetectors. In particular, we consider sources emitting thermal states, phase-randomized WCP, and strong coherent light in combination with several types of photodetectors, like, for instance, threshold photon detectors, photon number resolving detectors, and classical photodetectors. Our analysis includes as well the effect that detection inefficiencies and noise in the form of dark counts shown by current threshold detectors might have on the final secret key rate. Moreover, we provide estimations on the effects that statistical fluctuations due to a finite data size can have in practical implementations.« less

  12. Multiparty Quantum English Auction Scheme Using Single Photons as Message Carrier

    NASA Astrophysics Data System (ADS)

    Liu, Ge; Zhang, Jian-Zhong; Xie, Shu-Cui

    2018-03-01

    In this paper, a secure and economic multiparty english auction protocol using the single photons as message carrier of bids is proposed. In order to achieve unconditional security, fairness, undeniability and so on, we adopt the decoy photon checking technique and quantum encryption algorithm. Analysis result shows that our protocol satisfies all the characteristics of traditional english auction, meanwhile, it can resist malicious attacks.

  13. Decoy-state quantum key distribution with polarized photons over 200 km.

    PubMed

    Liu, Yang; Chen, Teng-Yun; Wang, Jian; Cai, Wen-Qi; Wan, Xu; Chen, Luo-Kan; Wang, Jin-Hong; Liu, Shu-Bin; Liang, Hao; Yang, Lin; Peng, Cheng-Zhi; Chen, Kai; Chen, Zeng-Bing; Pan, Jian-Wei

    2010-04-12

    We report an implementation of decoy-state quantum key distribution (QKD) over 200 km optical fiber cable through photon polarization encoding. This is achieved by constructing the whole QKD system operating at 320 MHz repetition rate, and developing high-speed transmitter and receiver modules. A novel and economic way of synchronization method is designed and incorporated into the system, which allows to work at a low frequency of 40kHz and removes the use of highly precise clock. A final key rate of 15 Hz is distributed within the experimental time of 3089 seconds, by using super-conducting single photon detectors. This is longest decoy-state QKD yet demonstrated up to date. It helps to make a significant step towards practical secure communication in long-distance scope.

  14. Experimental Demonstration of Polarization Encoding Measurement-Device-Independent Quantum Key Distribution

    NASA Astrophysics Data System (ADS)

    Tang, Zhiyuan; Liao, Zhongfa; Xu, Feihu; Qi, Bing; Qian, Li; Lo, Hoi-Kwong

    2014-05-01

    We demonstrate the first implementation of polarization encoding measurement-device-independent quantum key distribution (MDI-QKD), which is immune to all detector side-channel attacks. Active phase randomization of each individual pulse is implemented to protect against attacks on imperfect sources. By optimizing the parameters in the decoy state protocol, we show that it is feasible to implement polarization encoding MDI-QKD with commercial off-the-shelf devices. A rigorous finite key analysis is applied to estimate the secure key rate. Our work paves the way for the realization of a MDI-QKD network, in which the users only need compact and low-cost state-preparation devices and can share complicated and expensive detectors provided by an untrusted network server.

  15. Experimental demonstration of polarization encoding measurement-device-independent quantum key distribution.

    PubMed

    Tang, Zhiyuan; Liao, Zhongfa; Xu, Feihu; Qi, Bing; Qian, Li; Lo, Hoi-Kwong

    2014-05-16

    We demonstrate the first implementation of polarization encoding measurement-device-independent quantum key distribution (MDI-QKD), which is immune to all detector side-channel attacks. Active phase randomization of each individual pulse is implemented to protect against attacks on imperfect sources. By optimizing the parameters in the decoy state protocol, we show that it is feasible to implement polarization encoding MDI-QKD with commercial off-the-shelf devices. A rigorous finite key analysis is applied to estimate the secure key rate. Our work paves the way for the realization of a MDI-QKD network, in which the users only need compact and low-cost state-preparation devices and can share complicated and expensive detectors provided by an untrusted network server.

  16. SCUD: fast structure clustering of decoys using reference state to remove overall rotation.

    PubMed

    Li, Hongzhi; Zhou, Yaoqi

    2005-08-01

    We developed a method for fast decoy clustering by using reference root-mean-squared distance (rRMSD) rather than commonly used pairwise RMSD (pRMSD) values. For 41 proteins with 2000 decoys each, the computing efficiency increases nine times without a significant change in the accuracy of near-native selections. Tests on additional protein decoys based on different reference conformations confirmed this result. Further analysis indicates that the pRMSD and rRMSD values are highly correlated (with an average correlation coefficient of 0.82) and the clusters obtained from pRMSD and rRMSD values are highly similar (the representative structures of the top five largest clusters from the two methods are 74% identical). SCUD (Structure ClUstering of Decoys) with an automatic cutoff value is available at http://theory.med.buffalo.edu. (c) 2005 Wiley Periodicals, Inc.

  17. Long-distance measurement-device-independent multiparty quantum communication.

    PubMed

    Fu, Yao; Yin, Hua-Lei; Chen, Teng-Yun; Chen, Zeng-Bing

    2015-03-06

    The Greenberger-Horne-Zeilinger (GHZ) entanglement, originally introduced to uncover the extreme violation of local realism against quantum mechanics, is an important resource for multiparty quantum communication tasks. But the low intensity and fragility of the GHZ entanglement source in current conditions have made the practical applications of these multiparty tasks an experimental challenge. Here we propose a feasible scheme for practically distributing the postselected GHZ entanglement over a distance of more than 100 km for experimentally accessible parameter regimes. Combining the decoy-state and measurement-device-independent protocols for quantum key distribution, we anticipate that our proposal suggests an important avenue for practical multiparty quantum communication.

  18. Proof-of-principle experiment of reference-frame-independent quantum key distribution with phase coding

    PubMed Central

    Liang, Wen-Ye; Wang, Shuang; Li, Hong-Wei; Yin, Zhen-Qiang; Chen, Wei; Yao, Yao; Huang, Jing-Zheng; Guo, Guang-Can; Han, Zheng-Fu

    2014-01-01

    We have demonstrated a proof-of-principle experiment of reference-frame-independent phase coding quantum key distribution (RFI-QKD) over an 80-km optical fiber. After considering the finite-key bound, we still achieve a distance of 50 km. In this scenario, the phases of the basis states are related by a slowly time-varying transformation. Furthermore, we developed and realized a new decoy state method for RFI-QKD systems with weak coherent sources to counteract the photon-number-splitting attack. With the help of a reference-frame-independent protocol and a Michelson interferometer with Faraday rotator mirrors, our system is rendered immune to the slow phase changes of the interferometer and the polarization disturbances of the channel, making the procedure very robust. PMID:24402550

  19. Exploring the Stability of Ligand Binding Modes to Proteins by Molecular Dynamics Simulations: A Cross-docking Study.

    PubMed

    Liu, Kai; Kokubo, Hironori

    2017-10-23

    Docking has become an indispensable approach in drug discovery research to predict the binding mode of a ligand. One great challenge in docking is to efficiently refine the correct pose from various putative docking poses through scoring functions. We recently examined the stability of self-docking poses under molecular dynamics (MD) simulations and showed that equilibrium MD simulations have some capability to discriminate between correct and decoy poses. Here, we have extended our previous work to cross-docking studies for practical applications. Three target proteins (thrombin, heat shock protein 90-alpha, and cyclin-dependent kinase 2) of pharmaceutical interest were selected. Three comparable poses (one correct pose and two decoys) for each ligand were then selected from the docking poses. To obtain the docking poses for the three target proteins, we used three different protocols, namely: normal docking, induced fit docking (IFD), and IFD against the homology model. Finally, five parallel MD equilibrium runs were performed on each pose for the statistical analysis. The results showed that the correct poses were generally more stable than the decoy poses under MD. The discrimination capability of MD depends on the strategy. The safest way was to judge a pose as being stable if any one run among five parallel runs was stable under MD. In this case, 95% of the correct poses were retained under MD, and about 25-44% of the decoys could be excluded by the simulations for all cases. On the other hand, if we judge a pose as being stable when any two or three runs were stable, with the risk of incorrectly excluding some correct poses, approximately 31-53% or 39-56% of the two decoys could be excluded by MD, respectively. Our results suggest that simple equilibrium simulations can serve as an effective filter to exclude decoy poses that cannot be distinguished by docking scores from the computationally expensive free-energy calculations.

  20. Biased three-intensity decoy-state scheme on the measurement-device-independent quantum key distribution using heralded single-photon sources.

    PubMed

    Zhang, Chun-Hui; Zhang, Chun-Mei; Guo, Guang-Can; Wang, Qin

    2018-02-19

    At present, most of the measurement-device-independent quantum key distributions (MDI-QKD) are based on weak coherent sources and limited in the transmission distance under realistic experimental conditions, e.g., considering the finite-size-key effects. Hence in this paper, we propose a new biased decoy-state scheme using heralded single-photon sources for the three-intensity MDI-QKD, where we prepare the decoy pulses only in X basis and adopt both the collective constraints and joint parameter estimation techniques. Compared with former schemes with WCS or HSPS, after implementing full parameter optimizations, our scheme gives distinct reduced quantum bit error rate in the X basis and thus show excellent performance, especially when the data size is relatively small.

  1. Revisiting Deng et al.'s Multiparty Quantum Secret Sharing Protocol

    NASA Astrophysics Data System (ADS)

    Hwang, Tzonelih; Hwang, Cheng-Chieh; Yang, Chun-Wei; Li, Chuan-Ming

    2011-09-01

    The multiparty quantum secret sharing protocol [Deng et al. in Chin. Phys. Lett. 23: 1084-1087, 2006] is revisited in this study. It is found that the performance of Deng et al.'s protocol can be much improved by using the techniques of block-transmission and decoy single photons. As a result, the qubit efficiency is improved 2.4 times and only one classical communication, a public discussion, and two quantum communications between each agent and the secret holder are needed rather than n classical communications, n public discussions, and 3n/2 quantum communications required in the original scheme.

  2. Getting something out of nothing in the measurement-device-independent quantum key distribution

    NASA Astrophysics Data System (ADS)

    Tan, Yong-Gang; Cai, Qing-Yu; Yang, Hai-Feng; Hu, Yao-Hua

    2015-11-01

    Because of the monogamy of entanglement, the measurement-device-independent quantum key distribution is immune to the side-information leaking of the measurement devices. When the correlated measurement outcomes are generated from the dark counts, no entanglement is actually obtained. However, secure key bits can still be proven to be generated from these measurement outcomes. Especially, we will give numerical studies on the contributions of dark counts to the key generation rate in practical decoy state MDI-QKD where a signal source, a weaker decoy source and a vacuum decoy source are used by either legitimate key distributer.

  3. Unconditional security of time-energy entanglement quantum key distribution using dual-basis interferometry.

    PubMed

    Zhang, Zheshen; Mower, Jacob; Englund, Dirk; Wong, Franco N C; Shapiro, Jeffrey H

    2014-03-28

    High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate with high photon-information efficiency. We consider HDQKD based on the time-energy entanglement produced by spontaneous parametric down-conversion and show that it is secure against collective attacks. Its security rests upon visibility data-obtained from Franson and conjugate-Franson interferometers-that probe photon-pair frequency correlations and arrival-time correlations. From these measurements, an upper bound can be established on the eavesdropper's Holevo information by translating the Gaussian-state security analysis for continuous-variable quantum key distribution so that it applies to our protocol. We show that visibility data from just the Franson interferometer provides a weaker, but nonetheless useful, secure-key rate lower bound. To handle multiple-pair emissions, we incorporate the decoy-state approach into our protocol. Our results show that over a 200-km transmission distance in optical fiber, time-energy entanglement HDQKD could permit a 700-bit/sec secure-key rate and a photon information efficiency of 2 secure-key bits per photon coincidence in the key-generation phase using receivers with a 15% system efficiency.

  4. Rapid Design of Knowledge-Based Scoring Potentials for Enrichment of Near-Native Geometries in Protein-Protein Docking.

    PubMed

    Sasse, Alexander; de Vries, Sjoerd J; Schindler, Christina E M; de Beauchêne, Isaure Chauvot; Zacharias, Martin

    2017-01-01

    Protein-protein docking protocols aim to predict the structures of protein-protein complexes based on the structure of individual partners. Docking protocols usually include several steps of sampling, clustering, refinement and re-scoring. The scoring step is one of the bottlenecks in the performance of many state-of-the-art protocols. The performance of scoring functions depends on the quality of the generated structures and its coupling to the sampling algorithm. A tool kit, GRADSCOPT (GRid Accelerated Directly SCoring OPTimizing), was designed to allow rapid development and optimization of different knowledge-based scoring potentials for specific objectives in protein-protein docking. Different atomistic and coarse-grained potentials can be created by a grid-accelerated directly scoring dependent Monte-Carlo annealing or by a linear regression optimization. We demonstrate that the scoring functions generated by our approach are similar to or even outperform state-of-the-art scoring functions for predicting near-native solutions. Of additional importance, we find that potentials specifically trained to identify the native bound complex perform rather poorly on identifying acceptable or medium quality (near-native) solutions. In contrast, atomistic long-range contact potentials can increase the average fraction of near-native poses by up to a factor 2.5 in the best scored 1% decoys (compared to existing scoring), emphasizing the need of specific docking potentials for different steps in the docking protocol.

  5. Trustworthiness of detectors in quantum key distribution with untrusted detectors

    DOE PAGES

    Qi, Bing

    2015-02-25

    Measurement-device-independent quantum key distribution (MDI-QKD) protocol has been demonstrated as a viable solution to detector side-channel attacks. One of the main advantages of MDI-QKD is that the security can be proved without making any assumptions about how the measurement device works. The price to pay is the relatively low secure key rate comparing with conventional quantum key distribution (QKD), such as the decoy-state BB84 protocol. Recently a new QKD protocol, aiming at bridging the strong security of MDI-QKD with the high e ciency of conventional QKD, has been proposed. In this protocol, the legitimate receiver employs a trusted linear opticsmore » network to encode information on photons received from an insecure quantum channel, and then performs a Bell state measurement (BSM) using untrusted detectors. One crucial assumption made in most of these studies is that the untrusted BSM located inside the receiver's laboratory cannot send any unwanted information to the outside. Here in this paper, we show that if the BSM is completely untrusted, a simple scheme would allow the BSM to send information to the outside. Combined with Trojan horse attacks, this scheme could allow Eve to gain information of the quantum key without being detected. Ultimately, to prevent the above attack, either countermeasures to Trojan horse attacks or some trustworthiness to the "untrusted" BSM device is required.« less

  6. Purely Structural Protein Scoring Functions Using Support Vector Machine and Ensemble Learning.

    PubMed

    Mirzaei, Shokoufeh; Sidi, Tomer; Keasar, Chen; Crivelli, Silvia

    2016-08-24

    The function of a protein is determined by its structure, which creates a need for efficient methods of protein structure determination to advance scientific and medical research. Because current experimental structure determination methods carry a high price tag, computational predictions are highly desirable. Given a protein sequence, computational methods produce numerous 3D structures known as decoys. However, selection of the best quality decoys is challenging as the end users can handle only a few ones. Therefore, scoring functions are central to decoy selection. They combine measurable features into a single number indicator of decoy quality. Unfortunately, current scoring functions do not consistently select the best decoys. Machine learning techniques offer great potential to improve decoy scoring. This paper presents two machine-learning based scoring functions to predict the quality of proteins structures, i.e., the similarity between the predicted structure and the experimental one without knowing the latter. We use different metrics to compare these scoring functions against three state-of-the-art scores. This is a first attempt at comparing different scoring functions using the same non-redundant dataset for training and testing and the same features. The results show that adding informative features may be more significant than the method used.

  7. Secure polarization-independent subcarrier quantum key distribution in optical fiber channel using BB84 protocol with a strong reference.

    PubMed

    Gleim, A V; Egorov, V I; Nazarov, Yu V; Smirnov, S V; Chistyakov, V V; Bannik, O I; Anisimov, A A; Kynev, S M; Ivanova, A E; Collins, R J; Kozlov, S A; Buller, G S

    2016-02-08

    A quantum key distribution system based on the subcarrier wave modulation method has been demonstrated which employs the BB84 protocol with a strong reference to generate secure bits at a rate of 16.5 kbit/s with an error of 0.5% over an optical channel of 10 dB loss, and 18 bits/s with an error of 0.75% over 25 dB of channel loss. To the best of our knowledge, these results represent the highest channel loss reported for secure quantum key distribution using the subcarrier wave approach. A passive unidirectional scheme has been used to compensate for the polarization dependence of the phase modulators in the receiver module, which resulted in a high visibility of 98.8%. The system is thus fully insensitive to polarization fluctuations and robust to environmental changes, making the approach promising for use in optical telecommunication networks. Further improvements in secure key rate and transmission distance can be achieved by implementing the decoy states protocol or by optimizing the mean photon number used in line with experimental parameters.

  8. Quantum key distribution with passive decoy state selection

    NASA Astrophysics Data System (ADS)

    Mauerer, Wolfgang; Silberhorn, Christine

    2007-05-01

    We propose a quantum key distribution scheme which closely matches the performance of a perfect single photon source. It nearly attains the physical upper bound in terms of key generation rate and maximally achievable distance. Our scheme relies on a practical setup based on a parametric downconversion source and present day, nonideal photon-number detection. Arbitrary experimental imperfections which lead to bit errors are included. We select decoy states by classical postprocessing. This allows one to improve the effective signal statistics and achievable distance.

  9. Hydrophobic potential of mean force as a solvation function for protein structure prediction.

    PubMed

    Lin, Matthew S; Fawzi, Nicolas Lux; Head-Gordon, Teresa

    2007-06-01

    We have developed a solvation function that combines a Generalized Born model for polarization of protein charge by the high dielectric solvent, with a hydrophobic potential of mean force (HPMF) as a model for hydrophobic interaction, to aid in the discrimination of native structures from other misfolded states in protein structure prediction. We find that our energy function outperforms other reported scoring functions in terms of correct native ranking for 91% of proteins and low Z scores for a variety of decoy sets, including the challenging Rosetta decoys. This work shows that the stabilizing effect of hydrophobic exposure to aqueous solvent that defines the HPMF hydration physics is an apparent improvement over solvent-accessible surface area models that penalize hydrophobic exposure. Decoys generated by thermal sampling around the native-state basin reveal a potentially important role for side-chain entropy in the future development of even more accurate free energy surfaces.

  10. Practical quantum key distribution protocol without monitoring signal disturbance.

    PubMed

    Sasaki, Toshihiko; Yamamoto, Yoshihisa; Koashi, Masato

    2014-05-22

    Quantum cryptography exploits the fundamental laws of quantum mechanics to provide a secure way to exchange private information. Such an exchange requires a common random bit sequence, called a key, to be shared secretly between the sender and the receiver. The basic idea behind quantum key distribution (QKD) has widely been understood as the property that any attempt to distinguish encoded quantum states causes a disturbance in the signal. As a result, implementation of a QKD protocol involves an estimation of the experimental parameters influenced by the eavesdropper's intervention, which is achieved by randomly sampling the signal. If the estimation of many parameters with high precision is required, the portion of the signal that is sacrificed increases, thus decreasing the efficiency of the protocol. Here we propose a QKD protocol based on an entirely different principle. The sender encodes a bit sequence onto non-orthogonal quantum states and the receiver randomly dictates how a single bit should be calculated from the sequence. The eavesdropper, who is unable to learn the whole of the sequence, cannot guess the bit value correctly. An achievable rate of secure key distribution is calculated by considering complementary choices between quantum measurements of two conjugate observables. We found that a practical implementation using a laser pulse train achieves a key rate comparable to a decoy-state QKD protocol, an often-used technique for lasers. It also has a better tolerance of bit errors and of finite-sized-key effects. We anticipate that this finding will give new insight into how the probabilistic nature of quantum mechanics can be related to secure communication, and will facilitate the simple and efficient use of conventional lasers for QKD.

  11. Experimental Measurement-Device-Independent Quantum Key Distribution

    NASA Astrophysics Data System (ADS)

    Liu, Yang; Chen, Teng-Yun; Wang, Liu-Jun; Liang, Hao; Shentu, Guo-Liang; Wang, Jian; Cui, Ke; Yin, Hua-Lei; Liu, Nai-Le; Li, Li; Ma, Xiongfeng; Pelc, Jason S.; Fejer, M. M.; Peng, Cheng-Zhi; Zhang, Qiang; Pan, Jian-Wei

    2013-09-01

    Quantum key distribution is proven to offer unconditional security in communication between two remote users with ideal source and detection. Unfortunately, ideal devices never exist in practice and device imperfections have become the targets of various attacks. By developing up-conversion single-photon detectors with high efficiency and low noise, we faithfully demonstrate the measurement-device-independent quantum-key-distribution protocol, which is immune to all hacking strategies on detection. Meanwhile, we employ the decoy-state method to defend attacks on a nonideal source. By assuming a trusted source scenario, our practical system, which generates more than a 25 kbit secure key over a 50 km fiber link, serves as a stepping stone in the quest for unconditionally secure communications with realistic devices.

  12. Experimental measurement-device-independent quantum key distribution.

    PubMed

    Liu, Yang; Chen, Teng-Yun; Wang, Liu-Jun; Liang, Hao; Shentu, Guo-Liang; Wang, Jian; Cui, Ke; Yin, Hua-Lei; Liu, Nai-Le; Li, Li; Ma, Xiongfeng; Pelc, Jason S; Fejer, M M; Peng, Cheng-Zhi; Zhang, Qiang; Pan, Jian-Wei

    2013-09-27

    Quantum key distribution is proven to offer unconditional security in communication between two remote users with ideal source and detection. Unfortunately, ideal devices never exist in practice and device imperfections have become the targets of various attacks. By developing up-conversion single-photon detectors with high efficiency and low noise, we faithfully demonstrate the measurement-device-independent quantum-key-distribution protocol, which is immune to all hacking strategies on detection. Meanwhile, we employ the decoy-state method to defend attacks on a nonideal source. By assuming a trusted source scenario, our practical system, which generates more than a 25 kbit secure key over a 50 km fiber link, serves as a stepping stone in the quest for unconditionally secure communications with realistic devices.

  13. Quantum key distribution with entangled photon sources

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ma Xiongfeng; Fung, Chi-Hang Fred; Lo, H.-K.

    2007-07-15

    A parametric down-conversion (PDC) source can be used as either a triggered single-photon source or an entangled-photon source in quantum key distribution (QKD). The triggering PDC QKD has already been studied in the literature. On the other hand, a model and a post-processing protocol for the entanglement PDC QKD are still missing. We fill in this important gap by proposing such a model and a post-processing protocol for the entanglement PDC QKD. Although the PDC model is proposed to study the entanglement-based QKD, we emphasize that our generic model may also be useful for other non-QKD experiments involving a PDCmore » source. Since an entangled PDC source is a basis-independent source, we apply Koashi and Preskill's security analysis to the entanglement PDC QKD. We also investigate the entanglement PDC QKD with two-way classical communications. We find that the recurrence scheme increases the key rate and the Gottesman-Lo protocol helps tolerate higher channel losses. By simulating a recent 144-km open-air PDC experiment, we compare three implementations: entanglement PDC QKD, triggering PDC QKD, and coherent-state QKD. The simulation result suggests that the entanglement PDC QKD can tolerate higher channel losses than the coherent-state QKD. The coherent-state QKD with decoy states is able to achieve highest key rate in the low- and medium-loss regions. By applying the Gottesman-Lo two-way post-processing protocol, the entanglement PDC QKD can tolerate up to 70 dB combined channel losses (35 dB for each channel) provided that the PDC source is placed in between Alice and Bob. After considering statistical fluctuations, the PDC setup can tolerate up to 53 dB channel losses.« less

  14. Attacks exploiting deviation of mean photon number in quantum key distribution and coin tossing

    NASA Astrophysics Data System (ADS)

    Sajeed, Shihan; Radchenko, Igor; Kaiser, Sarah; Bourgoin, Jean-Philippe; Pappa, Anna; Monat, Laurent; Legré, Matthieu; Makarov, Vadim

    2015-03-01

    The security of quantum communication using a weak coherent source requires an accurate knowledge of the source's mean photon number. Finite calibration precision or an active manipulation by an attacker may cause the actual emitted photon number to deviate from the known value. We model effects of this deviation on the security of three quantum communication protocols: the Bennett-Brassard 1984 (BB84) quantum key distribution (QKD) protocol without decoy states, Scarani-Acín-Ribordy-Gisin 2004 (SARG04) QKD protocol, and a coin-tossing protocol. For QKD we model both a strong attack using technology possible in principle and a realistic attack bounded by today's technology. To maintain the mean photon number in two-way systems, such as plug-and-play and relativistic quantum cryptography schemes, bright pulse energy incoming from the communication channel must be monitored. Implementation of a monitoring detector has largely been ignored so far, except for ID Quantique's commercial QKD system Clavis2. We scrutinize this implementation for security problems and show that designing a hack-proof pulse-energy-measuring detector is far from trivial. Indeed, the first implementation has three serious flaws confirmed experimentally, each of which may be exploited in a cleverly constructed Trojan-horse attack. We discuss requirements for a loophole-free implementation of the monitoring detector.

  15. Finite-key security analysis of quantum key distribution with imperfect light sources

    DOE PAGES

    Mizutani, Akihiro; Curty, Marcos; Lim, Charles Ci Wen; ...

    2015-09-09

    In recent years, the gap between theory and practice in quantum key distribution (QKD) has been significantly narrowed, particularly for QKD systems with arbitrarily flawed optical receivers. The status for QKD systems with imperfect light sources is however less satisfactory, in the sense that the resulting secure key rates are often overly dependent on the quality of state preparation. This is especially the case when the channel loss is high. Very recently, to overcome this limitation, Tamaki et al proposed a QKD protocol based on the so-called 'rejected data analysis', and showed that its security in the limit of infinitelymore » long keys is almost independent of any encoding flaw in the qubit space, being this protocol compatible with the decoy state method. Here, as a step towards practical QKD, we show that a similar conclusion is reached in the finite-key regime, even when the intensity of the light source is unstable. More concretely, we derive security bounds for a wide class of realistic light sources and show that the bounds are also efficient in the presence of high channel loss. Our results strongly suggest the feasibility of long distance provably secure communication with imperfect light sources.« less

  16. A decoy chain deployment method based on SDN and NFV against penetration attack

    PubMed Central

    Zhao, Qi; Zhang, Chuanhao

    2017-01-01

    Penetration attacks are one of the most serious network security threats. However, existing network defense technologies do not have the ability to entirely block the penetration behavior of intruders. Therefore, the network needs additional defenses. In this paper, a decoy chain deployment (DCD) method based on SDN+NFV is proposed to address this problem. This method considers about the security status of networks, and deploys decoy chains with the resource constraints. DCD changes the attack surface of the network and makes it difficult for intruders to discern the current state of the network. Simulation experiments and analyses show that DCD can effectively resist penetration attacks by increasing the time cost and complexity of a penetration attack. PMID:29216257

  17. A decoy chain deployment method based on SDN and NFV against penetration attack.

    PubMed

    Zhao, Qi; Zhang, Chuanhao; Zhao, Zheng

    2017-01-01

    Penetration attacks are one of the most serious network security threats. However, existing network defense technologies do not have the ability to entirely block the penetration behavior of intruders. Therefore, the network needs additional defenses. In this paper, a decoy chain deployment (DCD) method based on SDN+NFV is proposed to address this problem. This method considers about the security status of networks, and deploys decoy chains with the resource constraints. DCD changes the attack surface of the network and makes it difficult for intruders to discern the current state of the network. Simulation experiments and analyses show that DCD can effectively resist penetration attacks by increasing the time cost and complexity of a penetration attack.

  18. DecoyFinder: an easy-to-use python GUI application for building target-specific decoy sets.

    PubMed

    Cereto-Massagué, Adrià; Guasch, Laura; Valls, Cristina; Mulero, Miquel; Pujadas, Gerard; Garcia-Vallvé, Santiago

    2012-06-15

    Decoys are molecules that are presumed to be inactive against a target (i.e. will not likely bind to the target) and are used to validate the performance of molecular docking or a virtual screening workflow. The Directory of Useful Decoys database (http://dud.docking.org/) provides a free directory of decoys for use in virtual screening, though it only contains a limited set of decoys for 40 targets.To overcome this limitation, we have developed an application called DecoyFinder that selects, for a given collection of active ligands of a target, a set of decoys from a database of compounds. Decoys are selected if they are similar to active ligands according to five physical descriptors (molecular weight, number of rotational bonds, total hydrogen bond donors, total hydrogen bond acceptors and the octanol-water partition coefficient) without being chemically similar to any of the active ligands used as an input (according to the Tanimoto coefficient between MACCS fingerprints). To the best of our knowledge, DecoyFinder is the first application designed to build target-specific decoy sets. A complete description of the software is included on the application home page. A validation of DecoyFinder on 10 DUD targets is provided as Supplementary Table S1. DecoyFinder is freely available at http://URVnutrigenomica-CTNS.github.com/DecoyFinder.

  19. RADER: a RApid DEcoy Retriever to facilitate decoy based assessment of virtual screening.

    PubMed

    Wang, Ling; Pang, Xiaoqian; Li, Yecheng; Zhang, Ziying; Tan, Wen

    2017-04-15

    Evaluation of the capacity for separating actives from challenging decoys is a crucial metric of performance related to molecular docking or a virtual screening workflow. The Directory of Useful Decoys (DUD) and its enhanced version (DUD-E) provide a benchmark for molecular docking, although they only contain a limited set of decoys for limited targets. DecoyFinder was released to compensate the limitations of DUD or DUD-E for building target-specific decoy sets. However, desirable query template design, generation of multiple decoy sets of similar quality, and computational speed remain bottlenecks, particularly when the numbers of queried actives and retrieved decoys increases to hundreds or more. Here, we developed a program suite called RApid DEcoy Retriever (RADER) to facilitate the decoy-based assessment of virtual screening. This program adopts a novel database-management regime that supports rapid and large-scale retrieval of decoys, enables high portability of databases, and provides multifaceted options for designing initial query templates from a large number of active ligands and generating subtle decoy sets. RADER provides two operational modes: as a command-line tool and on a web server. Validation of the performance and efficiency of RADER was also conducted and is described. RADER web server and a local version are freely available at http://rcidm.org/rader/ . lingwang@scut.edu.cn or went@scut.edu.cn . Supplementary data are available at Bioinformatics online. © The Author 2017. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com

  20. Secure satellite communication using multi-photon tolerant quantum communication protocol

    NASA Astrophysics Data System (ADS)

    Darunkar, Bhagyashri; Punekar, Nikhil; Verma, Pramode K.

    2015-09-01

    This paper proposes and analyzes the potential of a multi-photon tolerant quantum communication protocol to secure satellite communication. For securing satellite communication, quantum cryptography is the only known unconditionally secure method. A number of recent experiments have shown feasibility of satellite-aided global quantum key distribution (QKD) using different methods such as: Use of entangled photon pairs, decoy state methods, and entanglement swapping. The use of single photon in these methods restricts the distance and speed over which quantum cryptography can be applied. Contemporary quantum cryptography protocols like the BB84 and its variants suffer from the limitation of reaching the distances of only Low Earth Orbit (LEO) at the data rates of few kilobits per second. This makes it impossible to develop a general satellite-based secure global communication network using the existing protocols. The method proposed in this paper allows secure communication at the heights of the Medium Earth Orbit (MEO) and Geosynchronous Earth Orbit (GEO) satellites. The benefits of the proposed method are two-fold: First it enables the realization of a secure global communication network based on satellites and second it provides unconditional security for satellite networks at GEO heights. The multi-photon approach discussed in this paper ameliorates the distance and speed issues associated with quantum cryptography through the use of contemporary laser communication (lasercom) devices. This approach can be seen as a step ahead towards global quantum communication.

  1. Spectrum-based method to generate good decoy libraries for spectral library searching in peptide identifications.

    PubMed

    Cheng, Chia-Ying; Tsai, Chia-Feng; Chen, Yu-Ju; Sung, Ting-Yi; Hsu, Wen-Lian

    2013-05-03

    As spectral library searching has received increasing attention for peptide identification, constructing good decoy spectra from the target spectra is the key to correctly estimating the false discovery rate in searching against the concatenated target-decoy spectral library. Several methods have been proposed to construct decoy spectral libraries. Most of them construct decoy peptide sequences and then generate theoretical spectra accordingly. In this paper, we propose a method, called precursor-swap, which directly constructs decoy spectral libraries directly at the "spectrum level" without generating decoy peptide sequences by swapping the precursors of two spectra selected according to a very simple rule. Our spectrum-based method does not require additional efforts to deal with ion types (e.g., a, b or c ions), fragment mechanism (e.g., CID, or ETD), or unannotated peaks, but preserves many spectral properties. The precursor-swap method is evaluated on different spectral libraries and the results of obtained decoy ratios show that it is comparable to other methods. Notably, it is efficient in time and memory usage for constructing decoy libraries. A software tool called Precursor-Swap-Decoy-Generation (PSDG) is publicly available for download at http://ms.iis.sinica.edu.tw/PSDG/.

  2. Prefixed-threshold real-time selection method in free-space quantum key distribution

    NASA Astrophysics Data System (ADS)

    Wang, Wenyuan; Xu, Feihu; Lo, Hoi-Kwong

    2018-03-01

    Free-space quantum key distribution allows two parties to share a random key with unconditional security, between ground stations, between mobile platforms, and even in satellite-ground quantum communications. Atmospheric turbulence causes fluctuations in transmittance, which further affect the quantum bit error rate and the secure key rate. Previous postselection methods to combat atmospheric turbulence require a threshold value determined after all quantum transmission. In contrast, here we propose a method where we predetermine the optimal threshold value even before quantum transmission. Therefore, the receiver can discard useless data immediately, thus greatly reducing data storage requirements and computing resources. Furthermore, our method can be applied to a variety of protocols, including, for example, not only single-photon BB84 but also asymptotic and finite-size decoy-state BB84, which can greatly increase its practicality.

  3. How to benchmark methods for structure-based virtual screening of large compound libraries.

    PubMed

    Christofferson, Andrew J; Huang, Niu

    2012-01-01

    Structure-based virtual screening is a useful computational technique for ligand discovery. To systematically evaluate different docking approaches, it is important to have a consistent benchmarking protocol that is both relevant and unbiased. Here, we describe the designing of a benchmarking data set for docking screen assessment, a standard docking screening process, and the analysis and presentation of the enrichment of annotated ligands among a background decoy database.

  4. Using decoy effects to influence an online brand choice: the role of price-quality trade-offs.

    PubMed

    Hsu, Huei-Chen; Liu, Wen-Liang

    2011-04-01

    This research aims to investigate decoy effects on online brand choices. To assess the influence of decoys, we test decoy effects on three constructs-product involvement, judgment conditions, and decoy conditions-within an online experiment. A survey of 635 Internet users and a 2 × 2 × 3 ANOVA between-subjects experimental design is used to guide the research design and the systematic analysis procedure. A major finding of this study is that a standard decoy seems to have a significant effect on an advertised (target) brand for high-involvement products; from the survey, it is also apparent that competitors can also use inferior decoys to increase brand preference for low-involvement products.

  5. Development of novel decoy oligonucleotides: advantages of circular dumb-bell decoy.

    PubMed

    Tomita, Naruya; Tomita, Tetsuya; Yuyama, Kazuhiko; Tougan, Takahiro; Tajima, Tsuyoshi; Ogihara, Toshio; Morishita, Ryuichi

    2003-04-01

    The inhibition of specific transcription regulatory proteins is a novel approach to regulate gene expression. The transcriptional activities of DNA binding proteins can be inhibited by the use of double-stranded oligonucleotides (ODNs) that compete for binding to their specific target sequences in promoters and enhancers. Transfection of this cis-element double-stranded ODN, referred to as decoy ODN, has been reported to be a powerful tool that provides a new class of anti-gene strategies to gene therapy and permits examination of specific gene regulation. We have demonstrated the usefulness of this decoy ODN strategy in animal models of restenosis, myocardial infarction, glomerulonephritis and rheumatoid arthritis. However, one of the major limitations of decoy ODN technology is the rapid degradation of phosphodiester ODNs by intracellular nucleases. To date, several different types of double-stranded decoy ODNs have been developed to overcome this issue. Circular dumb-bell (CD) double-stranded decoy ODNs that were developed to resolve this issue have attracted a high level of interest. In this review, the applications of decoy ODN strategy and the advantages of modified CD double-stranded decoy ODNs will be discussed.

  6. Protein Loop Structure Prediction Using Conformational Space Annealing.

    PubMed

    Heo, Seungryong; Lee, Juyong; Joo, Keehyoung; Shin, Hang-Cheol; Lee, Jooyoung

    2017-05-22

    We have developed a protein loop structure prediction method by combining a new energy function, which we call E PLM (energy for protein loop modeling), with the conformational space annealing (CSA) global optimization algorithm. The energy function includes stereochemistry, dynamic fragment assembly, distance-scaled finite ideal gas reference (DFIRE), and generalized orientation- and distance-dependent terms. For the conformational search of loop structures, we used the CSA algorithm, which has been quite successful in dealing with various hard global optimization problems. We assessed the performance of E PLM with two widely used loop-decoy sets, Jacobson and RAPPER, and compared the results against the DFIRE potential. The accuracy of model selection from a pool of loop decoys as well as de novo loop modeling starting from randomly generated structures was examined separately. For the selection of a nativelike structure from a decoy set, E PLM was more accurate than DFIRE in the case of the Jacobson set and had similar accuracy in the case of the RAPPER set. In terms of sampling more nativelike loop structures, E PLM outperformed E DFIRE for both decoy sets. This new approach equipped with E PLM and CSA can serve as the state-of-the-art de novo loop modeling method.

  7. Directory of Useful Decoys, Enhanced (DUD-E): Better Ligands and Decoys for Better Benchmarking

    PubMed Central

    2012-01-01

    A key metric to assess molecular docking remains ligand enrichment against challenging decoys. Whereas the directory of useful decoys (DUD) has been widely used, clear areas for optimization have emerged. Here we describe an improved benchmarking set that includes more diverse targets such as GPCRs and ion channels, totaling 102 proteins with 22886 clustered ligands drawn from ChEMBL, each with 50 property-matched decoys drawn from ZINC. To ensure chemotype diversity, we cluster each target’s ligands by their Bemis–Murcko atomic frameworks. We add net charge to the matched physicochemical properties and include only the most dissimilar decoys, by topology, from the ligands. An online automated tool (http://decoys.docking.org) generates these improved matched decoys for user-supplied ligands. We test this data set by docking all 102 targets, using the results to improve the balance between ligand desolvation and electrostatics in DOCK 3.6. The complete DUD-E benchmarking set is freely available at http://dude.docking.org. PMID:22716043

  8. Role of decoy molecules in neuronal ischemic preconditioning

    PubMed Central

    Panneerselvam, Mathivadhani; Patel, Piyush M.; Roth, David M.; Kidd, Michael W.; Chin-Lee, Blake; Head, Brian P.; Niesman, Ingrid R.; Inoue, Satoki; Patel, Hemal H.; Davis, Daniel P.

    2011-01-01

    Decoy receptors bind with TNF related apoptosis inducing ligands (TRAIL) but do not contain the cytoplasmic domains necessary to transduce apoptotic signals. We hypothesized that decoy receptors may confer neuronal protection against lethal ischemia after ischemic preconditioning (IPC). Mixed cortical neurons were exposed to IPC one day prior to TRAIL treatment or lethal ischemia. IPC increased decoy receptor but reduced death receptor expression compared to lethal ischemia. IPC-induced increase in decoy receptor expression was reduced by prior treatment with CAPE, a nuclear factor-kappa B inhibitor (NFκB). Expression of decoy molecules, dependent on NFκB, may mediate neuronal survival induced by IPC. PMID:21315738

  9. CyClus: a fast, comprehensive cylindrical interface approximation clustering/reranking method for rigid-body protein-protein docking decoys.

    PubMed

    Omori, Satoshi; Kitao, Akio

    2013-06-01

    We propose a fast clustering and reranking method, CyClus, for protein-protein docking decoys. This method enables comprehensive clustering of whole decoys generated by rigid-body docking using cylindrical approximation of the protein-proteininterface and hierarchical clustering procedures. We demonstrate the clustering and reranking of 54,000 decoy structures generated by ZDOCK for each complex within a few minutes. After parameter tuning for the test set in ZDOCK benchmark 2.0 with the ZDOCK and ZRANK scoring functions, blind tests for the incremental data in ZDOCK benchmark 3.0 and 4.0 were conducted. CyClus successfully generated smaller subsets of decoys containing near-native decoys. For example, the number of decoys required to create subsets containing near-native decoys with 80% probability was reduced from 22% to 50% of the number required in the original ZDOCK. Although specific ZDOCK and ZRANK results were demonstrated, the CyClus algorithm was designed to be more general and can be applied to a wide range of decoys and scoring functions by adjusting just two parameters, p and T. CyClus results were also compared to those from ClusPro. Copyright © 2013 Wiley Periodicals, Inc.

  10. Experimental quantum key distribution with source flaws

    NASA Astrophysics Data System (ADS)

    Xu, Feihu; Wei, Kejin; Sajeed, Shihan; Kaiser, Sarah; Sun, Shihai; Tang, Zhiyuan; Qian, Li; Makarov, Vadim; Lo, Hoi-Kwong

    2015-09-01

    Decoy-state quantum key distribution (QKD) is a standard technique in current quantum cryptographic implementations. Unfortunately, existing experiments have two important drawbacks: the state preparation is assumed to be perfect without errors and the employed security proofs do not fully consider the finite-key effects for general attacks. These two drawbacks mean that existing experiments are not guaranteed to be proven to be secure in practice. Here, we perform an experiment that shows secure QKD with imperfect state preparations over long distances and achieves rigorous finite-key security bounds for decoy-state QKD against coherent attacks in the universally composable framework. We quantify the source flaws experimentally and demonstrate a QKD implementation that is tolerant to channel loss despite the source flaws. Our implementation considers more real-world problems than most previous experiments, and our theory can be applied to general discrete-variable QKD systems. These features constitute a step towards secure QKD with imperfect devices.

  11. An improved method to detect correct protein folds using partial clustering.

    PubMed

    Zhou, Jianjun; Wishart, David S

    2013-01-16

    Structure-based clustering is commonly used to identify correct protein folds among candidate folds (also called decoys) generated by protein structure prediction programs. However, traditional clustering methods exhibit a poor runtime performance on large decoy sets. We hypothesized that a more efficient "partial" clustering approach in combination with an improved scoring scheme could significantly improve both the speed and performance of existing candidate selection methods. We propose a new scheme that performs rapid but incomplete clustering on protein decoys. Our method detects structurally similar decoys (measured using either C(α) RMSD or GDT-TS score) and extracts representatives from them without assigning every decoy to a cluster. We integrated our new clustering strategy with several different scoring functions to assess both the performance and speed in identifying correct or near-correct folds. Experimental results on 35 Rosetta decoy sets and 40 I-TASSER decoy sets show that our method can improve the correct fold detection rate as assessed by two different quality criteria. This improvement is significantly better than two recently published clustering methods, Durandal and Calibur-lite. Speed and efficiency testing shows that our method can handle much larger decoy sets and is up to 22 times faster than Durandal and Calibur-lite. The new method, named HS-Forest, avoids the computationally expensive task of clustering every decoy, yet still allows superior correct-fold selection. Its improved speed, efficiency and decoy-selection performance should enable structure prediction researchers to work with larger decoy sets and significantly improve their ab initio structure prediction performance.

  12. Prevention of Asthma Exacerbation in a Mouse Model by Simultaneous Inhibition of NF-κB and STAT6 Activation Using a Chimeric Decoy Strategy.

    PubMed

    Miyake, Tetsuo; Miyake, Takashi; Sakaguchi, Makoto; Nankai, Hirokazu; Nakazawa, Takahiro; Morishita, Ryuichi

    2018-03-02

    Transactivation of inflammatory and immune mediators in asthma is tightly regulated by nuclear factor κB (NF-κB) and signal transducer and activator of transcription 6 (STAT6). Therefore, we investigated the efficacy of simultaneous inhibition of NF-κB and STAT6 using a chimeric decoy strategy to prevent asthma exacerbation. The effects of decoy oligodeoxynucleotides were evaluated using an ovalbumin-induced mouse asthma model. Ovalbumin-sensitized mice received intratracheal administration of decoy oligodeoxynucleotides 3 days before ovalbumin challenge. Fluorescent-dye-labeled decoy oligodeoxynucleotides could be detected in lymphocytes and macrophages in the lung, and activation of NF-κB and STAT6 was inhibited by chimeric decoy oligodeoxynucleotide transfer. Consequently, treatment with chimeric or NF-κB decoy oligodeoxynucleotides protected against methacholine-induced airway hyperresponsiveness, whereas the effect of chimeric decoy oligodeoxynucleotides was significantly greater than that of NF-κB decoy oligodeoxynucleotides. Treatment with chimeric decoy oligodeoxynucleotides suppressed airway inflammation through inhibition of overexpression of interleukin-4 (IL-4), IL-5, and IL-13 and inflammatory infiltrates. Histamine levels in the lung were reduced via suppression of mast cell accumulation. A significant reduction in mucin secretion was observed due to suppression of MUC5AC gene expression. Interestingly, the inhibitory effects on IL-5, IL-13, and histamine secretion were achieved by transfer of chimeric decoy oligodeoxynucleotides only. This novel therapeutic approach could be useful to treat patients with various types of asthma. Copyright © 2017 The Authors. Published by Elsevier Inc. All rights reserved.

  13. An improved method to detect correct protein folds using partial clustering

    PubMed Central

    2013-01-01

    Background Structure-based clustering is commonly used to identify correct protein folds among candidate folds (also called decoys) generated by protein structure prediction programs. However, traditional clustering methods exhibit a poor runtime performance on large decoy sets. We hypothesized that a more efficient “partial“ clustering approach in combination with an improved scoring scheme could significantly improve both the speed and performance of existing candidate selection methods. Results We propose a new scheme that performs rapid but incomplete clustering on protein decoys. Our method detects structurally similar decoys (measured using either Cα RMSD or GDT-TS score) and extracts representatives from them without assigning every decoy to a cluster. We integrated our new clustering strategy with several different scoring functions to assess both the performance and speed in identifying correct or near-correct folds. Experimental results on 35 Rosetta decoy sets and 40 I-TASSER decoy sets show that our method can improve the correct fold detection rate as assessed by two different quality criteria. This improvement is significantly better than two recently published clustering methods, Durandal and Calibur-lite. Speed and efficiency testing shows that our method can handle much larger decoy sets and is up to 22 times faster than Durandal and Calibur-lite. Conclusions The new method, named HS-Forest, avoids the computationally expensive task of clustering every decoy, yet still allows superior correct-fold selection. Its improved speed, efficiency and decoy-selection performance should enable structure prediction researchers to work with larger decoy sets and significantly improve their ab initio structure prediction performance. PMID:23323835

  14. Seaworthy Quantum Key Distribution Design and Validation (SEAKEY)

    DTIC Science & Technology

    2014-07-25

    link in a free- space channel through a marine environment (such as loss, noise and turbulence) and (2) parametrically calculating the secret key rate...width. Parametric calculations of the expected secret key rate As can be seen in Figure 6, the secret key rate of the BB84 protocol in the presence...Figure 9 shows the effect of various detriments on the secret -kay rate, for laser-decoy BB84. Figure 9: Effects of detriments on secret-key rate

  15. Constructing Cost-Effective and Targetable ICS Honeypots Suited for Production Networks

    DTIC Science & Technology

    2015-03-26

    introducing Honeyd+ has a marginal impact on performance. Notable findings are that the Raspberry Pi is the preferred hosting platform for the EtherNet/IP... Raspberry Pi or Gumstix, which is a low-cost approach to replicating multiple decoys. One hidden drawback to low- interaction honeypots is the extensive time...EtherNet/IP industrial protocol. Honeyd+ is hosted on a low-cost computing platform ( Raspberry Pi running Raspbian, approximately $50) and a high-cost

  16. Hacking on decoy-state quantum key distribution system with partial phase randomization

    NASA Astrophysics Data System (ADS)

    Sun, Shi-Hai; Jiang, Mu-Sheng; Ma, Xiang-Chun; Li, Chun-Yan; Liang, Lin-Mei

    2014-04-01

    Quantum key distribution (QKD) provides means for unconditional secure key transmission between two distant parties. However, in practical implementations, it suffers from quantum hacking due to device imperfections. Here we propose a hybrid measurement attack, with only linear optics, homodyne detection, and single photon detection, to the widely used vacuum + weak decoy state QKD system when the phase of source is partially randomized. Our analysis shows that, in some parameter regimes, the proposed attack would result in an entanglement breaking channel but still be able to trick the legitimate users to believe they have transmitted secure keys. That is, the eavesdropper is able to steal all the key information without discovered by the users. Thus, our proposal reveals that partial phase randomization is not sufficient to guarantee the security of phase-encoding QKD systems with weak coherent states.

  17. Hacking on decoy-state quantum key distribution system with partial phase randomization.

    PubMed

    Sun, Shi-Hai; Jiang, Mu-Sheng; Ma, Xiang-Chun; Li, Chun-Yan; Liang, Lin-Mei

    2014-04-23

    Quantum key distribution (QKD) provides means for unconditional secure key transmission between two distant parties. However, in practical implementations, it suffers from quantum hacking due to device imperfections. Here we propose a hybrid measurement attack, with only linear optics, homodyne detection, and single photon detection, to the widely used vacuum + weak decoy state QKD system when the phase of source is partially randomized. Our analysis shows that, in some parameter regimes, the proposed attack would result in an entanglement breaking channel but still be able to trick the legitimate users to believe they have transmitted secure keys. That is, the eavesdropper is able to steal all the key information without discovered by the users. Thus, our proposal reveals that partial phase randomization is not sufficient to guarantee the security of phase-encoding QKD systems with weak coherent states.

  18. Amelioration of collagen-induced arthritis using antigen-loaded dendritic cells modified with NF-κB decoy oligodeoxynucleotides

    PubMed Central

    Jiang, Hongmei; Hu, Henggui; Zhang, Yali; Yue, Ping; Ning, Lichang; Zhou, Yan; Shi, Ping; Yuan, Rui

    2017-01-01

    Dendritic cells (DCs) play an important role in the initiation of autoimmunity in rheumatoid arthritis (RA); therefore, the use of DCs needs to be explored to develop new therapeutic approaches for RA. Here, we investigated the therapeutic effect of bovine type II collagen (BIIC)-loaded DCs modified with NF-κB decoy oligodeoxynucleotides (ODNs) on collagen-induced arthritis (CIA) in rats and explored the underlying mechanisms. DCs treated with BIIC and NF-κB decoy ODNs exhibited features of immature DCs with low levels of costimulatory molecule (CD80 and CD86) expression. The development of arthritis in rats with CIA injected with BIIC + NF-κB decoy ODN-propagated DCs (BIIC–decoy DCs) was significantly ameliorated compared to that in rats injected with BIIC-propagated DCs or phosphate-buffered saline. We also found that the BIIC–decoy DCs exerted antiarthritis effects by inhibiting self-lymphocyte proliferative response and suppressing IFN-γ and anti-BIIC antibody production and inducing IL-10 antibody production. Additionally, antihuman serum antibodies were successfully produced in the rats treated with BIIC–decoy DCs but not in those treated with NF-κB decoy ODN-propagated DCs; moreover, the BIIC–decoy DCs did not affect immune function in the normal rats. These findings suggested that NF-κB decoy ODN-modified DCs loaded with a specific antigen might offer a practical method for the treatment of human RA. PMID:29075103

  19. Decoy Oligonucleotide Rescues IGF1R Expression from MicroRNA-223 Suppression

    PubMed Central

    Wang, Rong; He, Bao Mei; Qi, Bing; Xu, Chang Jun; Wu, Xing Zhong

    2013-01-01

    A mature miRNA generally suppresses hundreds of mRNA targets. To evaluate the selective effect of synthetic oligonucleotide decoys on hsa-miR-223 activity, reporters containing 3’ untranslated regions (UTR) of IGF1R, FOXO1, POLR3G, FOXO3, CDC27, FBXW7 and PAXIP1 mRNAs were constructed for the luciferase assay. The oligonucleotide decoys were designed and synthesized according to mature miR-223 sequence and its target mRNA sequence. Quantitative RT-PCR & western analysis were used to measure miR-223-targeted mRNA expression, Interestingly, apart from the antisense oligonucleotide, decoy nucleotides which were complementary to the 5’, central or 3’ region of mature miR-223 suppressed miR-223 targeting the 3’UTR of IGF1R, FOXO1, FOXO3, CDC27, POLR3G, and FBXW7 mRNAs and rescued the expression of these genes to varying degrees from miR-223 suppression at both mRNA and protein levels. All decoys had no effect on PAXIP1 which was not targeted by miR-223. The decoy 1 that was based on the sequence of IGF1R 3’UTR rescued the expression of IGF1R more significantly than other decoy nucleotides except the antisense decoy 4. Decoy 1 also rescued the expression of FOXO3 and POLR3G of which their 3’UTRs have similar binding sites for miR-223 with IGF1R 3’UTR. However decoy 1 failed to recover Sp1, CDC27 and FBXW7 expression. These data support that the sequence-specific decoy oligonucleotides might represent exogenous competing RNA which selectively inhibits microRNA targeting. PMID:24324762

  20. Decoy oligonucleotide rescues IGF1R expression from MicroRNA-223 suppression.

    PubMed

    Wu, Li Hui; Cai, Qian Qian; Dong, Yi Wei; Wang, Rong; He, Bao Mei; Qi, Bing; Xu, Chang Jun; Wu, Xing Zhong

    2013-01-01

    A mature miRNA generally suppresses hundreds of mRNA targets. To evaluate the selective effect of synthetic oligonucleotide decoys on hsa-miR-223 activity, reporters containing 3' untranslated regions (UTR) of IGF1R, FOXO1, POLR3G, FOXO3, CDC27, FBXW7 and PAXIP1 mRNAs were constructed for the luciferase assay. The oligonucleotide decoys were designed and synthesized according to mature miR-223 sequence and its target mRNA sequence. Quantitative RT-PCR & western analysis were used to measure miR-223-targeted mRNA expression, Interestingly, apart from the antisense oligonucleotide, decoy nucleotides which were complementary to the 5', central or 3' region of mature miR-223 suppressed miR-223 targeting the 3'UTR of IGF1R, FOXO1, FOXO3, CDC27, POLR3G, and FBXW7 mRNAs and rescued the expression of these genes to varying degrees from miR-223 suppression at both mRNA and protein levels. All decoys had no effect on PAXIP1 which was not targeted by miR-223. The decoy 1 that was based on the sequence of IGF1R 3'UTR rescued the expression of IGF1R more significantly than other decoy nucleotides except the antisense decoy 4. Decoy 1 also rescued the expression of FOXO3 and POLR3G of which their 3'UTRs have similar binding sites for miR-223 with IGF1R 3'UTR. However decoy 1 failed to recover Sp1, CDC27 and FBXW7 expression. These data support that the sequence-specific decoy oligonucleotides might represent exogenous competing RNA which selectively inhibits microRNA targeting.

  1. Effectiveness Evaluation Method of Anti-Radiation Missile against Active Decoy

    NASA Astrophysics Data System (ADS)

    Tang, Junyao; Cao, Fei; Li, Sijia

    2017-06-01

    In the problem of anti-radiation missile against active decoy, whether the ARM can effectively kill the target radiation source and bait is an important index for evaluating the operational effectiveness of the missile. Aiming at this problem, this paper proposes a method to evaluate the effect of ARM against active decoy. Based on the calculation of ARM’s ability to resist the decoy, the paper proposes a method to evaluate the decoy resistance based on the key components of the hitting radar. The method has the advantages of scientific and reliability.

  2. Metropolitan all-pass and inter-city quantum communication network.

    PubMed

    Chen, Teng-Yun; Wang, Jian; Liang, Hao; Liu, Wei-Yue; Liu, Yang; Jiang, Xiao; Wang, Yuan; Wan, Xu; Cai, Wei-Qi; Ju, Lei; Chen, Luo-Kan; Wang, Liu-Jun; Gao, Yuan; Chen, Kai; Peng, Cheng-Zhi; Chen, Zeng-Bing; Pan, Jian-Wei

    2010-12-20

    We have demonstrated a metropolitan all-pass quantum communication network in field fiber for four nodes. Any two nodes of them can be connected in the network to perform quantum key distribution (QKD). An optical switching module is presented that enables arbitrary 2-connectivity among output ports. Integrated QKD terminals are worked out, which can operate either as a transmitter, a receiver, or even both at the same time. Furthermore, an additional link in another city of 60 km fiber (up to 130 km) is seamless integrated into this network based on a trusted relay architecture. On all the links, we have implemented protocol of decoy state scheme. All of necessary electrical hardware, synchronization, feedback control, network software, execution of QKD protocols are made by tailored designing, which allow a completely automatical and stable running. Our system has been put into operation in Hefei in August 2009, and publicly demonstrated during an evaluation conference on quantum network organized by the Chinese Academy of Sciences on August 29, 2009. Real-time voice telephone with one-time pad encoding between any two of the five nodes (four all-pass nodes plus one additional node through relay) is successfully established in the network within 60 km.

  3. Heparin octasaccharide decoy liposomes inhibit replication of multiple viruses

    PubMed Central

    Hendricks, Gabriel L.; Velazquez, Lourdes; Pham, Serena; Qaisar, Natasha; Delaney, James C.; Viswanathan, Karthik; Albers, Leila; Comolli, James C.; Shriver, Zachary; Knipe, David M.; Kurt-Jones, Evelyn A.; Fygenson, Deborah K.; Trevejo, Jose M.

    2016-01-01

    Heparan sulfate (HS) is a ubiquitous glycosaminoglycan that serves as a cellular attachment site for a number of significant human pathogens, including respiratory syncytial virus (RSV), human parainfluenza virus 3 (hPIV3), and herpes simplex virus (HSV). Decoy receptors can target pathogens by binding to the receptor pocket on viral attachment proteins, acting as ‘molecular sinks’ and preventing the pathogen from binding to susceptible host cells. Decoy receptors functionalized with HS could bind to pathogens and prevent infection, so we generated decoy liposomes displaying HS-octasaccharide (HS-octa). These decoy liposomes significantly inhibited RSV, hPIV3, and HSV infectivity in vitro to a greater degree than the original HS-octa building block. The degree of inhibition correlated with the density of HS-octa displayed on the liposome surface. Decoy liposomes with HS-octa inhibited infection of viruses to a greater extent than either full-length heparin or HS-octa alone. Decoy liposomes were effective when added prior to infection or following the initial infection of cells in vitro. By targeting the well-conserved receptor-binding sites of HS-binding viruses, decoy liposomes functionalized with HS-octa are a promising therapeutic antiviral agent and illustrate the utility of the liposome delivery platform. PMID:25637710

  4. Modularity of Protein Folds as a Tool for Template-Free Modeling of Structures.

    PubMed

    Vallat, Brinda; Madrid-Aliste, Carlos; Fiser, Andras

    2015-08-01

    Predicting the three-dimensional structure of proteins from their amino acid sequences remains a challenging problem in molecular biology. While the current structural coverage of proteins is almost exclusively provided by template-based techniques, the modeling of the rest of the protein sequences increasingly require template-free methods. However, template-free modeling methods are much less reliable and are usually applicable for smaller proteins, leaving much space for improvement. We present here a novel computational method that uses a library of supersecondary structure fragments, known as Smotifs, to model protein structures. The library of Smotifs has saturated over time, providing a theoretical foundation for efficient modeling. The method relies on weak sequence signals from remotely related protein structures to create a library of Smotif fragments specific to the target protein sequence. This Smotif library is exploited in a fragment assembly protocol to sample decoys, which are assessed by a composite scoring function. Since the Smotif fragments are larger in size compared to the ones used in other fragment-based methods, the proposed modeling algorithm, SmotifTF, can employ an exhaustive sampling during decoy assembly. SmotifTF successfully predicts the overall fold of the target proteins in about 50% of the test cases and performs competitively when compared to other state of the art prediction methods, especially when sequence signal to remote homologs is diminishing. Smotif-based modeling is complementary to current prediction methods and provides a promising direction in addressing the structure prediction problem, especially when targeting larger proteins for modeling.

  5. New glycoproteomics software, GlycoPep Evaluator, generates decoy glycopeptides de novo and enables accurate false discovery rate analysis for small data sets.

    PubMed

    Zhu, Zhikai; Su, Xiaomeng; Go, Eden P; Desaire, Heather

    2014-09-16

    Glycoproteins are biologically significant large molecules that participate in numerous cellular activities. In order to obtain site-specific protein glycosylation information, intact glycopeptides, with the glycan attached to the peptide sequence, are characterized by tandem mass spectrometry (MS/MS) methods such as collision-induced dissociation (CID) and electron transfer dissociation (ETD). While several emerging automated tools are developed, no consensus is present in the field about the best way to determine the reliability of the tools and/or provide the false discovery rate (FDR). A common approach to calculate FDRs for glycopeptide analysis, adopted from the target-decoy strategy in proteomics, employs a decoy database that is created based on the target protein sequence database. Nonetheless, this approach is not optimal in measuring the confidence of N-linked glycopeptide matches, because the glycopeptide data set is considerably smaller compared to that of peptides, and the requirement of a consensus sequence for N-glycosylation further limits the number of possible decoy glycopeptides tested in a database search. To address the need to accurately determine FDRs for automated glycopeptide assignments, we developed GlycoPep Evaluator (GPE), a tool that helps to measure FDRs in identifying glycopeptides without using a decoy database. GPE generates decoy glycopeptides de novo for every target glycopeptide, in a 1:20 target-to-decoy ratio. The decoys, along with target glycopeptides, are scored against the ETD data, from which FDRs can be calculated accurately based on the number of decoy matches and the ratio of the number of targets to decoys, for small data sets. GPE is freely accessible for download and can work with any search engine that interprets ETD data of N-linked glycopeptides. The software is provided at https://desairegroup.ku.edu/research.

  6. Fine-scale features on bioreplicated decoys of the emerald ash borer provide necessary visual verisimilitude

    NASA Astrophysics Data System (ADS)

    Domingue, Michael J.; Pulsifer, Drew P.; Narkhede, Mahesh S.; Engel, Leland G.; Martín-Palma, Raúl J.; Kumar, Jayant; Baker, Thomas C.; Lakhtakia, Akhlesh

    2014-03-01

    The emerald ash borer (EAB), Agrilus planipennis, is an invasive tree-killing pest in North America. Like other buprestid beetles, it has an iridescent coloring, produced by a periodically layered cuticle whose reflectance peaks at 540 nm wavelength. The males perform a visually mediated ritualistic mating flight directly onto females poised on sunlit leaves. We attempted to evoke this behavior using artificial visual decoys of three types. To fabricate decoys of the first type, a polymer sheet coated with a Bragg-stack reflector was loosely stamped by a bioreplicating die. For decoys of the second type, a polymer sheet coated with a Bragg-stack reflector was heavily stamped by the same die and then painted green. Every decoy of these two types had an underlying black absorber layer. Decoys of the third type were produced by a rapid prototyping machine and painted green. Fine-scale features were absent on the third type. Experiments were performed in an American ash forest infested with EAB, and a European oak forest home to a similar pest, the two-spotted oak borer (TSOB), Agrilus biguttatus. When pinned to leaves, dead EAB females, dead TSOB females, and bioreplicated decoys of both types often evoked the complete ritualized flight behavior. Males also initiated approaches to the rapidly prototyped decoy, but would divert elsewhere without making contact. The attraction of the bioreplicated decoys was also demonstrated by providing a high dc voltage across the decoys that stunned and killed approaching beetles. Thus, true bioreplication with fine-scale features is necessary to fully evoke ritualized visual responses in insects, and provides an opportunity for developing insecttrapping technologies.

  7. Adaptation of Decoy Fusion Strategy for Existing Multi-Stage Search Workflows

    NASA Astrophysics Data System (ADS)

    Ivanov, Mark V.; Levitsky, Lev I.; Gorshkov, Mikhail V.

    2016-09-01

    A number of proteomic database search engines implement multi-stage strategies aiming at increasing the sensitivity of proteome analysis. These approaches often employ a subset of the original database for the secondary stage of analysis. However, if target-decoy approach (TDA) is used for false discovery rate (FDR) estimation, the multi-stage strategies may violate the underlying assumption of TDA that false matches are distributed uniformly across the target and decoy databases. This violation occurs if the numbers of target and decoy proteins selected for the second search are not equal. Here, we propose a method of decoy database generation based on the previously reported decoy fusion strategy. This method allows unbiased TDA-based FDR estimation in multi-stage searches and can be easily integrated into existing workflows utilizing popular search engines and post-search algorithms.

  8. From Extraction of Local Structures of Protein Energy Landscapes to Improved Decoy Selection in Template-Free Protein Structure Prediction.

    PubMed

    Akhter, Nasrin; Shehu, Amarda

    2018-01-19

    Due to the essential role that the three-dimensional conformation of a protein plays in regulating interactions with molecular partners, wet and dry laboratories seek biologically-active conformations of a protein to decode its function. Computational approaches are gaining prominence due to the labor and cost demands of wet laboratory investigations. Template-free methods can now compute thousands of conformations known as decoys, but selecting native conformations from the generated decoys remains challenging. Repeatedly, research has shown that the protein energy functions whose minima are sought in the generation of decoys are unreliable indicators of nativeness. The prevalent approach ignores energy altogether and clusters decoys by conformational similarity. Complementary recent efforts design protein-specific scoring functions or train machine learning models on labeled decoys. In this paper, we show that an informative consideration of energy can be carried out under the energy landscape view. Specifically, we leverage local structures known as basins in the energy landscape probed by a template-free method. We propose and compare various strategies of basin-based decoy selection that we demonstrate are superior to clustering-based strategies. The presented results point to further directions of research for improving decoy selection, including the ability to properly consider the multiplicity of native conformations of proteins.

  9. Targeting a KH-domain protein with RNA decoys.

    PubMed

    Makeyev, Aleksandr V; Eastmond, Dawn L; Liebhaber, Stephen A

    2002-09-01

    RNA-binding proteins are involved in the regulation of many aspects of eukaryotic gene expression. Targeted interference with RNA-protein interactions could offer novel approaches to modulation of expression profiles, alteration of developmental pathways, and reversal of certain disease processes. Here we investigate a decoy strategy for the study of the alphaCP subgroup of KH-domain RNA-binding proteins. These poly(C)-binding proteins have been implicated in a wide spectrum of posttranscriptional controls. Three categories of RNA decoys to alphaCPs were studied: poly(C) homopolymers, native mRNA-binding sites, and a high-affinity structure selected from a combinatorial library. Native chemistry was found to be essential for alphaCP decoy action. Because alphaCP proteins are found in both the nucleus and cytoplasm, decoy cassettes were incorporated within both nuclear (U1 snRNA) and cytoplasmic (VA1 RNA) RNA frameworks. Several sequences demonstrated optimal decoy properties when assayed for protein-binding and decoy bioactivity in vitro. A subset of these transcripts was shown to mediate targeted inhibition of alphaCP-dependent translation when expressed in either the nucleus or cytoplasm of transfected cells. Significantly, these studies establish the feasibility of developing RNA decoys that can selectively target biologic functions of abundant and widely expressed RNA binding proteins.

  10. Targeting a KH-domain protein with RNA decoys.

    PubMed Central

    Makeyev, Aleksandr V; Eastmond, Dawn L; Liebhaber, Stephen A

    2002-01-01

    RNA-binding proteins are involved in the regulation of many aspects of eukaryotic gene expression. Targeted interference with RNA-protein interactions could offer novel approaches to modulation of expression profiles, alteration of developmental pathways, and reversal of certain disease processes. Here we investigate a decoy strategy for the study of the alphaCP subgroup of KH-domain RNA-binding proteins. These poly(C)-binding proteins have been implicated in a wide spectrum of posttranscriptional controls. Three categories of RNA decoys to alphaCPs were studied: poly(C) homopolymers, native mRNA-binding sites, and a high-affinity structure selected from a combinatorial library. Native chemistry was found to be essential for alphaCP decoy action. Because alphaCP proteins are found in both the nucleus and cytoplasm, decoy cassettes were incorporated within both nuclear (U1 snRNA) and cytoplasmic (VA1 RNA) RNA frameworks. Several sequences demonstrated optimal decoy properties when assayed for protein-binding and decoy bioactivity in vitro. A subset of these transcripts was shown to mediate targeted inhibition of alphaCP-dependent translation when expressed in either the nucleus or cytoplasm of transfected cells. Significantly, these studies establish the feasibility of developing RNA decoys that can selectively target biologic functions of abundant and widely expressed RNA binding proteins. PMID:12358435

  11. Heparin octasaccharide decoy liposomes inhibit replication of multiple viruses.

    PubMed

    Hendricks, Gabriel L; Velazquez, Lourdes; Pham, Serena; Qaisar, Natasha; Delaney, James C; Viswanathan, Karthik; Albers, Leila; Comolli, James C; Shriver, Zachary; Knipe, David M; Kurt-Jones, Evelyn A; Fygenson, Deborah K; Trevejo, Jose M; Wang, Jennifer P; Finberg, Robert W

    2015-04-01

    Heparan sulfate (HS) is a ubiquitous glycosaminoglycan that serves as a cellular attachment site for a number of significant human pathogens, including respiratory syncytial virus (RSV), human parainfluenza virus 3 (hPIV3), and herpes simplex virus (HSV). Decoy receptors can target pathogens by binding to the receptor pocket on viral attachment proteins, acting as 'molecular sinks' and preventing the pathogen from binding to susceptible host cells. Decoy receptors functionalized with HS could bind to pathogens and prevent infection, so we generated decoy liposomes displaying HS-octasaccharide (HS-octa). These decoy liposomes significantly inhibited RSV, hPIV3, and HSV infectivity in vitro to a greater degree than the original HS-octa building block. The degree of inhibition correlated with the density of HS-octa displayed on the liposome surface. Decoy liposomes with HS-octa inhibited infection of viruses to a greater extent than either full-length heparin or HS-octa alone. Decoy liposomes were effective when added prior to infection or following the initial infection of cells in vitro. By targeting the well-conserved receptor-binding sites of HS-binding viruses, decoy liposomes functionalized with HS-octa are a promising therapeutic antiviral agent and illustrate the utility of the liposome delivery platform. Copyright © 2015 Elsevier B.V. All rights reserved.

  12. Significance of increased expression of decoy receptor 3 in chronic liver disease.

    PubMed

    Kim, S; Kotoula, V; Hytiroglou, P; Zardavas, D; Zhang, L

    2009-08-01

    Considerable evidence has indicated that apoptosis plays an important role in hepatocyte death in chronic liver disease. However, the cellular and molecular mechanisms underlying liver regeneration in these diseases are largely unknown. Plausibly, certain molecules expressed to counteract apoptosis might provide survival advantage of certain liver cells. Therefore, we investigated a possible expression of decoy receptor 3 of the tumour necrosis factor receptor family in chronic liver diseases since decoy receptor 3 is known to inhibit apoptosis mediated by pro-apoptotic tumour necrosis factor family ligands including Fas ligand. A series of liver biopsies from patients with different stages of fibrosis were subjected to immunohistochemistry and in situ hybridization. Both decoy receptor 3 protein and mRNA were mainly expressed in biliary epithelial cells and infiltrating lymphocytes in the diseased livers. Most noticeably, intense decoy receptor 3 expression was observed in newly developing biliary ductules in regenerative nodules as well as dysplastic nodules of cirrhotic livers. In addition, decoy receptor 3 secretion in hepatocellular carcinoma cells in culture was via the activation of mitogen-activated protein kinases. Decoy receptor 3 was specifically expressed in chronic liver diseases and hepatocellular carcinoma cells, and decoy receptor 3 might facilitate the survival of liver cells by exerting its anti-apoptotic activity during the progression of liver cirrhosis and hepatocarcinogenesis.

  13. Cytokine Decoy and Scavenger Receptors as Key Regulators of Immunity and Inflammation

    PubMed Central

    Bonecchi, Raffaella; Garlanda, Cecilia; Mantovani, Alberto; Riva, Federica

    2017-01-01

    IL-1R2 was the first decoy receptor to be described. Subsequently receptors which act as pure decoys or scavengers or trigger dampening of cytokine signaling have been described for cytokines and chemokines. Here we review the current understanding of the mode of action and significance in pathology of the chemokine atypical receptor ACKR2, the IL-1 decoy receptor IL-1R2 and the atypical IL-1 receptor family IL-1R8. Decoy and scavenger receptors with no or atypical signaling have emerged as a general strategy conserved in evolution to tune the action of cytokines, chemokines and growth factors. PMID:27498604

  14. Placental expression of D6 decoy receptor in preeclampsia

    PubMed Central

    Cho, Geum Joon; Lee, Eun Sung; Jin, Hye Mi; Lee, Ji Hye; Kim, Yeun Sun; Seol, Hyun-Joo; Hong, Soon-Cheol; Kim, Hai-Joong

    2015-01-01

    Objective The purpose of this study was to investigate the expression of the D6 decoy receptor that can bind chemokines and target them for degradation, resulting in inhibition of inflammation in placentas from preeclamptic and normal pregnancies. Methods The current study was carried out in 35 pregnant women (23 patients with preeclampsia and 12 healthy, normotensive pregnant women) during the third trimester of pregnancy. The expressions of D6 decoy receptor in the placenta were determined with real time reverse transcriptase polymerase chain reaction and western blotting. Results The mRNA and protein of D6 decoy receptor were detected in all of placentas from preeclamptic and normal pregnancies. Placental D6 decoy receptor mRNA expression was significantly lower in patients with preeclampsia than in patients with normal pregnancies. Western blot analyses revealed decreased protein expression in cases of preeclampsia. Conclusion The expression of the D6 decoy receptor in preeclamptic placentas was significantly lower than in normal placentas. Further studies are needed to clarify the underlying mechanisms that link decreased expression of placental D6 decoy receptor and preeclampsia. PMID:26430656

  15. A decoy trap for breeding-season mallards in North Dakota

    USGS Publications Warehouse

    Sharp, D.E.; Lokemoen, J.T.

    1987-01-01

    A modified decoy trap was effective for capturing wild adult male and female mallards (Anas platyrhynchos) during the 1980-81 breeding seasons in North Dakota. Key features contributing to the trap's success included a central decoy cylinder, large capture compartments with spring-door openings, an adjustable trigger mechanism with a balanced door attachment that was resistant to trap movement, and the use of F1, wild-stock or game-farm female decoys.

  16. The Decoy Effect as a Nudge: Boosting Hand Hygiene With a Worse Option.

    PubMed

    Li, Meng; Sun, Yan; Chen, Hui

    2018-05-01

    This article provides the first test of the decoy effect as a nudge to influence real-world behavior. The decoy effect is the phenomenon that an additional but worse option can boost the appeal of an existing option. It has been widely demonstrated in hypothetical choices, but its usefulness in real-world settings has been subject to debate. In three longitudinal experiments in food-processing factories, we tested two decoy sanitation options that were worse than the existing sanitizer spray bottle. Results showed that the presence of a decoy, but not an additional copy of the original sanitizer bottle in a different color, drastically increased food workers' hand sanitizer use from the original sanitizer bottle and, consequently, improved workers' passing rate in hand sanitary tests from 60% to 70% to above 90% for 20 days. These findings indicate that the decoy effect can be a powerful nudge technique to influence real-world behavior.

  17. A STAT3-decoy oligonucleotide induces cell death in a human colorectal carcinoma cell line by blocking nuclear transfer of STAT3 and STAT3-bound NF-κB

    PubMed Central

    2011-01-01

    Background The transcription factor STAT3 (signal transducer and activator of transcription 3) is frequently activated in tumor cells. Activated STAT3 forms homodimers, or heterodimers with other TFs such as NF-κB, which becomes activated. Cytoplasmic STAT3 dimers are activated by tyrosine phosphorylation; they interact with importins via a nuclear localization signal (NLS) one of which is located within the DNA-binding domain formed by the dimer. In the nucleus, STAT3 regulates target gene expression by binding a consensus sequence within the promoter. STAT3-specific decoy oligonucleotides (STAT3-decoy ODN) that contain this consensus sequence inhibit the transcriptional activity of STAT3, leading to cell death; however, their mechanism of action is unclear. Results The mechanism of action of a STAT3-decoy ODN was analyzed in the colon carcinoma cell line SW 480. These cells' dependence on activated STAT3 was verified by showing that cell death is induced by STAT3-specific siRNAs or Stattic. STAT3-decoy ODN was shown to bind activated STAT3 within the cytoplasm, and to prevent its translocation to the nucleus, as well as that of STAT3-associated NF-κB, but it did not prevent the nuclear transfer of STAT3 with mutations in its DNA-binding domain. The complex formed by STAT3 and the STAT3-decoy ODN did not associate with importin, while STAT3 alone was found to co-immunoprecipitate with importin. Leptomycin B and vanadate both trap STAT3 in the nucleus. They were found here to oppose the cytoplasmic trapping of STAT3 by the STAT3-decoy ODN. Control decoys consisting of either a mutated STAT3-decoy ODN or a NF-κB-specific decoy ODN had no effect on STAT3 nuclear translocation. Finally, blockage of STAT3 nuclear transfer correlated with the induction of SW 480 cell death. Conclusions The inhibition of STAT3 by a STAT3-decoy ODN, leading to cell death, involves the entrapment of activated STAT3 dimers in the cytoplasm. A mechanism is suggested whereby this entrapment is due to STAT3-decoy ODN's inhibition of active STAT3/importin interaction. These observations point to the high potential of STAT3-decoy ODN as a reagent and to STAT3 nucleo-cytoplasmic shuttling in tumor cells as a potential target for effective anti-cancer compounds. PMID:21486470

  18. Binding free energy analysis of protein-protein docking model structures by evERdock.

    PubMed

    Takemura, Kazuhiro; Matubayasi, Nobuyuki; Kitao, Akio

    2018-03-14

    To aid the evaluation of protein-protein complex model structures generated by protein docking prediction (decoys), we previously developed a method to calculate the binding free energies for complexes. The method combines a short (2 ns) all-atom molecular dynamics simulation with explicit solvent and solution theory in the energy representation (ER). We showed that this method successfully selected structures similar to the native complex structure (near-native decoys) as the lowest binding free energy structures. In our current work, we applied this method (evERdock) to 100 or 300 model structures of four protein-protein complexes. The crystal structures and the near-native decoys showed the lowest binding free energy of all the examined structures, indicating that evERdock can successfully evaluate decoys. Several decoys that show low interface root-mean-square distance but relatively high binding free energy were also identified. Analysis of the fraction of native contacts, hydrogen bonds, and salt bridges at the protein-protein interface indicated that these decoys were insufficiently optimized at the interface. After optimizing the interactions around the interface by including interfacial water molecules, the binding free energies of these decoys were improved. We also investigated the effect of solute entropy on binding free energy and found that consideration of the entropy term does not necessarily improve the evaluations of decoys using the normal model analysis for entropy calculation.

  19. Binding free energy analysis of protein-protein docking model structures by evERdock

    NASA Astrophysics Data System (ADS)

    Takemura, Kazuhiro; Matubayasi, Nobuyuki; Kitao, Akio

    2018-03-01

    To aid the evaluation of protein-protein complex model structures generated by protein docking prediction (decoys), we previously developed a method to calculate the binding free energies for complexes. The method combines a short (2 ns) all-atom molecular dynamics simulation with explicit solvent and solution theory in the energy representation (ER). We showed that this method successfully selected structures similar to the native complex structure (near-native decoys) as the lowest binding free energy structures. In our current work, we applied this method (evERdock) to 100 or 300 model structures of four protein-protein complexes. The crystal structures and the near-native decoys showed the lowest binding free energy of all the examined structures, indicating that evERdock can successfully evaluate decoys. Several decoys that show low interface root-mean-square distance but relatively high binding free energy were also identified. Analysis of the fraction of native contacts, hydrogen bonds, and salt bridges at the protein-protein interface indicated that these decoys were insufficiently optimized at the interface. After optimizing the interactions around the interface by including interfacial water molecules, the binding free energies of these decoys were improved. We also investigated the effect of solute entropy on binding free energy and found that consideration of the entropy term does not necessarily improve the evaluations of decoys using the normal model analysis for entropy calculation.

  20. Ultrasound microbubble-mediated transfection of NF-κB decoy oligodeoxynucleotide into gingival tissues inhibits periodontitis in rats in vivo

    PubMed Central

    Yamaguchi, Hiroyuki; Hosomichi, Jun; Suzuki, Jun-ichi; Hatano, Kasumi; Usumi-Fujita, Risa; Shimizu, Yasuhiro; Kaneko, Sawa; Ono, Takashi

    2017-01-01

    Periodontitis is a chronic infectious disease for which the fundamental treatment is to reduce the load of subgingival pathogenic bacteria by debridement. However, previous investigators attempted to implement a nuclear factor kappa B (NF-κB) decoy oligodeoxynucleotide (ODN) as a suppressor of periodontitis progression. Although we recently reported the effectiveness of the ultrasound-microbubble method as a tool for transfecting the NF-κB decoy ODN into healthy rodent gingival tissue, this technique has not yet been applied to the pathological gingiva of periodontitis animal models. Therefore, the aim of this study was to investigate the effectiveness of the technique in transfecting the NF-κB decoy ODN into rats with ligature-induced periodontitis. Micro computed tomography (micro-CT) analysis demonstrated a significant reduction in alveolar bone loss following treatment with the NF-κB decoy ODN in the experimental group. RT-PCR showed that NF-κB decoy ODN treatment resulted in significantly reduced expression of inflammatory cytokine transcripts within rat gingival tissues. Thus, we established a transcutaneous transfection model of NF-κB decoy ODN treatment of periodontal tissues using the ultrasound-microbubble technique. Our findings suggest that the NF-κB decoy ODN could be used as a significant suppressor of gingival inflammation and periodontal disease progression. PMID:29091721

  1. Prediction of Early BK Virus Infection in Kidney Transplant Recipients by the Number of Cells With Intranuclear Inclusion Bodies (Decoy Cells)

    PubMed Central

    Yamada, Yoshiteru; Tsuchiya, Tomohiro; Inagaki, Isao; Seishima, Mitsuru; Deguchi, Takashi

    2018-01-01

    Background BK virus (BKV) is the cause of nephropathy. Because BKV nephropathy can progress to graft loss, early diagnosis of BKV infection is very important. In this study, we aimed to investigate the utility of quantifying cells with intranuclear inclusion bodies (decoy cells) in urinary sediment for the screening and monitoring of BKV infection in renal transplant recipients at our hospital. Methods This was a retrospective single-center study. Urine sediment examination was performed at each outpatient visit, and the number of decoy cells was measured in the whole microscopic field. Patients (n = 41) were divided into the BK viremia group (blood positive for BKV DNA by polymerase chain reaction [PCR]) and non-BK viremia group (blood negative for BKV DNA by PCR), and the decoy cell count in urinary sediments was examined. Results The maximum decoy cell count was significantly higher (P = 0.04) in the BK viremia group than in the non-BK viremia group. In the receiver operating characteristic curve for the maximum decoy cells, the cutoff value was 507 cells. The area under the receiver operating characteristic curve was 0.8774 (95% confidence interval, 0.7739-0.9810). The number of decoy cells at the time of appearance in the BK viremia group was not significantly different from that in the non-BK viremia group. However, the BK viremia group showed an increasing trend, whereas the non-BK viremia group showed a decreasing trend, in the number of decoy cells. There was a positive correlation between the number of decoy cells and the data from the urine BKV-DNA PCR quantification (correlation coefficient [r] = 0.74). Conclusions Measurement of decoy cells in urinary sediments may predict early BKV infection, and if performed quickly, it may be useful for screening and continuous monitoring of BKV infection in renal transplant recipients. PMID:29464201

  2. The Decoy Effect Within Alcohol Purchasing Decisions.

    PubMed

    Monk, Rebecca L; Qureshi, Adam W; Leatherbarrow, Thomas; Hughes, Annalise

    2016-08-23

    The decoy effect is the phenomenon where the introduction of a third choice to a decision dyad changes the distribution of preferences between options. Examine whether this effect exists in alcohol purchasing decisions and whether testing context impacts this. Fifty-two participants tested in either a bar or library context and were asked to choose one of a series of beer and water deals presented for timed intervals. In some cases, two options were presented (with similar attractiveness) and in other cases a third, less preferable, decoy option was added. A basic decoy effect in both alcohol and water purchasing decisions. Specifically, there were reductions in the selection of both the original options when the decoy was added into choice dyads. A significant interaction demonstrated in the bar context there was a significant difference such that there was a slight increase in participants selecting the most cost effective option when the decoy was added, and a simultaneous decrease in those choosing the moderately cost effective option. There were no such differences observed in the library condition. The same product may be perceived differently across contexts and, as such, consumers in a pub environment may be particularly vulnerable to the decoy effect.

  3. The cis decoy against the estrogen response element suppresses breast cancer cells via target disrupting c-fos not mitogen-activated protein kinase activity.

    PubMed

    Wang, Li Hua; Yang, Xiao Yi; Zhang, Xiaohu; Mihalic, Kelly; Xiao, Weihua; Farrar, William L

    2003-05-01

    Breast cancer, the most common malignancy in women, has been demonstrated to be associated with the steroid hormone estrogen and its receptor (ER), a ligand-activated transcription factor. Therefore, we developed a phosphorothiolate cis-element decoy against the estrogen response element (ERE decoy) to target disruption of ER DNA binding and transcriptional activity. Here, we showed that the ERE decoy potently ablated the 17beta-estrogen-inducible cell proliferation and induced apoptosis of human breast carcinoma cells by functionally affecting expression of c-fos gene and AP-1 luciferase gene reporter activity. Specificity of the decoy was demonstrated by its ability to directly block ER binding to a cis-element probe and transactivation. Moreover, the decoy failed to inhibit ER-mediated mitogen-activated protein kinase signaling pathways and cell growth of ER-negative breast cancer cells. Taken together, these data suggest that estrogen-mediated cell growth of breast cancer cells can be preferentially restricted via targeted disruption of ER at the level of DNA binding by a novel and specific decoy strategy applied to steroid nuclear receptors.

  4. Nuclear factor-kappa B decoy suppresses nerve injury and improves mechanical allodynia and thermal hyperalgesia in a rat lumbar disc herniation model.

    PubMed

    Suzuki, Munetaka; Inoue, Gen; Gemba, Takefumi; Watanabe, Tomoko; Ito, Toshinori; Koshi, Takana; Yamauchi, Kazuyo; Yamashita, Masaomi; Orita, Sumihisa; Eguchi, Yawara; Ochiai, Nobuyasu; Kishida, Shunji; Takaso, Masashi; Aoki, Yasuchika; Takahashi, Kazuhisa; Ohtori, Seiji

    2009-07-01

    Nuclear factor-kappa B (NF-kappaB) is a gene transcriptional regulator of inflammatory cytokines. We investigated the transduction efficiency of NF-kappaB decoy to dorsal root ganglion (DRG), as well as the decrease in nerve injury, mechanical allodynia, and thermal hyperalgesia in a rat lumbar disc herniation model. Forty rats were used in this study. NF-kappaB decoy-fluorescein isothiocyanate (FITC) was injected intrathecally at the L5 level in five rats, and its transduction efficiency into DRG measured. In another 30 rats, mechanical pressure was placed on the DRG at the L5 level and nucleus pulposus harvested from the rat coccygeal disc was transplanted on the DRG. Rats were classified into three groups of ten animals each: a herniation + decoy group, a herniation + oligo group, and a herniation only group. For behavioral testing, mechanical allodynia and thermal hyperalgesia were evaluated. In 15 of the herniation rats, their left L5 DRGs were resected, and the expression of activating transcription factor 3 (ATF-3) and calcitonin gene-related peptide (CGRP) was evaluated immunohistochemically compared to five controls. The total transduction efficiency of NF-kappaB decoy-FITC in DRG neurons was 10.8% in vivo. The expression of CGRP and ATF-3 was significantly lower in the herniation + decoy group than in the other herniation groups. Mechanical allodynia and thermal hyperalgesia were significantly suppressed in the herniation + decoy group. NF-kappaB decoy was transduced into DRGs in vivo. NF-kappaB decoy may be useful as a target for clarifying the mechanism of sciatica caused by lumbar disc herniation.

  5. Ultrasound Targeted Microbubble Destruction-Mediated Delivery of a Transcription Factor Decoy Inhibits STAT3 Signaling and Tumor Growth

    PubMed Central

    Kopechek, Jonathan A.; Carson, Andrew R.; McTiernan, Charles F.; Chen, Xucai; Hasjim, Bima; Lavery, Linda; Sen, Malabika; Grandis, Jennifer R.; Villanueva, Flordeliza S.

    2015-01-01

    Signal transducer and activator of transcription 3 (STAT3) is constitutively activated in many cancers where it acts to promote tumor progression. A STAT3-specific transcription factor decoy has been developed to suppress STAT3 downstream signaling, but a delivery strategy is needed to improve clinical translation. Ultrasound-targeted microbubble destruction (UTMD) has been shown to enhance image-guided local delivery of molecular therapeutics to a target site. The objective of this study was to deliver STAT3 decoy to squamous cell carcinoma (SCC) tumors using UTMD to disrupt STAT3 signaling and inhibit tumor growth. Studies performed demonstrated that UTMD treatment with STAT3 decoy-loaded microbubbles inhibited STAT3 signaling in SCC cells in vitro. Studies performed in vivo demonstrated that UTMD treatment with STAT3 decoy-loaded microbubbles induced significant tumor growth inhibition (31-51% reduced tumor volume vs. controls, p < 0.05) in mice bearing SCC tumors. Furthermore, expression of STAT3 downstream target genes (Bcl-xL and cyclin D1) was significantly reduced (34-39%, p < 0.05) in tumors receiving UTMD treatment with STAT3 decoy-loaded microbubbles compared to controls. In addition, the quantity of radiolabeled STAT3 decoy detected in tumors eight hours after treatment was significantly higher with UTMD treatment compared to controls (70-150%, p < 0.05). This study demonstrates that UTMD can increase delivery of a transcription factor decoy to tumors in vivo and that the decoy can inhibit STAT3 signaling and tumor growth. These results suggest that UTMD treatment holds potential for clinical use to increase the concentration of a transcription factor signaling inhibitor in the tumor. PMID:26681983

  6. 'Decoy' and 'non-decoy' functions of DcR3 promote malignant potential in human malignant fibrous histiocytoma cells.

    PubMed

    Toda, Mitsunori; Kawamoto, Teruya; Ueha, Takeshi; Kishimoto, Kenta; Hara, Hitomi; Fukase, Naomasa; Onishi, Yasuo; Harada, Risa; Minoda, Masaya; Kurosaka, Masahiro; Akisue, Toshihiro

    2013-09-01

    Decoy receptor 3 (DcR3) is a soluble secreted protein that belongs to the tumor necrosis factor receptor (TNFR) superfamily. DcR3 inhibits the Fas ligand (FasL)/Fas apoptotic pathway by binding to FasL, competitively with Fas receptor. Previous studies have reported that overexpression of DcR3 has been detected in various human malignancies and that DcR3 functions as a 'decoy' for FasL to inhibit FasL-induced apoptosis. In addition, recent studies have revealed that DcR3 has 'non-decoy' functions to promote tumor cell migration and invasion, suggesting that DcR3 may play important roles in tumor progression by decoy and non-decoy functions. We have previously reported that overexpression of DcR3 was observed in human malignant fibrous histiocytoma (MFH), however, the roles of DcR3 in MFH have not been studied. In the present study, to elucidate the roles of DcR3 in tumor progression of MFH, we examined the effects of DcR3 inhibition on cell apoptosis, migration and invasion in human MFH cells. siRNA knockdown of DcR3 enhanced the FasL-induced apoptotic activity and significantly decreased cell migration and invasion with a decrease in the activation of phosphatidylinositol 3 kinase (PI3K)/Akt and matrix metalloproteinase (MMP)-2. The findings in this study strongly suggest that DcR3 plays important roles in tumor progression of human MFH by decoy as well as non-decoy functions and that DcR3 may serve as a potent therapeutic target for human MFH.

  7. DEKOIS: demanding evaluation kits for objective in silico screening--a versatile tool for benchmarking docking programs and scoring functions.

    PubMed

    Vogel, Simon M; Bauer, Matthias R; Boeckler, Frank M

    2011-10-24

    For widely applied in silico screening techniques success depends on the rational selection of an appropriate method. We herein present a fast, versatile, and robust method to construct demanding evaluation kits for objective in silico screening (DEKOIS). This automated process enables creating tailor-made decoy sets for any given sets of bioactives. It facilitates a target-dependent validation of docking algorithms and scoring functions helping to save time and resources. We have developed metrics for assessing and improving decoy set quality and employ them to investigate how decoy embedding affects docking. We demonstrate that screening performance is target-dependent and can be impaired by latent actives in the decoy set (LADS) or enhanced by poor decoy embedding. The presented method allows extending and complementing the collection of publicly available high quality decoy sets toward new target space. All present and future DEKOIS data sets will be made accessible at www.dekois.com.

  8. Target-decoy Based False Discovery Rate Estimation for Large-scale Metabolite Identification.

    PubMed

    Wang, Xusheng; Jones, Drew R; Shaw, Timothy I; Cho, Ji-Hoon; Wang, Yuanyuan; Tan, Haiyan; Xie, Boer; Zhou, Suiping; Li, Yuxin; Peng, Junmin

    2018-05-23

    Metabolite identification is a crucial step in mass spectrometry (MS)-based metabolomics. However, it is still challenging to assess the confidence of assigned metabolites. In this study, we report a novel method for estimating false discovery rate (FDR) of metabolite assignment with a target-decoy strategy, in which the decoys are generated through violating the octet rule of chemistry by adding small odd numbers of hydrogen atoms. The target-decoy strategy was integrated into JUMPm, an automated metabolite identification pipeline for large-scale MS analysis, and was also evaluated with two other metabolomics tools, mzMatch and mzMine 2. The reliability of FDR calculation was examined by false datasets, which were simulated by altering MS1 or MS2 spectra. Finally, we used the JUMPm pipeline coupled with the target-decoy strategy to process unlabeled and stable-isotope labeled metabolomic datasets. The results demonstrate that the target-decoy strategy is a simple and effective method for evaluating the confidence of high-throughput metabolite identification.

  9. Evaluation of a novel virtual screening strategy using receptor decoy binding sites.

    PubMed

    Patel, Hershna; Kukol, Andreas

    2016-08-23

    Virtual screening is used in biomedical research to predict the binding affinity of a large set of small organic molecules to protein receptor targets. This report shows the development and evaluation of a novel yet straightforward attempt to improve this ranking in receptor-based molecular docking using a receptor-decoy strategy. This strategy includes defining a decoy binding site on the receptor and adjusting the ranking of the true binding-site virtual screen based on the decoy-site screen. The results show that by docking against a receptor-decoy site with Autodock Vina, improved Receiver Operator Characteristic Enrichment (ROCE) was achieved for 5 out of fifteen receptor targets investigated, when up to 15 % of a decoy site rank list was considered. No improved enrichment was seen for 7 targets, while for 3 targets the ROCE was reduced. The extent to which this strategy can effectively improve ligand prediction is dependent on the target receptor investigated.

  10. First-in-human trial of a STAT3 decoy oligonucleotide in head and neck tumors: implications for cancer therapy

    PubMed Central

    Sen, Malabika; Thomas, Sufi. M.; Kim, Seungwon; Yeh, Joanne I.; Ferris, Robert L.; Johnson, Jonas T.; Duvvuri, Umamaheswar; Lee, Jessica; Sahu, Nivedita; Joyce, Sonali; Freilino, Maria L.; Shi, Haibin; Li, Changyou; Ly, Danith; Rapireddy, Srinivas; Etter, Jonathan P.; Li, Pui-Kai; Wang, Lin; Chiosea, Simion; Seethala, Raja R.; Gooding, William. E.; Chen, Xiaomin; Kaminski, Naftali; Pandit, Kusum; Johnson, Daniel. E.; Grandis, Jennifer R.

    2013-01-01

    Despite evidence implicating transcription factors, including STAT3, in oncogenesis, these proteins have been regarded as “undruggable”. We developed a decoy targeting STAT3 and performed a phase 0 trial. Expression levels of STAT3 target genes were decreased in the head and neck cancers following injection with the STAT3 decoy compared with tumors receiving saline control. Decoys have not been amenable to systemic administration due to instability. To overcome this barrier, we linked the oligonucleotide strands using hexa-ethyleneglycol spacers. This cyclic STAT3 decoy bound with high affinity to STAT3 protein, reduced cellular viability, and suppressed STAT3 target gene expression in cancer cells. Intravenous injection of the cyclic STAT3 decoy inhibited xenograft growth and downregulated STAT3 target genes in the tumors. These results provide the first demonstration of a successful strategy to inhibit tumor STAT3 signaling via systemic administration of a selective STAT3 inhibitor, thereby paving the way for broad clinical development. PMID:22719020

  11. Novel mechanism of network protection against the new generation of cyber attacks

    NASA Astrophysics Data System (ADS)

    Milovanov, Alexander; Bukshpun, Leonid; Pradhan, Ranjit

    2012-06-01

    A new intelligent mechanism is presented to protect networks against the new generation of cyber attacks. This mechanism integrates TCP/UDP/IP protocol stack protection and attacker/intruder deception to eliminate existing TCP/UDP/IP protocol stack vulnerabilities. It allows to detect currently undetectable, highly distributed, low-frequency attacks such as distributed denial-of-service (DDoS) attacks, coordinated attacks, botnet, and stealth network reconnaissance. The mechanism also allows insulating attacker/intruder from the network and redirecting the attack to a simulated network acting as a decoy. As a result, network security personnel gain sufficient time to defend the network and collect the attack information. The presented approach can be incorporated into wireless or wired networks that require protection against known and the new generation of cyber attacks.

  12. Quantum communications system with integrated photonic devices

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nordholt, Jane E.; Peterson, Charles Glen; Newell, Raymond Thorson

    Security is increased in quantum communication (QC) systems lacking a true single-photon laser source by encoding a transmitted optical signal with two or more decoy-states. A variable attenuator or amplitude modulator randomly imposes average photon values onto the optical signal based on data input and the predetermined decoy-states. By measuring and comparing photon distributions for a received QC signal, a single-photon transmittance is estimated. Fiber birefringence is compensated by applying polarization modulation. A transmitter can be configured to transmit in conjugate polarization bases whose states of polarization (SOPs) can be represented as equidistant points on a great circle on themore » Poincare sphere so that the received SOPs are mapped to equidistant points on a great circle and routed to corresponding detectors. Transmitters are implemented in quantum communication cards and can be assembled from micro-optical components, or transmitter components can be fabricated as part of a monolithic or hybrid chip-scale circuit.« less

  13. Measurement-Device-Independent Quantum Key Distribution Over a 404 km Optical Fiber.

    PubMed

    Yin, Hua-Lei; Chen, Teng-Yun; Yu, Zong-Wen; Liu, Hui; You, Li-Xing; Zhou, Yi-Heng; Chen, Si-Jing; Mao, Yingqiu; Huang, Ming-Qi; Zhang, Wei-Jun; Chen, Hao; Li, Ming Jun; Nolan, Daniel; Zhou, Fei; Jiang, Xiao; Wang, Zhen; Zhang, Qiang; Wang, Xiang-Bin; Pan, Jian-Wei

    2016-11-04

    Measurement-device-independent quantum key distribution (MDIQKD) with the decoy-state method negates security threats of both the imperfect single-photon source and detection losses. Lengthening the distance and improving the key rate of quantum key distribution (QKD) are vital issues in practical applications of QKD. Herein, we report the results of MDIQKD over 404 km of ultralow-loss optical fiber and 311 km of a standard optical fiber while employing an optimized four-intensity decoy-state method. This record-breaking implementation of the MDIQKD method not only provides a new distance record for both MDIQKD and all types of QKD systems but also, more significantly, achieves a distance that the traditional Bennett-Brassard 1984 QKD would not be able to achieve with the same detection devices even with ideal single-photon sources. This work represents a significant step toward proving and developing feasible long-distance QKD.

  14. Inhibition of androgen receptor by decoy molecules delays progression to castration-recurrent prostate cancer.

    PubMed

    Myung, Jae-Kyung; Wang, Gang; Chiu, Helen H L; Wang, Jun; Mawji, Nasrin R; Sadar, Marianne D

    2017-01-01

    Androgen receptor (AR) is a member of the steroid receptor family and a therapeutic target for all stages of prostate cancer. AR is activated by ligand binding within its C-terminus ligand-binding domain (LBD). Here we show that overexpression of the AR NTD to generate decoy molecules inhibited both the growth and progression of prostate cancer in castrated hosts. Specifically, it was shown that lentivirus delivery of decoys delayed hormonal progression in castrated hosts as indicated by increased doubling time of tumor volume, prolonged time to achieve pre-castrate levels of serum prostate-specific antigen (PSA) and PSA nadir. These clinical parameters are indicative of delayed hormonal progression and improved therapeutic response and prognosis. Decoys reduced the expression of androgen-regulated genes that correlated with reduced in situ interaction of the AR with androgen response elements. Decoys did not reduce levels of AR protein or prevent nuclear localization of the AR. Nor did decoys interact directly with the AR. Thus decoys did not inhibit AR transactivation by a dominant negative mechanism. This work provides evidence that the AR NTD plays an important role in the hormonal progression of prostate cancer and supports the development of AR antagonists that target the AR NTD.

  15. Inhibition of androgen receptor by decoy molecules delays progression to castration-recurrent prostate cancer

    PubMed Central

    Myung, Jae-Kyung; Wang, Gang; Chiu, Helen H. L.; Wang, Jun; Mawji, Nasrin R.; Sadar, Marianne D.

    2017-01-01

    Androgen receptor (AR) is a member of the steroid receptor family and a therapeutic target for all stages of prostate cancer. AR is activated by ligand binding within its C-terminus ligand-binding domain (LBD). Here we show that overexpression of the AR NTD to generate decoy molecules inhibited both the growth and progression of prostate cancer in castrated hosts. Specifically, it was shown that lentivirus delivery of decoys delayed hormonal progression in castrated hosts as indicated by increased doubling time of tumor volume, prolonged time to achieve pre-castrate levels of serum prostate-specific antigen (PSA) and PSA nadir. These clinical parameters are indicative of delayed hormonal progression and improved therapeutic response and prognosis. Decoys reduced the expression of androgen-regulated genes that correlated with reduced in situ interaction of the AR with androgen response elements. Decoys did not reduce levels of AR protein or prevent nuclear localization of the AR. Nor did decoys interact directly with the AR. Thus decoys did not inhibit AR transactivation by a dominant negative mechanism. This work provides evidence that the AR NTD plays an important role in the hormonal progression of prostate cancer and supports the development of AR antagonists that target the AR NTD. PMID:28306720

  16. A population-based evolutionary search approach to the multiple minima problem in de novo protein structure prediction

    PubMed Central

    2013-01-01

    Background Elucidating the native structure of a protein molecule from its sequence of amino acids, a problem known as de novo structure prediction, is a long standing challenge in computational structural biology. Difficulties in silico arise due to the high dimensionality of the protein conformational space and the ruggedness of the associated energy surface. The issue of multiple minima is a particularly troublesome hallmark of energy surfaces probed with current energy functions. In contrast to the true energy surface, these surfaces are weakly-funneled and rich in comparably deep minima populated by non-native structures. For this reason, many algorithms seek to be inclusive and obtain a broad view of the low-energy regions through an ensemble of low-energy (decoy) conformations. Conformational diversity in this ensemble is key to increasing the likelihood that the native structure has been captured. Methods We propose an evolutionary search approach to address the multiple-minima problem in decoy sampling for de novo structure prediction. Two population-based evolutionary search algorithms are presented that follow the basic approach of treating conformations as individuals in an evolving population. Coarse graining and molecular fragment replacement are used to efficiently obtain protein-like child conformations from parents. Potential energy is used both to bias parent selection and determine which subset of parents and children will be retained in the evolving population. The effect on the decoy ensemble of sampling minima directly is measured by additionally mapping a conformation to its nearest local minimum before considering it for retainment. The resulting memetic algorithm thus evolves not just a population of conformations but a population of local minima. Results and conclusions Results show that both algorithms are effective in terms of sampling conformations in proximity of the known native structure. The additional minimization is shown to be key to enhancing sampling capability and obtaining a diverse ensemble of decoy conformations, circumventing premature convergence to sub-optimal regions in the conformational space, and approaching the native structure with proximity that is comparable to state-of-the-art decoy sampling methods. The results are shown to be robust and valid when using two representative state-of-the-art coarse-grained energy functions. PMID:24565020

  17. Bioreplicated visual features of nanofabricated buprestid beetle decoys evoke stereotypical male mating flights

    PubMed Central

    Domingue, Michael J.; Lakhtakia, Akhlesh; Pulsifer, Drew P.; Hall, Loyal P.; Badding, John V.; Bischof, Jesse L.; Martín-Palma, Raúl J.; Imrei, Zoltán; Janik, Gergely; Mastro, Victor C.; Hazen, Missy; Baker, Thomas C.

    2014-01-01

    Recent advances in nanoscale bioreplication processes present the potential for novel basic and applied research into organismal behavioral processes. Insect behavior potentially could be affected by physical features existing at the nanoscale level. We used nano-bioreplicated visual decoys of female emerald ash borer beetles (Agrilus planipennis) to evoke stereotypical mate-finding behavior, whereby males fly to and alight on the decoys as they would on real females. Using an industrially scalable nanomolding process, we replicated and evaluated the importance of two features of the outer cuticular surface of the beetle’s wings: structural interference coloration of the elytra by multilayering of the epicuticle and fine-scale surface features consisting of spicules and spines that scatter light into intense strands. Two types of decoys that lacked one or both of these elements were fabricated, one type nano-bioreplicated and the other 3D-printed with no bioreplicated surface nanostructural elements. Both types were colored with green paint. The light-scattering properties of the nano-bioreplicated surfaces were verified by shining a white laser on the decoys in a dark room and projecting the scattering pattern onto a white surface. Regardless of the coloration mechanism, the nano-bioreplicated decoys evoked the complete attraction and landing sequence of Agrilus males. In contrast, males made brief flying approaches toward the decoys without nanostructured features, but diverted away before alighting on them. The nano-bioreplicated decoys were also electroconductive, a feature used on traps such that beetles alighting onto them were stunned, killed, and collected. PMID:25225359

  18. STAT3 Oligonucleotide Inhibits Tumor Angiogenesis in Preclinical Models of Squamous Cell Carcinoma

    PubMed Central

    Klein, Jonah D.; Sano, Daisuke; Sen, Malabika; Myers, Jeffrey N.; Grandis, Jennifer R.; Kim, Seungwon

    2014-01-01

    Purpose Signal transducer and activator of transcription 3 (STAT3) has shown to play a critical role in head and neck squamous cell carcinoma (HNSCC) and we have recently completed clinical trials of STAT3 decoy oligonucleotide in patients with recurrent or metastatic HNSCC. However, there is limited understanding of the role of STAT3 in modulating other aspects of tumorigenesis such as angiogenesis. In this study, we aimed to examine the effects of STAT3 decoy oligonucleotide on tumor angiogenesis. Experimental Design A STAT3 decoy oligonucleotide and small interfering RNA (siRNA) were used to inhibit STAT3 in endothelial cells in vitro and in vivo. The biochemical effects of STAT3 inhibition were examined in conjunction with the consequences on proliferation, migration, apoptotic staining, and tubule formation. Additionally, we assessed the effects of STAT3 inhibition on tumor angiogenesis using murine xenograft models. Results STAT3 decoy oligonucleotide decreased proliferation, induces apoptosis, decreased migration, and decreased tubule formation of endothelial cells in vitro. The STAT3 decoy oligonucleotide also inhibited tumor angiogenesis in murine tumor xenografts. Lastly, our data suggest that the antiangiogenic effects of STAT3 decoy oligonucleotide were mediatedthrough the inhibition of both STAT3 and STAT1. Conclusions The STAT3 decoy oligonucleotidewas found to be an effective antiangiogenic agent, which is likely to contribute to the overall antitumor effects of this agent in solid tumors.Taken together with the previously demonstrated antitumor activity of this agent, STAT3 decoy oligonucleotide represents a promising single agent approach to targeting both the tumor and vascular compartments in various malignancies. PMID:24404126

  19. ROTAS: a rotamer-dependent, atomic statistical potential for assessment and prediction of protein structures.

    PubMed

    Park, Jungkap; Saitou, Kazuhiro

    2014-09-18

    Multibody potentials accounting for cooperative effects of molecular interactions have shown better accuracy than typical pairwise potentials. The main challenge in the development of such potentials is to find relevant structural features that characterize the tightly folded proteins. Also, the side-chains of residues adopt several specific, staggered conformations, known as rotamers within protein structures. Different molecular conformations result in different dipole moments and induce charge reorientations. However, until now modeling of the rotameric state of residues had not been incorporated into the development of multibody potentials for modeling non-bonded interactions in protein structures. In this study, we develop a new multibody statistical potential which can account for the influence of rotameric states on the specificity of atomic interactions. In this potential, named "rotamer-dependent atomic statistical potential" (ROTAS), the interaction between two atoms is specified by not only the distance and relative orientation but also by two state parameters concerning the rotameric state of the residues to which the interacting atoms belong. It was clearly found that the rotameric state is correlated to the specificity of atomic interactions. Such rotamer-dependencies are not limited to specific type or certain range of interactions. The performance of ROTAS was tested using 13 sets of decoys and was compared to those of existing atomic-level statistical potentials which incorporate orientation-dependent energy terms. The results show that ROTAS performs better than other competing potentials not only in native structure recognition, but also in best model selection and correlation coefficients between energy and model quality. A new multibody statistical potential, ROTAS accounting for the influence of rotameric states on the specificity of atomic interactions was developed and tested on decoy sets. The results show that ROTAS has improved ability to recognize native structure from decoy models compared to other potentials. The effectiveness of ROTAS may provide insightful information for the development of many applications which require accurate side-chain modeling such as protein design, mutation analysis, and docking simulation.

  20. A Range-Normalization Model of Context-Dependent Choice: A New Model and Evidence

    PubMed Central

    Camerer, Colin

    2012-01-01

    Most utility theories of choice assume that the introduction of an irrelevant option (called the decoy) to a choice set does not change the preference between existing options. On the contrary, a wealth of behavioral data demonstrates the dependence of preference on the decoy and on the context in which the options are presented. Nevertheless, neural mechanisms underlying context-dependent preference are poorly understood. In order to shed light on these mechanisms, we design and perform a novel experiment to measure within-subject decoy effects. We find within-subject decoy effects similar to what have been shown previously with between-subject designs. More importantly, we find that not only are the decoy effects correlated, pointing to similar underlying mechanisms, but also these effects increase with the distance of the decoy from the original options. To explain these observations, we construct a plausible neuronal model that can account for decoy effects based on the trial-by-trial adjustment of neural representations to the set of available options. This adjustment mechanism, which we call range normalization, occurs when the nervous system is required to represent different stimuli distinguishably, while being limited to using bounded neural activity. The proposed model captures our experimental observations and makes new predictions about the influence of the choice set size on the decoy effects, which are in contrast to previous models of context-dependent choice preference. Critically, unlike previous psychological models, the computational resource required by our range-normalization model does not increase exponentially as the set size increases. Our results show that context-dependent choice behavior, which is commonly perceived as an irrational response to the presence of irrelevant options, could be a natural consequence of the biophysical limits of neural representation in the brain. PMID:22829761

  1. Targeting the MET oncogene by concomitant inhibition of receptor and ligand via an antibody-"decoy" strategy.

    PubMed

    Basilico, Cristina; Modica, Chiara; Maione, Federica; Vigna, Elisa; Comoglio, Paolo M

    2018-04-25

    MET, a master gene sustaining "invasive growth," is a relevant target for cancer precision therapy. In the vast majority of tumors, wild-type MET behaves as a "stress-response" gene and relies on the ligand (HGF) to sustain cell "scattering," invasive growth and apoptosis protection (oncogene "expedience"). In this context, concomitant targeting of MET and HGF could be crucial to reach effective inhibition. To test this hypothesis, we combined an anti-MET antibody (MvDN30) inducing "shedding" (i.e., removal of MET from the cell surface), with a "decoy" (i.e., the soluble extracellular domain of the MET receptor) endowed with HGF-sequestering ability. To avoid antibody/decoy interaction-and subsequent neutralization-we identified a single aminoacid in the extracellular domain of MET-lysine 842-that is critical for MvDN30 binding and engineered the corresponding recombinant decoyMET (K842E). DecoyMET K842E retains the ability to bind HGF with high affinity and inhibits HGF-induced MET phosphorylation. In HGF-dependent cellular models, MvDN30 antibody and decoyMET K842E used in combination cooperate in restraining invasive growth, and synergize in blocking cancer cell "scattering." The antibody and the decoy unbridle apoptosis of colon cancer stem cells grown in vitro as spheroids. In a preclinical model, built by orthotopic transplantation of a human pancreatic carcinoma in SCID mice engineered to express human HGF, concomitant treatment with antibody and decoy significantly reduces metastatic spread. The data reported indicate that vertical targeting of the MET/HGF axis results in powerful inhibition of ligand-dependent MET activation, providing proof of concept in favor of combined target therapy of MET "expedience." © 2018 UICC.

  2. Antitumor effect of nuclear factor-κB decoy transfer by mannose-modified bubble lipoplex into macrophages in mouse malignant ascites

    PubMed Central

    Kono, Yusuke; Kawakami, Shigeru; Higuchi, Yuriko; Maruyama, Kazuo; Yamashita, Fumiyoshi; Hashida, Mitsuru

    2014-01-01

    Patients with malignant ascites (MAs) display several symptoms, such as dyspnea, nausea, pain, and abdominal tenderness, resulting in a significant reduction in their quality of life. Tumor-associated macrophages (TAMs) play a crucial role in MA progression. Because TAMs have a tumor-promoting M2 phenotype, conversion of the M2 phenotypic function of TAMs would be promising for MA treatment. Nuclear factor-κB (NF-κB) is a master regulator of macrophage polarization. Here, we developed targeted transfer of a NF-κB decoy into TAMs by ultrasound (US)-responsive, mannose-modified liposome/NF-κB decoy complexes (Man-PEG bubble lipoplexes) in a mouse peritoneal dissemination model of Ehrlich ascites carcinoma. In addition, we investigated the effects of NF-κB decoy transfection into TAMs on MA progression and mouse survival rates. Intraperitoneal injection of Man-PEG bubble lipoplexes and US exposure transferred the NF-κB decoy into TAMs effectively. When the NF-κB decoy was delivered into TAMs by this method in the mouse peritoneal dissemination model, mRNA expression of the Th2 cytokine interleukin (IL)-10 in TAMs was decreased significantly. In contrast, mRNA levels of Th1 cytokines (IL-12, tumor necrosis factor-α, and IL-6) were increased significantly. Moreover, the expression level of vascular endothelial growth factor in ascites was suppressed significantly, and peritoneal angiogenesis showed a reduction. Furthermore, NF-κB decoy transfer into TAMs significantly decreased the ascitic volume and number of Ehrlich ascites carcinoma cells in ascites, and prolonged mouse survival. In conclusion, we transferred a NF-κB decoy efficiently by Man-PEG bubble lipoplexes with US exposure into TAMs, which may be a novel approach for MA treatment. PMID:24850474

  3. Systemic Administration of a Cyclic Signal Transducer and Activator of Transcription 3 (STAT3) Decoy Oligonucleotide Inhibits Tumor Growth without Inducing Toxicological Effects

    PubMed Central

    Sen, Malabika; Paul, Kathleen; Freilino, Maria L; Li, Hua; Li, Changyou; Johnson, Daniel E; Wang, Lin; Eiseman, Julie; Grandis, Jennifer R

    2014-01-01

    Hyperactivation of signal transducer and activator of transcription 3 (STAT3) has been linked to tumorigenesis in most malignancies, including head and neck squamous cell carcinoma. Intravenous delivery of a chemically modified cyclic STAT3 decoy oligonucleotide with improved serum and thermal stability demonstrated antitumor efficacy in conjunction with downmodulation of STAT3 target gene expression such as cyclin D1 and Bcl-XL in a mouse model of head and neck squamous cell carcinoma. The purpose of the present study was to determine the toxicity and dose-dependent antitumor efficacy of the cyclic STAT3 decoy after multiple intravenous doses in Foxn1 nu mice in anticipation of clinical translation. The two doses (5 and 10 mg/kg) of cyclic STAT3 decoy demonstrated a significant decrease in tumor volume compared with the control groups (mutant cyclic STAT3 decoy or saline) in conjunction with downmodulation of STAT3 target gene expression. There was no dose-dependent effect of cyclic STAT3 decoy on tumor volume or STAT3 target gene expression. There were no significant changes in body weights between the groups during the dosing period, after the dosing interval or on the day of euthanasia. No hematology or clinical chemistry parameters suggested toxicity of the cyclic STAT3 decoy compared with saline control. No gross or histological pathological abnormalities were noted at necropsy in any of the animals. These findings suggest a lack of toxicity of intravenous administration of a cyclic STAT3 decoy oligonucleotide. In addition, comparable antitumor effects indicate a lack of dose response at the two dose levels investigated. PMID:24395569

  4. Inhibiting host-pathogen interactions using membrane-based nanostructures.

    PubMed

    Bricarello, Daniel A; Patel, Mira A; Parikh, Atul N

    2012-06-01

    Virulent strains of bacteria and viruses recognize host cells by their plasma membrane receptors and often exploit the native translocation machinery to invade the cell. A promising therapeutic concept for early interruption of pathogen infection is to subvert this pathogenic trickery using exogenously introduced decoys that present high-affinity mimics of cellular receptors. This review highlights emerging applications of molecularly engineered lipid-bilayer-based nanostructures, namely (i) functionalized liposomes, (ii) supported colloidal bilayers or protocells and (iii) reconstituted lipoproteins, which display functional cellular receptors in optimized conformational and aggregative states. These decoys outcompete host cell receptors by preferentially binding to and neutralizing virulence factors of both bacteria and viruses, thereby promising a new approach to antipathogenic therapy. Copyright © 2012 Elsevier Ltd. All rights reserved.

  5. Fast optical source for quantum key distribution based on semiconductor optical amplifiers.

    PubMed

    Jofre, M; Gardelein, A; Anzolin, G; Amaya, W; Capmany, J; Ursin, R; Peñate, L; Lopez, D; San Juan, J L; Carrasco, J A; Garcia, F; Torcal-Milla, F J; Sanchez-Brea, L M; Bernabeu, E; Perdigues, J M; Jennewein, T; Torres, J P; Mitchell, M W; Pruneri, V

    2011-02-28

    A novel integrated optical source capable of emitting faint pulses with different polarization states and with different intensity levels at 100 MHz has been developed. The source relies on a single laser diode followed by four semiconductor optical amplifiers and thin film polarizers, connected through a fiber network. The use of a single laser ensures high level of indistinguishability in time and spectrum of the pulses for the four different polarizations and three different levels of intensity. The applicability of the source is demonstrated in the lab through a free space quantum key distribution experiment which makes use of the decoy state BB84 protocol. We achieved a lower bound secure key rate of the order of 3.64 Mbps and a quantum bit error ratio as low as 1.14×10⁻² while the lower bound secure key rate became 187 bps for an equivalent attenuation of 35 dB. To our knowledge, this is the fastest polarization encoded QKD system which has been reported so far. The performance, reduced size, low power consumption and the fact that the components used can be space qualified make the source particularly suitable for secure satellite communication.

  6. Targeted Blockage of Signal Transducer and Activator of Transcription 5 Signaling Pathway with Decoy Oligodeoxynucleotides Suppresses Leukemic K562 Cell Growth

    PubMed Central

    Wang, Xiaozhong; Zeng, Jianming; Shi, Mei; Zhao, Shiqiao; Bai, Weijun; Cao, Weixi; Tu, Zhiguang; Huang, Zonggan

    2011-01-01

    The protein signal transducer and activator of transcription 5 (STAT5) of the JAK/STAT pathway is constitutively activated because of its phosphorylation by tyrosine kinase activity of fusion protein BCR-ABL in chronic myelogenous leukemia (CML) cells. This study investigated the potential therapeutic effect of STAT5 decoy oligodeoxynucleotides (ODN) using leukemia K562 cells as a model. Our results showed that transfection of 21-mer-long STAT5 decoy ODN into K562 cells effectively inhibited cell proliferation and induced cell apoptosis. Further, STAT5 decoy ODN downregulated STAT5 targets bcl-xL, cyclinD1, and c-myc at both mRNA and protein levels in a sequence-specific manner. Collectively, these data demonstrate the therapeutic effect of blocking the STAT5 signal pathway by cis-element decoy for cancer characterized by constitutive STAT5 activation. Thus, our study provides support for STAT5 as a potential target downstream of BCR-ABL for CML treatment and helps establish the concept of targeting STAT5 by decoy ODN as a novel therapy approach for imatinib-resistant CML. PMID:21091189

  7. Conformational Sampling of a Biomolecular Rugged Energy Landscape.

    PubMed

    Rydzewski, Jakub; Jakubowski, Rafal; Nicosia, Giuseppe; Nowak, Wieslaw

    2018-01-01

    The protein structure refinement using conformational sampling is important in hitherto protein studies. In this paper, we examined the protein structure refinement by means of potential energy minimization using immune computing as a method of sampling conformations. The method was tested on the x-ray structure and 30 decoys of the mutant of [Leu]Enkephalin, a paradigmatic example of the biomolecular multiple-minima problem. In order to score the refined conformations, we used a standard potential energy function with the OPLSAA force field. The effectiveness of the search was assessed using a variety of methods. The robustness of sampling was checked by the energy yield function which measures quantitatively the number of the peptide decoys residing in an energetic funnel. Furthermore, the potential energy-dependent Pareto fronts were calculated to elucidate dissimilarities between peptide conformations and the native state as observed by x-ray crystallography. Our results showed that the probed potential energy landscape of [Leu]Enkephalin is self-similar on different metric scales and that the local potential energy minima of the peptide decoys are metastable, thus they can be refined to conformations whose potential energy is decreased by approximately 250 kJ/mol.

  8. Integration of decoy domains derived from protein targets of pathogen effectors into plant immune receptors is widespread.

    PubMed

    Kroj, Thomas; Chanclud, Emilie; Michel-Romiti, Corinne; Grand, Xavier; Morel, Jean-Benoit

    2016-04-01

    Plant immune receptors of the class of nucleotide-binding and leucine-rich repeat domain (NLR) proteins can contain additional domains besides canonical NB-ARC (nucleotide-binding adaptor shared by APAF-1, R proteins, and CED-4 (NB-ARC)) and leucine-rich repeat (LRR) domains. Recent research suggests that these additional domains act as integrated decoys recognizing effectors from pathogens. Proteins homologous to integrated decoys are suspected to be effector targets and involved in disease or resistance. Here, we scrutinized 31 entire plant genomes to identify putative integrated decoy domains in NLR proteins using the Interpro search. The involvement of the Zinc Finger-BED type (ZBED) protein containing a putative decoy domain, called BED, in rice (Oryza sativa) resistance was investigated by evaluating susceptibility to the blast fungus Magnaporthe oryzae in rice over-expression and knock-out mutants. This analysis showed that all plants tested had integrated various atypical protein domains into their NLR proteins (on average 3.5% of all NLR proteins). We also demonstrated that modifying the expression of the ZBED gene modified disease susceptibility. This study suggests that integration of decoy domains in NLR immune receptors is widespread and frequent in plants. The integrated decoy model is therefore a powerful concept to identify new proteins involved in disease resistance. Further in-depth examination of additional domains in NLR proteins promises to unravel many new proteins of the plant immune system. © 2016 The Authors. New Phytologist © 2016 New Phytologist Trust.

  9. NF-κB Decoy Oligodeoxynucleotide Enhanced Osteogenesis in Mesenchymal Stem Cells Exposed to Polyethylene Particle

    PubMed Central

    Lin, Tzu-Hua; Sato, Taishi; Barcay, Katherine R.; Waters, Heather; Loi, Florence; Zhang, Ruth; Pajarinen, Jukka; Egashira, Kensuke; Yao, Zhenyu

    2015-01-01

    Excessive generation of wear particles after total joint replacement may lead to local inflammation and periprosthetic osteolysis. Modulation of the key transcription factor NF-κB in immune cells could potentially mitigate the osteolytic process. We previously showed that local delivery of ultrahigh-molecular-weight polyethylene (UHMWPE) particles recruited osteoprogenitor cells and reduced osteolysis. However, the biological effects of modulating the NF-κB signaling pathway on osteoprogenitor/mesenchymal stem cells (MSCs) remain unclear. Here we showed that decoy oligodeoxynucleotide (ODN) increased cell viability when primary murine MSCs were exposed to UHMWPE particles, but had no effects on cellular apoptosis. Decoy ODN increased transforming growth factor-beta 1 (TGF-β1) and osteoprotegerin (OPG) in MSCs exposed to UHMWPE particles. Mechanistic studies showed that decoy ODN upregulated OPG expression through a TGF-β1-dependent pathway. By measuring the alkaline phosphatase activity, osteocalcin levels, Runx2 and osteopontin expression, and performing a bone mineralization assay, we found that decoy ODN increased MSC osteogenic ability when the cells were exposed to UHMWPE particles. Furthermore, the cellular response to decoy ODN and UHMWPE particles with regard to cell phenotype, cell viability, and osteogenic ability was confirmed using primary human MSCs. Our results suggest that modulation of wear particle-induced inflammation by NF-κB decoy ODN had no adverse effects on MSCs and may potentially further mitigate periprosthetic osteolysis by protecting MSC viability and osteogenic ability. PMID:25518013

  10. Orthopaedic wear particle-induced bone loss and exogenous macrophage infiltration is mitigated by local infusion of NF-κB decoy oligodeoxynucleotide.

    PubMed

    Lin, Tzuhua; Pajarinen, Jukka; Nabeshima, Akira; Córdova, Luis A; Loi, Florence; Gibon, Emmanuel; Lu, Laura; Nathan, Karthik; Jämsen, Eemeli; Yao, Zhenyu; Goodman, Stuart B

    2017-11-01

    Excessive production of wear particles from total joint replacements induces chronic inflammation, macrophage infiltration, and consequent bone loss (periprosthetic osteolysis). This inflammation and bone remodeling are critically regulated by the transcription factor NF-κB. We previously demonstrated that inhibition of NF-κB signaling by using the decoy oligodeoxynucleotide (ODN) mitigates polyethylene wear particle-induced bone loss using in vitro and in vivo models. However, the mechanisms of NF-κB decoy ODN action, and in particular its impact on systemic macrophage recruitment, remain unknown. In the current study, this systemic macrophage infiltration was examined in our established murine femoral continuous particle infusion model. RAW264.7 murine macrophages expressing a luciferase reporter gene were injected into the systemic circulation. Quantification of bioluminescence showed that NF-κB decoy ODN reduced the homing of these reporter macrophages into the distal femurs exposed to continuous particle delivery. Particle-induced reduction in bone mineral density at the distal diaphysis of the femur was also mitigated by infusion of decoy ODN. Histological staining showed that the decoy ODN infusion decreased osteoclast and macrophage numbers, but had no significant effects on osteoblasts. Local infusion of NF-κB decoy ODN reduced systemic macrophage infiltration and mitigated particle-induced bone loss, thus providing a potential strategy to treat periprosthetic osteolysis. © 2017 Wiley Periodicals, Inc. J Biomed Mater Res Part A: 105A: 3169-3175, 2017. © 2017 Wiley Periodicals, Inc.

  11. Efficient quantum dialogue without information leakage

    NASA Astrophysics Data System (ADS)

    Yin, Ai-Han; Tang, Zhi-Hui; Chen, Dong

    2015-02-01

    A two-step quantum dialogue scheme is put forward with a class of three-qubit W state and quantum dense coding. Each W state can carry three bits of secret information and the measurement result is encrypted without information leakage. Furthermore, we utilize the entangle properties of W state and decoy photon checking technique to realize three-time channel detection, which can improve the efficiency and security of the scheme.

  12. Selective targeting of a TNFR decoy receptor pharmaceutical to the primate brain as a receptor-specific IgG fusion protein.

    PubMed

    Boado, Ruben J; Hui, Eric Ka-Wai; Lu, Jeff Zhiqiang; Zhou, Qing-Hui; Pardridge, William M

    2010-03-01

    Decoy receptors, such as the human tumor necrosis factor receptor (TNFR), are potential new therapies for brain disorders. However, decoy receptors are large molecule drugs that are not transported across the blood-brain barrier (BBB). To enable BBB transport of a TNFR decoy receptor, the human TNFR-II extracellular domain was re-engineered as a fusion protein with a chimeric monoclonal antibody (MAb) against the human insulin receptor (HIR). The HIRMAb acts as a molecular Trojan horse to ferry the TNFR therapeutic decoy receptor across the BBB. The HIRMAb-TNFR fusion protein was expressed in stably transfected CHO cells, and was analyzed with electrophoresis, Western blotting, size exclusion chromatography, and binding assays for the HIR and TNFalpha. The HIRMAb-TNFR fusion protein was radio-labeled by trititation, in parallel with the radio-iodination of recombinant TNFR:Fc fusion protein, and the proteins were co-injected in the adult Rhesus monkey. The TNFR:Fc fusion protein did not cross the primate BBB in vivo, but the uptake of the HIRMAb-TNFR fusion protein was high and 3% of the injected dose was taken up by the primate brain. The TNFR was selectively targeted to brain, relative to peripheral organs, following fusion to the HIRMAb. This study demonstrates that decoy receptors may be re-engineered as IgG fusion proteins with a BBB molecular Trojan horse that selectively targets the brain, and enables penetration of the BBB in vivo. IgG-decoy receptor fusion proteins represent a new class of human neurotherapeutics. Copyright 2010 Elsevier B.V. All rights reserved.

  13. Sialylneolacto-N-tetraose c (LSTc)-bearing Liposomal Decoys Capture Influenza A Virus*

    PubMed Central

    Hendricks, Gabriel L.; Weirich, Kim L.; Viswanathan, Karthik; Li, Jing; Shriver, Zachary H.; Ashour, Joseph; Ploegh, Hidde L.; Kurt-Jones, Evelyn A.; Fygenson, Deborah K.; Finberg, Robert W.; Comolli, James C.; Wang, Jennifer P.

    2013-01-01

    Influenza is a severe disease in humans and animals with few effective therapies available. All strains of influenza virus are prone to developing drug resistance due to the high mutation rate in the viral genome. A therapeutic agent that targets a highly conserved region of the virus could bypass resistance and also be effective against multiple strains of influenza. Influenza uses many individually weak ligand binding interactions for a high avidity multivalent attachment to sialic acid-bearing cells. Polymerized sialic acid analogs can form multivalent interactions with influenza but are not ideal therapeutics due to solubility and toxicity issues. We used liposomes as a novel means for delivery of the glycan sialylneolacto-N-tetraose c (LSTc). LSTc-bearing decoy liposomes form multivalent, polymer-like interactions with influenza virus. Decoy liposomes competitively bind influenza virus in hemagglutination inhibition assays and inhibit infection of target cells in a dose-dependent manner. Inhibition is specific for influenza virus, as inhibition of Sendai virus and respiratory syncytial virus is not observed. In contrast, monovalent LSTc does not bind influenza virus or inhibit infectivity. LSTc decoy liposomes prevent the spread of influenza virus during multiple rounds of replication in vitro and extend survival of mice challenged with a lethal dose of virus. LSTc decoy liposomes co-localize with fluorescently tagged influenza virus, whereas control liposomes do not. Considering the conservation of the hemagglutinin binding pocket and the ability of decoy liposomes to form high avidity interactions with influenza hemagglutinin, our decoy liposomes have potential as a new therapeutic agent against emerging influenza strains. PMID:23362274

  14. Oxidized ultrashort nanotubes as carbon scaffolds for the construction of cell-penetrating NF-kappaB decoy molecules.

    PubMed

    Crinelli, Rita; Carloni, Elisa; Menotta, Michele; Giacomini, Elisa; Bianchi, Marzia; Ambrosi, Gianluca; Giorgi, Luca; Magnani, Mauro

    2010-05-25

    Oligonucleotide (ODN) decoys are synthetic ODNs containing the DNA binding sequence of a transcription factor. When delivered to cells, these molecules can compete with endogenous sequences for binding the transcription factor, thus inhibiting its ability to activate the expression of target genes. Modulation of gene expression by decoy ODNs against nuclear factor-kappaB (NF-kappaB), a transcription factor regulating many genes involved in immunity, has been achieved in a variety of immune/inflammatory disorders. However, the successful use of transcription factor decoys depends on an efficient means to bring the synthetic DNA to target cells. It is known that single-walled carbon nanotubes (SWCNTs), under certain conditions, are able to cross the cell membrane. Thus, we have evaluated the possibility to functionalize SWCNTs with decoy ODNs against NF-kappaB in order to improve their intracellular delivery. To couple ODNs to CNTs, we have exploited the carbodiimide chemistry which allows covalent binding of amino-modified ODNs to carboxyl groups introduced onto SWCNTs through oxidation. The effective binding of ODNs to nanotubes has been demonstrated by a combination of microscopic, spectroscopic, and electrophoretic techniques. The uptake and subcellular distribution of ODN decoys bound to SWCNTs was analyzed by fluorescence microscopy. ODNs were internalized into macrophages and accumulated in the cytosol. Moreover, no cytotoxicity associated with SWCNT administration was observed. Finally, NF-kappaB-dependent gene expression was significantly reduced in cells receiving nanomolar concentrations of SWCNT-NF-kappaB decoys compared to cells receiving SWCNTs or SWCNTs functionalized with a nonspecific ODN sequence, demonstrating both efficacy and specificity of the approach.

  15. Evolutionary Analysis of Functional Divergence among Chemokine Receptors, Decoy Receptors, and Viral Receptors

    PubMed Central

    Daiyasu, Hiromi; Nemoto, Wataru; Toh, Hiroyuki

    2012-01-01

    Chemokine receptors (CKRs) function in the inflammatory response and in vertebrate homeostasis. Decoy and viral receptors are two types of CKR homologs with modified functions from those of the typical CKRs. The decoy receptors are able to bind ligands without signaling. On the other hand, the viral receptors show constitutive signaling without ligands. We examined the sites related to the functional difference. At first, the decoy and viral receptors were each classified into five groups, based on the molecular phylogenetic analysis. A multiple amino acid sequence alignment between each group and the CKRs was then constructed. The difference in the amino acid composition between the group and the CKRs was evaluated as the Kullback–Leibler (KL) information value at each alignment site. The KL information value is considered to reflect the difference in the functional constraints at the site. The sites with the top 5% of KL information values were selected and mapped on the structure of a CKR. The comparisons with decoy receptor groups revealed that the detected sites were biased on the intracellular side. In contrast, the sites detected from the comparisons with viral receptor groups were found on both the extracellular and intracellular sides. More sites were found in the ligand binding pocket in the analyses of the viral receptor groups, as compared to the decoy receptor groups. Some of the detected sites were located in the GPCR motifs. For example, the DRY motif of the decoy receptors was often degraded, although the motif of the viral receptors was basically conserved. The observations for the viral receptor groups suggested that the constraints in the pocket region are loose and that the sites on the intracellular side are different from those for the decoy receptors, which may be related to the constitutive signaling activity of the viral receptors. PMID:22855685

  16. Decoy receptor 3: a pleiotropic immunomodulator and biomarker for inflammatory diseases, autoimmune diseases and cancer.

    PubMed

    Lin, Wan-Wan; Hsieh, Shie-Liang

    2011-04-01

    Recently, several decoy molecules belonging to tumor necrosis factor receptor superfamily (TNFRSF) have been identified, including decoy receptor 1 (DcR1), decoy receptor 2 (DcR2), and decoy receptor 3 (DcR3). One of the tumor necrosis factor superfamily (TNFSF) members, TNF-related apoptosis-inducing ligand (TRAIL), binds to DcR1 and DcR2, which are membranous receptors with a truncated cytoplasmic domain, thus unable to transduce TRAIL-mediated signaling. In contrast to DcR1 and DcR2, DcR3 is a soluble receptor capable of neutralizing the biological effects of three other TNFSF members: Fas ligand (FasL/TNFSF6/CD95L), LIGHT (TNFSF14) and TNF-like molecule 1A (TL1A/TNFSF15). Since FasL is a potent apoptosis- and inflammation-inducing factor, LIGHT is involved in apoptosis and inflammation, and TL1A is a T cell costimulator and is involved in gut inflammation, DcR3 can be defined as an immunomodulator on the basis of its neutralizing effects on FasL, LIGHT, and TL1A. Initial studies demonstrated that DcR3 expression is elevated in tumors cells; however, later work showed that DcR3 expression is also upregulated in inflammatory diseases, where serum DcR3 levels correlate with disease progression. In addition to its neutralizing effect, DcR3 also acts as an effector molecule to modulate cell function via 'non-decoy' activities. This review focuses on the immunomodulatory effects of DcR3 via 'decoy' and 'non-decoy' functions, and discusses the potential of DcR3 as a biomarker to predict cancer invasion and inflammation progression. We also discuss the possible utility of recombinant DcR3 as a therapeutic agent to control autoimmune diseases, as well as the potential to attenuate tumor progression by inhibiting DcR3 expression. Copyright © 2011 Elsevier Inc. All rights reserved.

  17. 'Decoy peptide' region (RIFLKRMPSI) of prorenin prosegment plays a crucial role in prorenin binding to the (pro)renin receptor.

    PubMed

    Nabi, A H M Nurun; Biswas, Kazal Boron; Nakagawa, Tsutomu; Ichihara, Atsuhiro; Inagami, Tadashi; Suzuki, Fumiaki

    2009-07-01

    This study investigated a role of decoy peptide region (R10PIFLKRMPSI19P) in prorenin prosegment for prorenin binding to the (pro)renin receptor using the surface plasmon resonance technique. Three kinds of anti-receptor antibodies labeled as anti-107/121, anti-221/235 and anti-His tag antibody were prepared. The respective antigens D107SVANSIHSLFSEET121 (close to the N-terminal side of receptor), E221IGKRYGEDSEQFRD235 (N-terminal side of the transmembrane part of receptor) and 10xHis sequence (C-terminus) were designed based on the sequence of the receptor. These antibodies were immobilized on the CM5 sensor chip by amine coupling and allowed to bind to the receptor. Human prorenin, renin and the decoy bound to the receptor associated with antibodies. Their association (ka) and dissociation (kd) rate constants were measured and the dissociation constants (KD) were determined using Langmuir 1:1 kinetic binding model. The KD for interaction of prorenin and receptor associated to anti-107/121, anti-221/235 and anti-His tag antibodies were 2.9, 1.2 and 7.8 nM, respectively and for renin they were 9.3, 4.4 and 7.1 nM. The decoy bound to the respective immobilized receptor-antibody complexes at KD's of 6.2, 3.5 and 15.2 nM. Prorenin, renin and decoy had lower KD at the nanomolar ranges compared to those of L1PPTD4P in the prorenin prosegment and A248KKRLFDYVV257 in the C-domain of mature renin. The decoy reduced the binding of not only prorenin but also renin to (P)RR. These data are direct evidence that prorenin, renin and the peptides bind to (P)RR and the decoy reduces prorenin binding, supporting our hypothesis that decoy peptide region has a crucial role in prorenin binding.

  18. Evolutionary Analysis of Functional Divergence among Chemokine Receptors, Decoy Receptors, and Viral Receptors.

    PubMed

    Daiyasu, Hiromi; Nemoto, Wataru; Toh, Hiroyuki

    2012-01-01

    Chemokine receptors (CKRs) function in the inflammatory response and in vertebrate homeostasis. Decoy and viral receptors are two types of CKR homologs with modified functions from those of the typical CKRs. The decoy receptors are able to bind ligands without signaling. On the other hand, the viral receptors show constitutive signaling without ligands. We examined the sites related to the functional difference. At first, the decoy and viral receptors were each classified into five groups, based on the molecular phylogenetic analysis. A multiple amino acid sequence alignment between each group and the CKRs was then constructed. The difference in the amino acid composition between the group and the CKRs was evaluated as the Kullback-Leibler (KL) information value at each alignment site. The KL information value is considered to reflect the difference in the functional constraints at the site. The sites with the top 5% of KL information values were selected and mapped on the structure of a CKR. The comparisons with decoy receptor groups revealed that the detected sites were biased on the intracellular side. In contrast, the sites detected from the comparisons with viral receptor groups were found on both the extracellular and intracellular sides. More sites were found in the ligand binding pocket in the analyses of the viral receptor groups, as compared to the decoy receptor groups. Some of the detected sites were located in the GPCR motifs. For example, the DRY motif of the decoy receptors was often degraded, although the motif of the viral receptors was basically conserved. The observations for the viral receptor groups suggested that the constraints in the pocket region are loose and that the sites on the intracellular side are different from those for the decoy receptors, which may be related to the constitutive signaling activity of the viral receptors.

  19. Effects of intratracheal administration of nuclear factor-kappaB decoy oligodeoxynucleotides on long-term cigarette smoke-induced lung inflammation and pathology in mice

    PubMed Central

    2009-01-01

    To determine if nuclear factor-κB (NF-κB) activation may be a key factor in lung inflammation and respiratory dysfunction, we investigated whether NF-κB can be blocked by intratracheal administration of NF-κB decoy oligodeoxynucleotides (ODNs), and whether decoy ODN-mediated NF-κB inhibition can prevent smoke-induced lung inflammation, respiratory dysfunction, and improve pathological alteration in the small airways and lung parenchyma in the long-term smoke-induced mouse model system. We also detected changes in transcriptional factors. In vivo, the transfection efficiency of NF-κB decoy ODNs to alveolar macrophages in BALF was measured by fluorescein isothiocyanate (FITC)-labeled NF-κB decoy ODNs and flow cytometry post intratracheal ODN administration. Pulmonary function was measured by pressure sensors, and pathological changes were assessed using histology and the pathological Mias software. NF-κB and activator protein 1(AP-1) activity was detected by the electrophoretic motility shift assay (EMSA). Mouse cytokine and chemokine pulmonary expression profiles were investigated by enzyme-linked immunosorbent assay (ELISA) in bronchoalveolar lavage fluid (BALF) and lung tissue homogenates, respectively, after repeated exposure to cigarette smoke. After 24 h, the percentage of transfected alveolar macrophages was 30.00 ± 3.30%. Analysis of respiratory function indicated that transfection of NF-κB decoy ODNs significantly impacted peak expiratory flow (PEF), and bronchoalveolar lavage cytology displayed evidence of decreased macrophage infiltration in airways compared to normal saline-treated or scramble NF-κB decoy ODNs smoke exposed mice. NF-κB decoy ODNs inhibited significantly level of macrophage inflammatory protein (MIP) 1α and monocyte chemoattractant protein 1(MCP-1) in lung homogenates compared to normal saline-treated smoke exposed mice. In contrast, these NF-κB decoy ODNs-treated mice showed significant increase in the level of tumor necrosis factor-α(TNF-α) and pro-MMP-9(pro-matrix metalloproteinase-9) in mice BALF. Further measurement revealed administration of NF-κB decoy ODNs did not prevent pathological changes. These findings indicate that NF-κB activation play an important role on the recruitment of macrophages and pulmonary dysfunction in smoke-induced chronic lung inflammation, and with the exception of NF-κB pathway, there might be complex mechanism governing molecular dynamics of pro-inflammatory cytokines expression and structural changes in small airways and pulmonary parenchyma in vivo. PMID:19706153

  20. Design and Implementation of Decoy Enhanced Dynamic Virtualization Networks

    DTIC Science & Technology

    2016-12-12

    From - To) 12/12/2016 Final 07/01/2015-08/31/2016 4. TITLE AND SUBTITLE Sa. CONTRACT NUMBER Design and Implementation of Decoy Enhanced Dynamic...TELEPHONE NUMBER (Include area code) 703-993-1715 Standard Form 298 (Rev . 8/98) Prescribed by ANSI Std . Z39.18 " Design and Implementation of...8 2 Design and Implementation ofDecoy Enhanced Dynamic Virtualization Networks 1 Major Goals The relatively static configurations of networks and

  1. Monitoring of West Nile virus, Usutu virus and Meaban virus in waterfowl used as decoys and wild raptors in southern Spain.

    PubMed

    Jurado-Tarifa, E; Napp, S; Lecollinet, S; Arenas, A; Beck, C; Cerdà-Cuéllar, M; Fernández-Morente, M; García-Bocanegra, I

    2016-12-01

    In the last decade, the number of emerging flaviviruses described worldwide has increased considerably, with wild birds acting as the main reservoir hosts of these viruses. We carried out an epidemiological survey to determine the seroprevalence of antigenically related flaviviruses, particularly West Nile virus (WNV), Usutu virus (USUV) and Meaban virus (MBV), in waterfowl used as decoys and wild raptors in Andalusia (southern Spain), the region considered to have the highest risk of flaviviruses circulation in Spain. The overall flaviviruses seroprevalence according to bELISA was 13.0% in both in decoys (n=1052) and wild raptors (n=123). Specific antibodies against WNV, USUV and MBV were confirmed by micro virus neutralization tests in 12, 38 and 4 of the seropositive decoys, respectively. This is the first study on WNV and USUV infections in decoys and the first report of MBV infections in waterfowl and raptors. Moreover we report the first description of WNV infections in short-toed snake eagle (Circaetus gallicus) and Montagu's harrier (Circus pygargus). The seropositivity obtained indicates widespread but not homogeneous distribution of WNV and USUV in Andalusia. The results also confirm endemic circulation of WNV, USUV and MBV in both decoys and wild raptors in southern Spain. Our results highlight the need to implement surveillance and control programs not only for WNV but also for other related flaviviruses. Further research is needed to determine the eco-epidemiological role that waterfowl and wild raptors play in the transmission of emerging flaviviruses, especially in decoys, given their close interactions with humans. Copyright © 2016 Elsevier Ltd. All rights reserved.

  2. Intrathecal administration of AYX2 DNA decoy produces a long-term pain treatment in rat models of chronic pain by inhibiting the KLF6, KLF9, and KLF15 transcription factors

    PubMed Central

    Klukinov, Michael; Harris, Scott; Manning, Donald C; Xie, Simon; Pascual, Conrado; Taylor, Bradley K; Donahue, Renee R; Yeomans, David C

    2017-01-01

    Background Nociception is maintained by genome-wide regulation of transcription in the dorsal root ganglia—spinal cord network. Hence, transcription factors constitute a promising class of targets for breakthrough pharmacological interventions to treat chronic pain. DNA decoys are oligonucleotides and specific inhibitors of transcription factor activities. A methodological series of in vivo–in vitro screening cycles was performed with decoy/transcription factor couples to identify targets capable of producing a robust and long-lasting inhibition of established chronic pain. Decoys were injected intrathecally and their efficacy was tested in the spared nerve injury and chronic constriction injury models of chronic pain in rats using repetitive von Frey testing. Results Results demonstrated that a one-time administration of decoys binding to the Kruppel-like transcription factors (KLFs) 6, 9, and 15 produces a significant and weeks–month long reduction in mechanical hypersensitivity compared to controls. In the spared nerve injury model, decoy efficacy was correlated to its capacity to bind KLF15 and KLF9 at a specific ratio, while in the chronic constriction injury model, efficacy was correlated to the combined binding capacity to KLF6 and KLF9. AYX2, an 18-bp DNA decoy binding KLF6, KLF9, and KLF15, was optimized for clinical development, and it demonstrated significant efficacy in these models. Conclusions These data highlight KLF6, KLF9, and KLF15 as transcription factors required for the maintenance of chronic pain and illustrate the potential therapeutic benefits of AYX2 for the treatment of chronic pain. PMID:28814144

  3. Decoy trapping and rocket-netting for northern pintails in spring

    USGS Publications Warehouse

    Grand, James B.; Fondell, Thomas F.

    1994-01-01

    Decoy traps and rocket-nets were compared for capturing Northern Pintails (Anas acuta: hereafter pintails) during May 1991 on the Yukon Flats, Alaska. Males were captured at similar rates using both methods (1.38 vs. 1.07 males/trap d, respectively), but baited rocket-nets were more efficient than decoy traps for capturing females (0.52 vs. 0.12 females/trap d). There were no significant differences in masses of pintails captured by each method.

  4. Potential role of DNA methylation as a facilitator of target search processes for transcription factors through interplay with methyl-CpG-binding proteins

    PubMed Central

    Kemme, Catherine A.; Marquez, Rolando; Luu, Ross H.

    2017-01-01

    Abstract Eukaryotic genomes contain numerous non-functional high-affinity sequences for transcription factors. These sequences potentially serve as natural decoys that sequester transcription factors. We have previously shown that the presence of sequences similar to the target sequence could substantially impede association of the transcription factor Egr-1 with its targets. In this study, using a stopped-flow fluorescence method, we examined the kinetic impact of DNA methylation of decoys on the search process of the Egr-1 zinc-finger protein. We analyzed its association with an unmethylated target site on fluorescence-labeled DNA in the presence of competitor DNA duplexes, including Egr-1 decoys. DNA methylation of decoys alone did not affect target search kinetics. In the presence of the MeCP2 methyl-CpG-binding domain (MBD), however, DNA methylation of decoys substantially (∼10-30-fold) accelerated the target search process of the Egr-1 zinc-finger protein. This acceleration did not occur when the target was also methylated. These results suggest that when decoys are methylated, MBD proteins can block them and thereby allow Egr-1 to avoid sequestration in non-functional locations. This effect may occur in vivo for DNA methylation outside CpG islands (CGIs) and could facilitate localization of some transcription factors within regulatory CGIs, where DNA methylation is rare. PMID:28486614

  5. Structure and decoy-mediated inhibition of the SOX18/Prox1-DNA interaction

    PubMed Central

    Klaus, Miriam; Prokoph, Nina; Girbig, Mathias; Wang, Xuecong; Huang, Yong-Heng; Srivastava, Yogesh; Hou, Linlin; Narasimhan, Kamesh; Kolatkar, Prasanna R.; Francois, Mathias; Jauch, Ralf

    2016-01-01

    The transcription factor (TF) SOX18 drives lymphatic vessel development in both embryogenesis and tumour-induced neo-lymphangiogenesis. Genetic disruption of Sox18 in a mouse model protects from tumour metastasis and established the SOX18 protein as a molecular target. Here, we report the crystal structure of the SOX18 DNA binding high-mobility group (HMG) box bound to a DNA element regulating Prox1 transcription. The crystals diffracted to 1.75Å presenting the highest resolution structure of a SOX/DNA complex presently available revealing water structure, structural adjustments at the DNA contact interface and non-canonical conformations of the DNA backbone. To explore alternatives to challenging small molecule approaches for targeting the DNA-binding activity of SOX18, we designed a set of five decoys based on modified Prox1-DNA. Four decoys potently inhibited DNA binding of SOX18 in vitro and did not interact with non-SOX TFs. Serum stability, nuclease resistance and thermal denaturation assays demonstrated that a decoy circularized with a hexaethylene glycol linker and terminal phosphorothioate modifications is most stable. This SOX decoy also interfered with the expression of a luciferase reporter under control of a SOX18-dependent VCAM1 promoter in COS7 cells. Collectively, we propose SOX decoys as potential strategy for inhibiting SOX18 activity to disrupt tumour-induced neo-lymphangiogenesis. PMID:26939885

  6. Optimal visual simulation of the self-tracking combustion of the infrared decoy based on the particle system

    NASA Astrophysics Data System (ADS)

    Hu, Qi; Duan, Jin; Wang, LiNing; Zhai, Di

    2016-09-01

    The high-efficiency simulation test of military weapons has a very important effect on the high cost of the actual combat test and the very demanding operational efficiency. Especially among the simulative emulation methods of the explosive smoke, the simulation method based on the particle system has generated much attention. In order to further improve the traditional simulative emulation degree of the movement process of the infrared decoy during the real combustion cycle, this paper, adopting the virtual simulation platform of OpenGL and Vega Prime and according to their own radiation characteristics and the aerodynamic characteristics of the infrared decoy, has simulated the dynamic fuzzy characteristics of the infrared decoy during the real combustion cycle by using particle system based on the double depth peeling algorithm and has solved key issues such as the interface, coordinate conversion and the retention and recovery of the Vega Prime's status. The simulation experiment has basically reached the expected improvement purpose, effectively improved the simulation fidelity and provided theoretical support for improving the performance of the infrared decoy.

  7. Progressive calibration and averaging for tandem mass spectrometry statistical confidence estimation: Why settle for a single decoy?

    PubMed Central

    Keich, Uri; Noble, William Stafford

    2017-01-01

    Estimating the false discovery rate (FDR) among a list of tandem mass spectrum identifications is mostly done through target-decoy competition (TDC). Here we offer two new methods that can use an arbitrarily small number of additional randomly drawn decoy databases to improve TDC. Specifically, “Partial Calibration” utilizes a new meta-scoring scheme that allows us to gradually benefit from the increase in the number of identifications calibration yields and “Averaged TDC” (a-TDC) reduces the liberal bias of TDC for small FDR values and its variability throughout. Combining a-TDC with “Progressive Calibration” (PC), which attempts to find the “right” number of decoys required for calibration we see substantial impact in real datasets: when analyzing the Plasmodium falciparum data it typically yields almost the entire 17% increase in discoveries that “full calibration” yields (at FDR level 0.05) using 60 times fewer decoys. Our methods are further validated using a novel realistic simulation scheme and importantly, they apply more generally to the problem of controlling the FDR among discoveries from searching an incomplete database. PMID:29326989

  8. Deception Algorithm. Appendices

    DTIC Science & Technology

    1994-06-30

    NOT. THE RAIN AND MUD MADE QUITE SLIPPERY. COULDHAVE BEEN QUITE A FEW INJURIES WHEN LUGGING THE DECOY AROUND. 1111 37106 HF7A HFCMT IN MOPP4 IT WAS... 10 TIMES. 1009 35115 HF5A FFCMT THE TARGET BACKGROUND HELPED GIVE AWAY THE DECOYS BECAUSE THEY WERE PUT UP ON THE SIDE OF A HILL. COLOR WAS DARKER...FFENGCMT I ENGAGED TARGETS THAT I THOUGHT WERE DECOYS APPROXIMATELY 10 TIMES BECAUSE OF RANGE TO TARGET. I COULD NOT ID MOST OF THE TIME AT NIGHT AT LONG

  9. Two New Tools for Glycopeptide Analysis Researchers: A Glycopeptide Decoy Generator and a Large Data Set of Assigned CID Spectra of Glycopeptides.

    PubMed

    Lakbub, Jude C; Su, Xiaomeng; Zhu, Zhikai; Patabandige, Milani W; Hua, David; Go, Eden P; Desaire, Heather

    2017-08-04

    The glycopeptide analysis field is tightly constrained by a lack of effective tools that translate mass spectrometry data into meaningful chemical information, and perhaps the most challenging aspect of building effective glycopeptide analysis software is designing an accurate scoring algorithm for MS/MS data. We provide the glycoproteomics community with two tools to address this challenge. The first tool, a curated set of 100 expert-assigned CID spectra of glycopeptides, contains a diverse set of spectra from a variety of glycan types; the second tool, Glycopeptide Decoy Generator, is a new software application that generates glycopeptide decoys de novo. We developed these tools so that emerging methods of assigning glycopeptides' CID spectra could be rigorously tested. Software developers or those interested in developing skills in expert (manual) analysis can use these tools to facilitate their work. We demonstrate the tools' utility in assessing the quality of one particular glycopeptide software package, GlycoPep Grader, which assigns glycopeptides to CID spectra. We first acquired the set of 100 expert assigned CID spectra; then, we used the Decoy Generator (described herein) to generate 20 decoys per target glycopeptide. The assigned spectra and decoys were used to test the accuracy of GlycoPep Grader's scoring algorithm; new strengths and weaknesses were identified in the algorithm using this approach. Both newly developed tools are freely available. The software can be downloaded at http://glycopro.chem.ku.edu/GPJ.jar.

  10. Structure-Based Rational Design of a Toll-like Receptor 4 (TLR4) Decoy Receptor with High Binding Affinity for a Target Protein

    PubMed Central

    Lee, Sang-Chul; Hong, Seungpyo; Park, Keunwan; Jeon, Young Ho; Kim, Dongsup; Cheong, Hae-Kap; Kim, Hak-Sung

    2012-01-01

    Repeat proteins are increasingly attracting much attention as alternative scaffolds to immunoglobulin antibodies due to their unique structural features. Nonetheless, engineering interaction interface and understanding molecular basis for affinity maturation of repeat proteins still remain a challenge. Here, we present a structure-based rational design of a repeat protein with high binding affinity for a target protein. As a model repeat protein, a Toll-like receptor4 (TLR4) decoy receptor composed of leucine-rich repeat (LRR) modules was used, and its interaction interface was rationally engineered to increase the binding affinity for myeloid differentiation protein 2 (MD2). Based on the complex crystal structure of the decoy receptor with MD2, we first designed single amino acid substitutions in the decoy receptor, and obtained three variants showing a binding affinity (KD) one-order of magnitude higher than the wild-type decoy receptor. The interacting modes and contributions of individual residues were elucidated by analyzing the crystal structures of the single variants. To further increase the binding affinity, single positive mutations were combined, and two double mutants were shown to have about 3000- and 565-fold higher binding affinities than the wild-type decoy receptor. Molecular dynamics simulations and energetic analysis indicate that an additive effect by two mutations occurring at nearby modules was the major contributor to the remarkable increase in the binding affinities. PMID:22363519

  11. Potential role of DNA methylation as a facilitator of target search processes for transcription factors through interplay with methyl-CpG-binding proteins.

    PubMed

    Kemme, Catherine A; Marquez, Rolando; Luu, Ross H; Iwahara, Junji

    2017-07-27

    Eukaryotic genomes contain numerous non-functional high-affinity sequences for transcription factors. These sequences potentially serve as natural decoys that sequester transcription factors. We have previously shown that the presence of sequences similar to the target sequence could substantially impede association of the transcription factor Egr-1 with its targets. In this study, using a stopped-flow fluorescence method, we examined the kinetic impact of DNA methylation of decoys on the search process of the Egr-1 zinc-finger protein. We analyzed its association with an unmethylated target site on fluorescence-labeled DNA in the presence of competitor DNA duplexes, including Egr-1 decoys. DNA methylation of decoys alone did not affect target search kinetics. In the presence of the MeCP2 methyl-CpG-binding domain (MBD), however, DNA methylation of decoys substantially (∼10-30-fold) accelerated the target search process of the Egr-1 zinc-finger protein. This acceleration did not occur when the target was also methylated. These results suggest that when decoys are methylated, MBD proteins can block them and thereby allow Egr-1 to avoid sequestration in non-functional locations. This effect may occur in vivo for DNA methylation outside CpG islands (CGIs) and could facilitate localization of some transcription factors within regulatory CGIs, where DNA methylation is rare. © The Author(s) 2017. Published by Oxford University Press on behalf of Nucleic Acids Research.

  12. Notch Decoys that Selectively Block Dll/Notch or Jagged/Notch Disrupt Angiogenesis by Unique Mechanisms to Inhibit Tumor Growth

    PubMed Central

    Kangsamaksin, Thaned; Murtomaki, Aino; Kofler, Natalie M.; Cuervo, Henar; Chaudhri, Reyhaan A.; Tattersall, Ian W.; Rosenstiel, Paul E.; Shawber, Carrie J.; Kitajewski, Jan

    2015-01-01

    A pro-angiogenic role for Jagged-dependent activation of Notch signaling in the endothelium has yet to be described. Using proteins that encoded different NOTCH1 EGF-like repeats, we identified unique regions of DLL-class and JAG-class ligand/receptor interactions, and developed Notch decoys that function as ligand-specific Notch inhibitors. N110-24 decoy blocked JAG1/JAG2-mediated NOTCH1 signaling, angiogenic sprouting in vitro and retinal angiogenesis, demonstrating JAG-dependent Notch signal activation promotes angiogenesis. In tumors, N110-24 decoy reduced angiogenic sprouting, vessel perfusion, pericyte coverage, and tumor growth. JAG/NOTCH signaling uniquely inhibited expression of anti-angiogenic sVEFGFR-1/sFlt-1. N11-13 decoy interfered with DLL1/DLL4-mediated NOTCH1 signaling and caused endothelial hypersprouting in vitro, in retinal angiogenesis and in tumors. Thus, blockade of JAG- or DLL-mediated Notch signaling inhibits angiogenesis by distinct mechanisms. JAG/Notch signaling positively regulates angiogenesis by suppressing sVEGFR-1/sFlt-1 and promoting mural/endothelial cell interactions. Blockade of JAG-class ligands represents a novel, viable therapeutic approach to block tumor angiogenesis and growth. PMID:25387766

  13. Aptamer-Mediated Codelivery of Doxorubicin and NF-κB Decoy Enhances Chemosensitivity of Pancreatic Tumor Cells

    PubMed Central

    Porciani, David; Tedeschi, Lorena; Marchetti, Laura; Citti, Lorenzo; Piazza, Vincenzo; Beltram, Fabio; Signore, Giovanni

    2015-01-01

    Aptamers able to bind efficiently cell-surface receptors differentially expressed in tumor and in healthy cells are emerging as powerful tools to perform targeted anticancer therapy. Here, we present a novel oligonucleotide chimera, composed by an RNA aptamer and a DNA decoy. Our assembly is able to (i) target tumor cells via an antitransferrin receptor RNA aptamer and (ii) perform selective codelivery of a chemotherapeutic drug (Doxorubicin) and of an inhibitor of a cell-survival factor, the nuclear factor κB decoy oligonucleotide. Both payloads are released under conditions found in endolysosomal compartments (low pH and reductive environment). Targeting and cytotoxicity of the oligonucleotidic chimera were assessed by confocal microscopy, cell viability, and Western blot analysis. These data indicated that the nuclear factor κB decoy does inhibit nuclear factor κB activity and ultimately leads to an increased therapeutic efficacy of Doxorubicin selectively in tumor cells. PMID:25919089

  14. Adaptive Machine Vision.

    DTIC Science & Technology

    1992-06-18

    developed by Fukushima . The system has potential use for SDI target/decoy discrimination. For testing purposes, simulated angle-angle and range-Doppler...properties and computational requirements of the Neocognitron, a patern recognition neural network developed by Fukushima . The RADONN effort builds upon...and Information Processing, 17-21 June 1991, Plymouth State College, Plymouth, New Hampshire.) 5.0 References 1. Kunihiko Fukushima , Sei Miyake, and

  15. Novel nonlinear knowledge-based mean force potentials based on machine learning.

    PubMed

    Dong, Qiwen; Zhou, Shuigeng

    2011-01-01

    The prediction of 3D structures of proteins from amino acid sequences is one of the most challenging problems in molecular biology. An essential task for solving this problem with coarse-grained models is to deduce effective interaction potentials. The development and evaluation of new energy functions is critical to accurately modeling the properties of biological macromolecules. Knowledge-based mean force potentials are derived from statistical analysis of proteins of known structures. Current knowledge-based potentials are almost in the form of weighted linear sum of interaction pairs. In this study, a class of novel nonlinear knowledge-based mean force potentials is presented. The potential parameters are obtained by nonlinear classifiers, instead of relative frequencies of interaction pairs against a reference state or linear classifiers. The support vector machine is used to derive the potential parameters on data sets that contain both native structures and decoy structures. Five knowledge-based mean force Boltzmann-based or linear potentials are introduced and their corresponding nonlinear potentials are implemented. They are the DIH potential (single-body residue-level Boltzmann-based potential), the DFIRE-SCM potential (two-body residue-level Boltzmann-based potential), the FS potential (two-body atom-level Boltzmann-based potential), the HR potential (two-body residue-level linear potential), and the T32S3 potential (two-body atom-level linear potential). Experiments are performed on well-established decoy sets, including the LKF data set, the CASP7 data set, and the Decoys “R”Us data set. The evaluation metrics include the energy Z score and the ability of each potential to discriminate native structures from a set of decoy structures. Experimental results show that all nonlinear potentials significantly outperform the corresponding Boltzmann-based or linear potentials, and the proposed discriminative framework is effective in developing knowledge-based mean force potentials. The nonlinear potentials can be widely used for ab initio protein structure prediction, model quality assessment, protein docking, and other challenging problems in computational biology.

  16. Does life history predict risk-taking behavior of wintering dabbling ducks?

    USGS Publications Warehouse

    Ackerman, Joshua T.; Eadie, J.M.; Moore, T.G.

    2006-01-01

    Life-history theory predicts that longer-lived, less fecund species should take fewer risks when exposed to predation than shorter-lived, more fecund species. We tested this prediction for seven species of dabbling ducks (Anas) by measuring the approach behavior (behavior of ducks when approaching potential landing sites) of 1099 duck flocks during 37 hunting trials and 491 flocks during 13 trials conducted immediately after the 1999-2000 waterfowl hunting season in California, USA. We also experimentally manipulated the attractiveness of the study site by using two decoy treatments: (1) traditional, stationary decoys only, and (2) traditional decoys in conjunction with a mechanical spinning-wing decoy. Approach behavior of ducks was strongly correlated with their life history. Minimum approach distance was negatively correlated with reproductive output during each decoy treatment and trial type. Similarly, the proportion of flocks taking risk (approaching landing sites to within 45 m) was positively correlated with reproductive output. We found similar patterns of approach behavior in relation to other life-history parameters (i.e., adult female body mass and annual adult female survival rate). Thus, species characterized by a slower life-history strategy (e.g., Northern Pintail [A. acuta]) were more risk-averse than species with a faster life-history strategy (e.g., Cinnamon Teal [A. cyanoptera]). Furthermore, although we were able to reduce risk-averseness using the spinning-wing decoy, we were unable to override the influence of life history on risk-taking behavior. Alternative explanations did not account for the observed correlation between approach behavior and life-history parameters. These results suggest that life history influences the risk-taking behavior of dabbling ducks and provide an explanation for the differential vulnerability of waterfowl to harvest. ?? The Cooper Ornithological Society 2006.

  17. An Unbiased Method To Build Benchmarking Sets for Ligand-Based Virtual Screening and its Application To GPCRs

    PubMed Central

    2015-01-01

    Benchmarking data sets have become common in recent years for the purpose of virtual screening, though the main focus had been placed on the structure-based virtual screening (SBVS) approaches. Due to the lack of crystal structures, there is great need for unbiased benchmarking sets to evaluate various ligand-based virtual screening (LBVS) methods for important drug targets such as G protein-coupled receptors (GPCRs). To date these ready-to-apply data sets for LBVS are fairly limited, and the direct usage of benchmarking sets designed for SBVS could bring the biases to the evaluation of LBVS. Herein, we propose an unbiased method to build benchmarking sets for LBVS and validate it on a multitude of GPCRs targets. To be more specific, our methods can (1) ensure chemical diversity of ligands, (2) maintain the physicochemical similarity between ligands and decoys, (3) make the decoys dissimilar in chemical topology to all ligands to avoid false negatives, and (4) maximize spatial random distribution of ligands and decoys. We evaluated the quality of our Unbiased Ligand Set (ULS) and Unbiased Decoy Set (UDS) using three common LBVS approaches, with Leave-One-Out (LOO) Cross-Validation (CV) and a metric of average AUC of the ROC curves. Our method has greatly reduced the “artificial enrichment” and “analogue bias” of a published GPCRs benchmarking set, i.e., GPCR Ligand Library (GLL)/GPCR Decoy Database (GDD). In addition, we addressed an important issue about the ratio of decoys per ligand and found that for a range of 30 to 100 it does not affect the quality of the benchmarking set, so we kept the original ratio of 39 from the GLL/GDD. PMID:24749745

  18. An unbiased method to build benchmarking sets for ligand-based virtual screening and its application to GPCRs.

    PubMed

    Xia, Jie; Jin, Hongwei; Liu, Zhenming; Zhang, Liangren; Wang, Xiang Simon

    2014-05-27

    Benchmarking data sets have become common in recent years for the purpose of virtual screening, though the main focus had been placed on the structure-based virtual screening (SBVS) approaches. Due to the lack of crystal structures, there is great need for unbiased benchmarking sets to evaluate various ligand-based virtual screening (LBVS) methods for important drug targets such as G protein-coupled receptors (GPCRs). To date these ready-to-apply data sets for LBVS are fairly limited, and the direct usage of benchmarking sets designed for SBVS could bring the biases to the evaluation of LBVS. Herein, we propose an unbiased method to build benchmarking sets for LBVS and validate it on a multitude of GPCRs targets. To be more specific, our methods can (1) ensure chemical diversity of ligands, (2) maintain the physicochemical similarity between ligands and decoys, (3) make the decoys dissimilar in chemical topology to all ligands to avoid false negatives, and (4) maximize spatial random distribution of ligands and decoys. We evaluated the quality of our Unbiased Ligand Set (ULS) and Unbiased Decoy Set (UDS) using three common LBVS approaches, with Leave-One-Out (LOO) Cross-Validation (CV) and a metric of average AUC of the ROC curves. Our method has greatly reduced the "artificial enrichment" and "analogue bias" of a published GPCRs benchmarking set, i.e., GPCR Ligand Library (GLL)/GPCR Decoy Database (GDD). In addition, we addressed an important issue about the ratio of decoys per ligand and found that for a range of 30 to 100 it does not affect the quality of the benchmarking set, so we kept the original ratio of 39 from the GLL/GDD.

  19. Clinical Utility of Urinary Cytology to Detect BK Viral Nephropathy.

    PubMed

    Nankivell, Brian J; Renthawa, Jasveen; Jeoffreys, Neisha; Kable, Kathy; O'Connell, Philip J; Chapman, Jeremy R; Wong, Germaine; Sharma, Raghwa N

    2015-08-01

    Reactivation of BK polyoma virus can result in destructive viral allograft nephropathy (BKVAN) with limited treatment options. Screening programs using surrogate markers of viral replication are important preventive strategies, guiding immunosuppression reduction. We prospectively evaluated the diagnostic test performance of urinary decoy cells and urinary SV40T immunochemistry of exfoliated cells, to screen for BKVAN, (defined by reference histology with SV40 immunohistochemistry, n = 704 samples), compared with quantitative viremia, from 211 kidney and 141 kidney-pancreas transplant recipients. The disease prevalence of BKVAN was 2.6%. Decoy cells occurred in 95 of 704 (13.5%) samples, with a sensitivity of 66.7%, specificity of 88.6%, positive predictive value (PPV) of 11.7%, and negative predictive value of 98.5% to predict histologically proven BKVAN. Quantification of decoy cells improved the PPV to 32.1% (10 ≥ cells threshold). Immunohistochemical staining of urinary exfoliated cells for SV40T improved sensitivity to 85.7%, detecting atypical or degenerate infected cells (specificity of 92.3% and PPV of 33.3%), but was hampered by technical failures. Viremia occurred in 90 of 704 (12.8%) with sensitivity of 96.3%, specificity of 90.3%, PPV of 31.5%, and negative predictive value of 99.8%. The receiver-operator curve performance of quantitative viremia surpassed decoy cells (area under the curve of 0.95 and 0.79, respectively, P = 0.0018 for differences). Combining decoy cell and BK viremia in a diagnostic matrix improved prediction of BKVAN and diagnostic risk stratification, especially for high-level positive results. Although quantified decoy cells are acceptable surrogate markers of BK viral replication with unexceptional test performances, quantitative viremia displayed superior test characteristics and is suggested as the screening test of choice.

  20. An engineered Axl 'decoy receptor' effectively silences the Gas6-Axl signaling axis

    DOE PAGES

    Kariolis, Mihalis S.; Miao, Yu Rebecca; Jones, Douglas S.; ...

    2014-09-21

    Aberrant signaling through the Axl receptor tyrosine kinase has been associated with a myriad of human diseases, most notably metastatic cancer, identifying Axl and its ligand Gas6 as important therapeutic targets. Using rational and combinatorial approaches, we engineered an Axl ‘decoy receptor’ that binds Gas6 with high affinity and inhibits its function, offering an alternative approach from drug discovery efforts that directly target Axl. Four mutations within this high affinity Axl variant caused structural alterations in side chains across the Gas6/Axl binding interface, stabilizing a conformational change on Gas6. When reformatted as an Fc-fusion, the engineered decoy receptor bound tomore » Gas6 with femtomolar affinity, an 80-fold improvement compared to the wild-type Axl receptor, allowing effective sequestration of Gas6 and specific abrogation of Axl signaling. Additionally, increased Gas6 binding affinity was critical and correlative with the ability of decoy receptors to potently inhibit metastasis and disease progression in vivo.« less

  1. Countermeasure effectiveness against an intelligent imaging infrared anti-ship missile

    NASA Astrophysics Data System (ADS)

    Gray, Greer J.; Aouf, Nabil; Richardson, Mark; Butters, Brian; Walmsley, Roy

    2013-02-01

    Ship self defense against heat-seeking anti-ship missiles is of great concern to modern naval forces. One way of protecting ships against these threats is to use infrared (IR) offboard countermeasures. These decoys need precise placement to maximize their effectiveness, and simulation is an invaluable tool used in determining optimum deployment strategies. To perform useful simulations, high-fidelity models of missiles are required. We describe the development of an imaging IR anti-ship missile model for use in countermeasure effectiveness simulations. The missile model's tracking algorithm is based on a target recognition system that uses a neural network to discriminate between ships and decoys. The neural network is trained on shape- and intensity-based features extracted from simulated imagery. The missile model is then used within ship-decoy-missile engagement simulations, to determine how susceptible it is to the well-known walk-off seduction countermeasure technique. Finally, ship survivability is improved by adjusting the decoy model to increase its effectiveness against the tracker.

  2. Adaptive spatial filtering of daytime sky noise in a satellite quantum key distribution downlink receiver

    NASA Astrophysics Data System (ADS)

    Gruneisen, Mark T.; Sickmiller, Brett A.; Flanagan, Michael B.; Black, James P.; Stoltenberg, Kurt E.; Duchane, Alexander W.

    2016-02-01

    Spatial filtering is an important technique for reducing sky background noise in a satellite quantum key distribution downlink receiver. Atmospheric turbulence limits the extent to which spatial filtering can reduce sky noise without introducing signal losses. Using atmospheric propagation and compensation simulations, the potential benefit of adaptive optics (AO) to secure key generation (SKG) is quantified. Simulations are performed assuming optical propagation from a low-Earth-orbit satellite to a terrestrial receiver that includes AO. Higher-order AO correction is modeled assuming a Shack-Hartmann wavefront sensor and a continuous-face-sheet deformable mirror. The effects of atmospheric turbulence, tracking, and higher-order AO on the photon capture efficiency are simulated using statistical representations of turbulence and a time-domain wave-optics hardware emulator. SKG rates are calculated for a decoy-state protocol as a function of the receiver field of view for various strengths of turbulence, sky radiances, and pointing angles. The results show that at fields of view smaller than those discussed by others, AO technologies can enhance SKG rates in daylight and enable SKG where it would otherwise be prohibited as a consequence of background optical noise and signal loss due to propagation and turbulence effects.

  3. Measurement-device-independent quantum key distribution with multiple crystal heralded source with post-selection

    NASA Astrophysics Data System (ADS)

    Chen, Dong; Shang-Hong, Zhao; MengYi, Deng

    2018-03-01

    The multiple crystal heralded source with post-selection (MHPS), originally introduced to improve the single-photon character of the heralded source, has specific applications for quantum information protocols. In this paper, by combining decoy-state measurement-device-independent quantum key distribution (MDI-QKD) with spontaneous parametric downconversion process, we present a modified MDI-QKD scheme with MHPS where two architectures are proposed corresponding to symmetric scheme and asymmetric scheme. The symmetric scheme, which linked by photon switches in a log-tree structure, is adopted to overcome the limitation of the current low efficiency of m-to-1 optical switches. The asymmetric scheme, which shows a chained structure, is used to cope with the scalability issue with increase in the number of crystals suffered in symmetric scheme. The numerical simulations show that our modified scheme has apparent advances both in transmission distance and key generation rate compared to the original MDI-QKD with weak coherent source and traditional heralded source with post-selection. Furthermore, the recent advances in integrated photonics suggest that if built into a single chip, the MHPS might be a practical alternative source in quantum key distribution tasks requiring single photons to work.

  4. Why Do Irrelevant Alternatives Matter? An fMRI-TMS Study of Context-Dependent Preferences.

    PubMed

    Chung, Hui-Kuan; Sjöström, Tomas; Lee, Hsin-Ju; Lu, Yi-Ta; Tsuo, Fu-Yun; Chen, Tzai-Shuen; Chang, Chi-Fu; Juan, Chi-Hung; Kuo, Wen-Jui; Huang, Chen-Ying

    2017-11-29

    Both humans and animals are known to exhibit a violation of rationality known as "decoy effect": introducing an irrelevant option (a decoy) can influence choices among other (relevant) options. Exactly how and why decoys trigger this effect is not known. It may be an example of fast heuristic decision-making, which is adaptive in natural environments, but may lead to biased choices in certain markets or experiments. We used fMRI and transcranial magnetic stimulation to investigate the neural underpinning of the decoy effect of both sexes. The left ventral striatum was more active when the chosen option dominated the decoy. This is consistent with the hypothesis that the presence of a decoy option influences the valuation of other options, making valuation context-dependent even when choices appear fully rational. Consistent with the idea that control is recruited to prevent heuristics from producing biased choices, the right inferior frontal gyrus, often implicated in inhibiting prepotent responses, connected more strongly with the striatum when subjects successfully overrode the decoy effect and made unbiased choices. This is further supported by our transcranial magnetic stimulation experiment: subjects whose right inferior frontal gyrus was temporarily disrupted made biased choices more often than a control group. Our results suggest that the neural basis of the decoy effect could be the context-dependent activation of the valuation area. But the differential connectivity from the frontal area may indicate how deliberate control monitors and corrects errors and biases in decision-making. SIGNIFICANCE STATEMENT Standard theories of rational decision-making assume context-independent valuations of available options. Motivated by the importance of this basic assumption, we used fMRI to study how the human brain assigns values to available options. We found activity in the valuation area to be consistent with the hypothesis that values depend on irrelevant aspects of the environment, even for subjects whose choices appear fully rational. Such context-dependent valuations may lead to biased decision-making. We further found differential connectivity from the frontal area to the valuation area depending on whether biases were successfully overcome. This suggests a mechanism for making rational choices despite the potential bias. Further support was obtained by a transcranial magnetic stimulation experiment, where subjects whose frontal control was temporarily disrupted made biased choices more often than a control group. Copyright © 2017 the authors 0270-6474/17/3711647-15$15.00/0.

  5. Genetic diversity and antimicrobial resistance of Campylobacter and Salmonella strains isolated from decoys and raptors.

    PubMed

    Jurado-Tarifa, E; Torralbo, A; Borge, C; Cerdà-Cuéllar, M; Ayats, T; Carbonero, A; García-Bocanegra, I

    2016-10-01

    Infections caused by thermotolerant Campylobacter spp. and Salmonella spp. are the leading causes of human gastroenteritis worldwide. Wild birds can act as reservoirs of both pathogens. A survey was carried out to determine the prevalence, genetic diversity and antimicrobial resistance of thermotolerant Campylobacter and Salmonella in waterfowl used as decoys and wild raptors in Andalusia (Southern Spain). The overall prevalence detected for Campylobacter was 5.9% (18/306; CI95%: 3.25-8.52) in decoys and 2.3% (9/387; CI95%: 0.82-3.83) in wild raptors. Isolates were identified as C. jejuni, C. coli and C. lari in both bird groups. Salmonella was isolated in 3.3% (10/306; CI95%: 2.3-4.3) and 4.6% (18/394; CI95%: 3.5-5.6) of the decoys and raptors, respectively. Salmonella Enteritidis and Typhimurium were the most frequently identified serovars, although Salmonella serovars Anatum, Bredeney, London and Mikawasima were also isolated. Pulsed-field gel electrophoresis analysis of isolates showed higher genetic diversity within Campylobacter species compared to Salmonella serovars. Campylobacter isolates showed resistance to gentamicin, ciprofloxacin and tetracycline, while resistance to erythromycin and tetracycline was found in Salmonella isolates. The results indicate that both decoys and raptors can act as natural carriers of Campylobacter and Salmonella in Spain, which may have important implications for public and animal health. Copyright © 2016 Elsevier Ltd. All rights reserved.

  6. 2035 Air Dominance Requirements for State-On-State Conflict

    DTIC Science & Technology

    2011-02-16

    story.jsp?id=news/ awst /2011/01/10/AW_01_10_ 2011_p58-280833.xml&channel=misc (accessed 3 Jan 2011). Bilbro, James. “Technology Readiness Levels.” JB...channel = awst &id =news/aw121508p2.xml&headline=null&prev=10. (accessed 3 January 2011). Global Security.org. “Miniature Air-Launched Decoy (MALD...Battle.” Center for Strategic and Budgetary Assessment, http://www.csba online.com/4Publications/PubLibrary/ R .20100518.Slides_AirSea_Batt/ R .20100518

  7. Individual differences in decision making by foraging hummingbirds.

    PubMed

    Morgan, Kate V; Hurly, T Andrew; Healy, Susan D

    2014-11-01

    For both humans and animals preference for one option over others can be influenced by the context in which the options occur. In animals, changes in preference could be due to comparative decision-making or to changes in the energy state of the animal when making decisions. We investigated which of these possibilities better explained the response of wild hummingbirds to the addition of a decoy option to a set of two options by presenting Rufous hummingbirds (Selasphorus rufus) with a foraging experiment with two treatments. In each treatment the birds were presented with a binary choice between two options and a trinary choice with three options. In treatment one the binary choice was between a volume option and a concentration option, whereas in treatment two the same volume option was presented alongside an alternative concentration option. In the trinary choice, birds were presented with the same options as in the binary choice plus one of two inferior options. Birds changed their preferences when a poorer option was added to the choice set: birds increased their preference for the same option when in the presence of either decoy. Which option differed across individuals and the changes in preference were not readily explained by either energy maximisation or the decoy effect. The consistency in response within individuals, however, would suggest that the individual itself brings an extra dimension to context-dependent decision-making. This article is part of a Special Issue entitled: Cognition in the wild. Copyright © 2014 Elsevier B.V. All rights reserved.

  8. Predicting protein complex geometries with a neural network.

    PubMed

    Chae, Myong-Ho; Krull, Florian; Lorenzen, Stephan; Knapp, Ernst-Walter

    2010-03-01

    A major challenge of the protein docking problem is to define scoring functions that can distinguish near-native protein complex geometries from a large number of non-native geometries (decoys) generated with noncomplexed protein structures (unbound docking). In this study, we have constructed a neural network that employs the information from atom-pair distance distributions of a large number of decoys to predict protein complex geometries. We found that docking prediction can be significantly improved using two different types of polar hydrogen atoms. To train the neural network, 2000 near-native decoys of even distance distribution were used for each of the 185 considered protein complexes. The neural network normalizes the information from different protein complexes using an additional protein complex identity input neuron for each complex. The parameters of the neural network were determined such that they mimic a scoring funnel in the neighborhood of the native complex structure. The neural network approach avoids the reference state problem, which occurs in deriving knowledge-based energy functions for scoring. We show that a distance-dependent atom pair potential performs much better than a simple atom-pair contact potential. We have compared the performance of our scoring function with other empirical and knowledge-based scoring functions such as ZDOCK 3.0, ZRANK, ITScore-PP, EMPIRE, and RosettaDock. In spite of the simplicity of the method and its functional form, our neural network-based scoring function achieves a reasonable performance in rigid-body unbound docking of proteins. Proteins 2010. (c) 2009 Wiley-Liss, Inc.

  9. Evidence For A Sex Pheromone in Bark Beetle Parasitoid Roptrocerus xylophagorum

    Treesearch

    Brian T. Sullivan

    2002-01-01

    Male Roptrocerus xylophagorum (Ratzeburg) (Hymenoptera: Pteromalidae) exhibited courtship and mating behaviors including wing fanning, antennation, mounting, and copulation attempts when exposed to glass bulb decoys coated with a whole-body extract of females in hexane, acetone, or methanol. Activity of extract-treated decoys declined gradually over...

  10. Modeling, Simulation, and Analysis of a Decoy State Enabled Quantum Key Distribution System

    DTIC Science & Technology

    2015-03-26

    through the fiber , we assume Alice and Bob have correct basis alignment and timing control for reference frame correction and precise photon detection...optical components ( laser , polarization modulator, electronic variable optical attenuator, fixed optical attenuator, fiber channel, beamsplitter...generated by the laser in the CPG propagate through multiple optical components, each with a unique propagation delay before reaching the OPM. Timing

  11. Double-stranded RNA transcribed from vector-based oligodeoxynucleotide acts as transcription factor decoy

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Xiao, Xiao; Gang, Yi; Department of Infectious Diseases, Tangdu Hospital, Fourth Military Medical University, Xi’an 710038, Shaanxi Province

    2015-02-06

    Highlights: • A shRNA vector based transcription factor decoy, VB-ODN, was designed. • VB-ODN for NF-κB inhibited cell viability in HEK293 cells. • VB-ODN inhibited expression of downstream genes of target transcription factors. • VB-ODN may enhance nuclear entry ratio for its feasibility of virus production. - Abstract: In this study, we designed a short hairpin RNA vector-based oligodeoxynucleotide (VB-ODN) carrying transcription factor (TF) consensus sequence which could function as a decoy to block TF activity. Specifically, VB-ODN for Nuclear factor-κB (NF-κB) could inhibit cell viability and decrease downstream gene expression in HEK293 cells without affecting expression of NF-κB itself.more » The specific binding between VB-ODN produced double-stranded RNA and NF-κB was evidenced by electrophoretic mobility shift assay. Moreover, similar VB-ODNs designed for three other TFs also inhibit their downstream gene expression but not that of themselves. Our study provides a new design of decoy for blocking TF activity.« less

  12. Structure Refinement of Protein Low Resolution Models Using the GNEIMO Constrained Dynamics Method

    PubMed Central

    Park, In-Hee; Gangupomu, Vamshi; Wagner, Jeffrey; Jain, Abhinandan; Vaidehi, Nagara-jan

    2012-01-01

    The challenge in protein structure prediction using homology modeling is the lack of reliable methods to refine the low resolution homology models. Unconstrained all-atom molecular dynamics (MD) does not serve well for structure refinement due to its limited conformational search. We have developed and tested the constrained MD method, based on the Generalized Newton-Euler Inverse Mass Operator (GNEIMO) algorithm for protein structure refinement. In this method, the high-frequency degrees of freedom are replaced with hard holonomic constraints and a protein is modeled as a collection of rigid body clusters connected by flexible torsional hinges. This allows larger integration time steps and enhances the conformational search space. In this work, we have demonstrated the use of a constraint free GNEIMO method for protein structure refinement that starts from low-resolution decoy sets derived from homology methods. In the eight proteins with three decoys for each, we observed an improvement of ~2 Å in the RMSD to the known experimental structures of these proteins. The GNEIMO method also showed enrichment in the population density of native-like conformations. In addition, we demonstrated structural refinement using a “Freeze and Thaw” clustering scheme with the GNEIMO framework as a viable tool for enhancing localized conformational search. We have derived a robust protocol based on the GNEIMO replica exchange method for protein structure refinement that can be readily extended to other proteins and possibly applicable for high throughput protein structure refinement. PMID:22260550

  13. Linear high-boost fusion of Stokes vector imagery for effective discrimination and recognition of real targets in the presence of multiple identical decoys

    NASA Astrophysics Data System (ADS)

    El-Saba, Aed; Sakla, Wesam A.

    2010-04-01

    Recently, the use of imaging polarimetry has received considerable attention for use in automatic target recognition (ATR) applications. In military remote sensing applications, there is a great demand for sensors that are capable of discriminating between real targets and decoys. Accurate discrimination of decoys from real targets is a challenging task and often requires the fusion of various sensor modalities that operate simultaneously. In this paper, we use a simple linear fusion technique known as the high-boost fusion method for effective discrimination of real targets in the presence of multiple decoys. The HBF assigns more weight to the polarization-based imagery in forming the final fused image that is used for detection. We have captured both intensity and polarization-based imagery from an experimental laboratory arrangement containing a mixture of sand/dirt, rocks, vegetation, and other objects for the purpose of simulating scenery that would be acquired in a remote sensing military application. A target object and three decoys that are identical in physical appearance (shape, surface structure and color) and different in material composition have also been placed in the scene. We use the wavelet-filter joint transform correlation (WFJTC) technique to perform detection between input scenery and the target object. Our results show that use of the HBF method increases the correlation performance metrics associated with the WFJTC-based detection process when compared to using either the traditional intensity or polarization-based images.

  14. Estimation and correction of visibility bias in aerial surveys of wintering ducks

    USGS Publications Warehouse

    Pearse, A.T.; Gerard, P.D.; Dinsmore, S.J.; Kaminski, R.M.; Reinecke, K.J.

    2008-01-01

    Incomplete detection of all individuals leading to negative bias in abundance estimates is a pervasive source of error in aerial surveys of wildlife, and correcting that bias is a critical step in improving surveys. We conducted experiments using duck decoys as surrogates for live ducks to estimate bias associated with surveys of wintering ducks in Mississippi, USA. We found detection of decoy groups was related to wetland cover type (open vs. forested), group size (1?100 decoys), and interaction of these variables. Observers who detected decoy groups reported counts that averaged 78% of the decoys actually present, and this counting bias was not influenced by either covariate cited above. We integrated this sightability model into estimation procedures for our sample surveys with weight adjustments derived from probabilities of group detection (estimated by logistic regression) and count bias. To estimate variances of abundance estimates, we used bootstrap resampling of transects included in aerial surveys and data from the bias-correction experiment. When we implemented bias correction procedures on data from a field survey conducted in January 2004, we found bias-corrected estimates of abundance increased 36?42%, and associated standard errors increased 38?55%, depending on species or group estimated. We deemed our method successful for integrating correction of visibility bias in an existing sample survey design for wintering ducks in Mississippi, and we believe this procedure could be implemented in a variety of sampling problems for other locations and species.

  15. A Scalable Approach for Protein False Discovery Rate Estimation in Large Proteomic Data Sets.

    PubMed

    Savitski, Mikhail M; Wilhelm, Mathias; Hahne, Hannes; Kuster, Bernhard; Bantscheff, Marcus

    2015-09-01

    Calculating the number of confidently identified proteins and estimating false discovery rate (FDR) is a challenge when analyzing very large proteomic data sets such as entire human proteomes. Biological and technical heterogeneity in proteomic experiments further add to the challenge and there are strong differences in opinion regarding the conceptual validity of a protein FDR and no consensus regarding the methodology for protein FDR determination. There are also limitations inherent to the widely used classic target-decoy strategy that particularly show when analyzing very large data sets and that lead to a strong over-representation of decoy identifications. In this study, we investigated the merits of the classic, as well as a novel target-decoy-based protein FDR estimation approach, taking advantage of a heterogeneous data collection comprised of ∼19,000 LC-MS/MS runs deposited in ProteomicsDB (https://www.proteomicsdb.org). The "picked" protein FDR approach treats target and decoy sequences of the same protein as a pair rather than as individual entities and chooses either the target or the decoy sequence depending on which receives the highest score. We investigated the performance of this approach in combination with q-value based peptide scoring to normalize sample-, instrument-, and search engine-specific differences. The "picked" target-decoy strategy performed best when protein scoring was based on the best peptide q-value for each protein yielding a stable number of true positive protein identifications over a wide range of q-value thresholds. We show that this simple and unbiased strategy eliminates a conceptual issue in the commonly used "classic" protein FDR approach that causes overprediction of false-positive protein identification in large data sets. The approach scales from small to very large data sets without losing performance, consistently increases the number of true-positive protein identifications and is readily implemented in proteomics analysis software. © 2015 by The American Society for Biochemistry and Molecular Biology, Inc.

  16. A Scalable Approach for Protein False Discovery Rate Estimation in Large Proteomic Data Sets

    PubMed Central

    Savitski, Mikhail M.; Wilhelm, Mathias; Hahne, Hannes; Kuster, Bernhard; Bantscheff, Marcus

    2015-01-01

    Calculating the number of confidently identified proteins and estimating false discovery rate (FDR) is a challenge when analyzing very large proteomic data sets such as entire human proteomes. Biological and technical heterogeneity in proteomic experiments further add to the challenge and there are strong differences in opinion regarding the conceptual validity of a protein FDR and no consensus regarding the methodology for protein FDR determination. There are also limitations inherent to the widely used classic target–decoy strategy that particularly show when analyzing very large data sets and that lead to a strong over-representation of decoy identifications. In this study, we investigated the merits of the classic, as well as a novel target–decoy-based protein FDR estimation approach, taking advantage of a heterogeneous data collection comprised of ∼19,000 LC-MS/MS runs deposited in ProteomicsDB (https://www.proteomicsdb.org). The “picked” protein FDR approach treats target and decoy sequences of the same protein as a pair rather than as individual entities and chooses either the target or the decoy sequence depending on which receives the highest score. We investigated the performance of this approach in combination with q-value based peptide scoring to normalize sample-, instrument-, and search engine-specific differences. The “picked” target–decoy strategy performed best when protein scoring was based on the best peptide q-value for each protein yielding a stable number of true positive protein identifications over a wide range of q-value thresholds. We show that this simple and unbiased strategy eliminates a conceptual issue in the commonly used “classic” protein FDR approach that causes overprediction of false-positive protein identification in large data sets. The approach scales from small to very large data sets without losing performance, consistently increases the number of true-positive protein identifications and is readily implemented in proteomics analysis software. PMID:25987413

  17. Effects of decoy molecules targeting NF-kappaB transcription factors in Cystic fibrosis IB3–1 cells

    PubMed Central

    Finotti, Alessia; Borgatti, Monica; Bezzerri, Valentino; Nicolis, Elena; Lampronti, Ilaria; Dechecchi, Maria; Mancini, Irene; Cabrini, Giulio; Saviano, Michele; Avitabile, Concetta; Romanelli, Alessandra; Gambari, Roberto

    2012-01-01

    One of the clinical features of cystic fibrosis (CF) is a deep inflammatory process, which is characterized by production and release of cytokines and chemokines, among which interleukin 8 (IL-8) represents one of the most important. Accordingly, there is a growing interest in developing therapies against CF to reduce the excessive inflammatory response in the airways of CF patients. Since transcription factor NF-kappaB plays a critical role in IL-8 expression, the transcription factor decoy (TFD) strategy might be of interest. In order to demonstrate that TFD against NF-kappaB interferes with the NF-kappaB pathway we proved, by chromatin immunoprecipitation (ChIP) that treatment with TFD oligodeoxyribonucleotides of cystic fibrosis IB3–1 cells infected with Pseudomonas aeruginosa leads to a decrease occupancy of the Il-8 gene promoter by NF-kappaB factors. In order to develop more stable therapeutic molecules, peptide nucleic acids (PNAs) based agents were considered. In this respect PNA-DNA-PNA (PDP) chimeras are molecules of great interest from several points of view: (1) they can be complexed with liposomes and microspheres; (2) they are resistant to DNases, serum and cytoplasmic extracts; (3) they are potent decoy molecules. By using electrophoretic mobility shift assay and RT-PCR analysis we have demonstrated that (1) the effects of PDP/PDP NF-kappaB decoy chimera on accumulation of pro-inflammatory mRNAs in P.aeruginosa infected IB3–1 cells reproduce that of decoy oligonucleotides; in particular (2) the PDP/PDP chimera is a strong inhibitor of IL-8 gene expression; (3) the effect of PDP/PDP chimeras, unlike those of ODN-based decoys, are observed even in the absence of protection with lipofectamine. These informations are of great impact, in our opinion, for the development of stable molecules to be used in non-viral gene therapy of cystic fibrosis. PMID:22772035

  18. Realizing the measure-device-independent quantum-key-distribution with passive heralded-single photon sources

    PubMed Central

    Wang, Qin; Zhou, Xing-Yu; Guo, Guang-Can

    2016-01-01

    In this paper, we put forward a new approach towards realizing measurement-device-independent quantum key distribution with passive heralded single-photon sources. In this approach, both Alice and Bob prepare the parametric down-conversion source, where the heralding photons are labeled according to different types of clicks from the local detectors, and the heralded ones can correspondingly be marked with different tags at the receiver’s side. Then one can obtain four sets of data through using only one-intensity of pump light by observing different kinds of clicks of local detectors. By employing the newest formulae to do parameter estimation, we could achieve very precise prediction for the two-single-photon pulse contribution. Furthermore, by carrying out corresponding numerical simulations, we compare the new method with other practical schemes of measurement-device-independent quantum key distribution. We demonstrate that our new proposed passive scheme can exhibit remarkable improvement over the conventional three-intensity decoy-state measurement-device-independent quantum key distribution with either heralded single-photon sources or weak coherent sources. Besides, it does not need intensity modulation and can thus diminish source-error defects existing in several other active decoy-state methods. Therefore, if taking intensity modulating errors into account, our new method will show even more brilliant performance. PMID:27759085

  19. How to implement decoy-state quantum key distribution for a satellite uplink with 50-dB channel loss

    NASA Astrophysics Data System (ADS)

    Meyer-Scott, Evan; Yan, Zhizhong; MacDonald, Allison; Bourgoin, Jean-Philippe; Hübel, Hannes; Jennewein, Thomas

    2011-12-01

    Quantum key distribution (QKD) takes advantage of fundamental properties of quantum physics to allow two distant parties to share a secret key; however, QKD is hampered by a distance limitation of a few hundred kilometers on Earth. The most immediate solution for global coverage is to use a satellite, which can receive separate QKD transmissions from two or more ground stations and act as a trusted node to link these ground stations. In this article we report on a system capable of performing QKD in the high loss regime expected in an uplink to a satellite using weak coherent pulses and decoy states. Such a scenario profits from the simplicity of its receiver payload, but has so far been considered to be infeasible due to very high transmission losses (40-50 dB). The high loss is overcome by implementing an innovative photon source and advanced timing analysis. Our system handles up to 57 dB photon loss in the infinite key limit, confirming the viability of the satellite uplink scenario. We emphasize that while this system was designed with a satellite uplink in mind, it could just as easily overcome high losses on any free space QKD link.

  20. LuciPHOr: Algorithm for Phosphorylation Site Localization with False Localization Rate Estimation Using Modified Target-Decoy Approach*

    PubMed Central

    Fermin, Damian; Walmsley, Scott J.; Gingras, Anne-Claude; Choi, Hyungwon; Nesvizhskii, Alexey I.

    2013-01-01

    The localization of phosphorylation sites in peptide sequences is a challenging problem in large-scale phosphoproteomics analysis. The intense neutral loss peaks and the coexistence of multiple serine/threonine and/or tyrosine residues are limiting factors for objectively scoring site patterns across thousands of peptides. Various computational approaches for phosphorylation site localization have been proposed, including Ascore, Mascot Delta score, and ProteinProspector, yet few address direct estimation of the false localization rate (FLR) in each experiment. Here we propose LuciPHOr, a modified target-decoy-based approach that uses mass accuracy and peak intensities for site localization scoring and FLR estimation. Accurate estimation of the FLR is a difficult task at the individual-site level because the degree of uncertainty in localization varies significantly across different peptides. LuciPHOr carries out simultaneous localization on all candidate sites in each peptide and estimates the FLR based on the target-decoy framework, where decoy phosphopeptides generated by placing artificial phosphorylation(s) on non-candidate residues compete with the non-decoy phosphopeptides. LuciPHOr also reports approximate site-level confidence scores for all candidate sites as a means to localize additional sites from multiphosphorylated peptides in which localization can be partially achieved. Unlike the existing tools, LuciPHOr is compatible with any search engine output processed through the Trans-Proteomic Pipeline. We evaluated the performance of LuciPHOr in terms of the sensitivity and accuracy of FLR estimates using two synthetic phosphopeptide libraries and a phosphoproteomic dataset generated from complex mouse brain samples. PMID:23918812

  1. Inorganic Kernel-Reconstituted Lipoprotein Biomimetic Nanovehicles Enable Efficient Targeting “Trojan Horse” Delivery of STAT3-Decoy Oligonucleotide for Overcoming TRAIL Resistance

    PubMed Central

    Shi, Kai; Xue, Jianxiu; Fang, Yan; Bi, Hongshu; Gao, Shan; Yang, Dongjuan; Lu, Anqi; Li, Yuai; Chen, Yao; Ke, Liyuan

    2017-01-01

    Tumor necrosis factor-related apoptosis-inducing ligand (TRAIL) can selectively induce apoptosis in a variety of tumor cells, but not most normal cells. Nevertheless, its therapeutic potential is limited due to the frequent occurrence of resistance in tumor cells, especially hepatocellular carcinoma cell lines. Therefore, we investigated the reversal effect of STAT3-decoy oligonucleotides (ODNs) on TRAIL resistance. Methods. Considering that the drawback of poor cellular permeability and rapid degradation in vivo limited ODNs' further clinical applications, we developed a biomimetic calcium phosphate-reconstituted low density lipoprotein nanovehicle (CaP@LDL) that would serve as a “Trojan horse” to carry STAT3-decoy ODNs into tumor cells and then regulate TRAIL-induced apoptosis. Results. In comparison with native ODNs, the reconstituted CaP@LDL packaged ODNs showed significantly increased serum stability, cellular transfection, in vitro synergistic cytotoxicity and apoptosis in hepatoma cells, while there was no cytotoxicity to normal cells. The improved TRAIL sensitization is attributed to blocking of STAT3 signaling and consequent expression of the downstream target antiapoptotic gene. Following systemic administration, CaP@LDL displayed LDL-mimicking pharmacokinetic behavior such as attenuated blood clearance as well as enhanced accumulation in tumor and hepatorenal sites. With the synergistic combination of decoyODN/CaP@LDL, TRAIL dramatically inhibited hepatic tumor growth in a xenograft model and induced significant tumor apoptosis in vivo. Conclusion. These results suggested that CaP@LDL-mediated STAT3-decoy ODN delivery might be a promising new strategy for reversing TRAIL resistance in hepatocellular carcinoma therapy. PMID:29158840

  2. Epigenetic inactivation of TRAIL decoy receptors at 8p12-21.3 commonly deleted region confers sensitivity to Apo2L/trail-Cisplatin combination therapy in cervical cancer.

    PubMed

    Narayan, Gopeshwar; Xie, Dongxu; Ishdorj, Ganchimeg; Scotto, Luigi; Mansukhani, Mahesh; Pothuri, Bhavana; Wright, Jason D; Kaufmann, Andreas M; Schneider, Achim; Arias-Pulido, Hugo; Murty, Vundavalli V

    2016-02-01

    Multiple chromosomal regions are affected by deletions in cervical cancer (CC) genomes, but their consequence and target gene involvement remains unknown. Our single nucleotide polymorphism (SNP) array identified 8p copy number losses localized to an 8.4 Mb minimal deleted region (MDR) in 36% of CC. The 8p MDR was associated with tumor size, treatment outcome, and with multiple HPV infections. Genetic, epigenetic, and expression analyses of candidate genes at MDR identified promoter hypermethylation and/or inactivation of decoy receptors TNFRSF10C and TNFRSF10D in the majority of CC patients. TNFRSF10C methylation was also detected in precancerous lesions suggesting that this change is an early event in cervical tumorigenesis. We further demonstrate here that CC cell lines exhibiting downregulated expression of TNFRSF10C and/or TNFRSF10D effectively respond to TRAIL-induced apoptosis and this affect was synergistic in combination with DNA damaging chemotherapeutic drugs. We show that the CC cell lines harboring epigenetic inactivation of TRAIL decoy receptors effectively activate downstream caspases suggesting a critical role of inactivation of these genes in efficient execution of extrinsic apoptotic pathway and therapy response. Therefore, these findings shed new light on the role of genetic/epigenetic defects in TRAIL decoy receptor genes in the pathogenesis of CC and provide an opportunity to explore strategies to test decoy receptor gene inactivation as a biomarker of response to Apo2L/TRAIL-combination therapy. © 2015 Wiley Periodicals, Inc.

  3. Inorganic Kernel-Reconstituted Lipoprotein Biomimetic Nanovehicles Enable Efficient Targeting "Trojan Horse" Delivery of STAT3-Decoy Oligonucleotide for Overcoming TRAIL Resistance.

    PubMed

    Shi, Kai; Xue, Jianxiu; Fang, Yan; Bi, Hongshu; Gao, Shan; Yang, Dongjuan; Lu, Anqi; Li, Yuai; Chen, Yao; Ke, Liyuan

    2017-01-01

    Tumor necrosis factor-related apoptosis-inducing ligand (TRAIL) can selectively induce apoptosis in a variety of tumor cells, but not most normal cells. Nevertheless, its therapeutic potential is limited due to the frequent occurrence of resistance in tumor cells, especially hepatocellular carcinoma cell lines. Therefore, we investigated the reversal effect of STAT3-decoy oligonucleotides (ODNs) on TRAIL resistance. Methods . Considering that the drawback of poor cellular permeability and rapid degradation in vivo limited ODNs' further clinical applications, we developed a biomimetic calcium phosphate-reconstituted low density lipoprotein nanovehicle (CaP@LDL) that would serve as a "Trojan horse" to carry STAT3-decoy ODNs into tumor cells and then regulate TRAIL-induced apoptosis. Results . In comparison with native ODNs, the reconstituted CaP@LDL packaged ODNs showed significantly increased serum stability, cellular transfection, in vitro synergistic cytotoxicity and apoptosis in hepatoma cells, while there was no cytotoxicity to normal cells. The improved TRAIL sensitization is attributed to blocking of STAT3 signaling and consequent expression of the downstream target antiapoptotic gene. Following systemic administration, CaP@LDL displayed LDL-mimicking pharmacokinetic behavior such as attenuated blood clearance as well as enhanced accumulation in tumor and hepatorenal sites. With the synergistic combination of decoyODN/CaP@LDL, TRAIL dramatically inhibited hepatic tumor growth in a xenograft model and induced significant tumor apoptosis in vivo . Conclusion. These results suggested that CaP@LDL-mediated STAT3-decoy ODN delivery might be a promising new strategy for reversing TRAIL resistance in hepatocellular carcinoma therapy.

  4. A role for NF-κB–dependent gene transactivation in sunburn

    PubMed Central

    Abeyama, Kazuhiro; Eng, William; Jester, James V.; Vink, Arie A.; Edelbaum, Dale; Cockerell, Clay J.; Bergstresser, Paul R.; Takashima, Akira

    2000-01-01

    Exposure of skin to ultraviolet (UV) radiation is known to induce NF-κB activation, but the functional role for this pathway in UV-induced cutaneous inflammation remains uncertain. In this study, we examined whether experimentally induced sunburn reactions in mice could be prevented by blocking UV-induced, NF-κB–dependent gene transactivation with oligodeoxynucleotides (ODNs) containing the NF-κB cis element (NF-κB decoy ODNs). UV-induced secretion of IL-1, IL-6, TNF-α, and VEGF by skin-derived cell lines was inhibited by the decoy ODNs, but not by the scrambled control ODNs. Systemic or local injection of NF-κB decoy ODNs also inhibited cutaneous swelling responses to UV irradiation. Moreover, local UV-induced inflammatory changes (swelling, leukocyte infiltration, epidermal hyperplasia, and accumulation of proinflammatory cytokines) were all inhibited specifically by topically applied decoy ODNs. Importantly, these ODNs had no effect on alternative types of cutaneous inflammation caused by irritant or allergic chemicals. These results indicate that sunburn reactions culminate from inflammatory events that are triggered by UV-activated transcription of NF-κB target genes, rather than from nonspecific changes associated with tissue damage. PMID:10862790

  5. Toward pest control via mass production of realistic decoys of insects

    NASA Astrophysics Data System (ADS)

    Pulsifer, Drew P.; Lakhtakia, Akhlesh; Kumar, Jayant; Baker, Thomas C.; Martín-Palma, Raúl J.

    2012-04-01

    The emerald ash borer (EAB), Agrilus planipennis, is an invasive species of beetles threatening the ash trees of North America. The species exhibits a mating behavior in which a flying male will first spot a stationary female at rest and then execute a pouncing maneuver to dive sharply onto her. The pouncing behavior appears to be cued by some visual signal from the top surface of the female's body. We have adopted bioreplication techniques to fabricate artificial visual decoys that could be used to detect, monitor, and slow the spread of EAB populations across North America. Using a negative die made of nickel and a positive die made of a hard polymer, we have stamped a polymer sheet to produce these decoys. Our bioreplication procedure is industrially scalable.

  6. Wild bird mortality and West Nile virus surveillance: Biases associated with detection, reporting, and carcass persistence

    USGS Publications Warehouse

    Ward, M.R.; Stallknecht, D.E.; Willis, J.; Conroy, M.J.; Davidson, W.R.

    2006-01-01

    Surveillance targeting dead wild birds, in particular American crows (Corvus brachyrhynchos), plays a critical role in West Nile virus (WNV) surveillance in the United States. Using crow decoy surrogates, detection and reporting of crow carcasses within urban and rural environments of DeKalb County, Georgia were assessed for potential biases that might occur in the county's WNV surveillance program. In each of two replicated trials, during July and September 2003, 400 decoys were labeled with reporting instructions and distributed along randomly chosen routes throughout designated urban and rural areas within DeKalb County. Information-theoretic methods were used to compare alternative models incorporating the effects of area and trial on probabilities of detection and reporting. The model with the best empirical support included the effects of area on both detection and reporting of decoys. The proportion of decoys detected in the urban area (0.605, SE=0.024) was approximately twice that of the rural area (0.293, SE =0.023), and the proportion of decoys reported in the urban area (0.273, SE =0.023) was approximately three times that of the rural area (0.103, SE=0.028). These results suggest that human density and associated factors can substantially influence dead crow detection and reporting and, thus, the perceived distribution of WNV. In a second and separate study, the persistence and fate of American crow and house sparrow (Passer domesticus) carcasses were assessed in urban and rural environments in Athens-Clarke, Madison, and Oconee counties, Georgia. Two replicated trials using 96 carcasses of each species were conducted during July and September 2004. For a portion of the carcasses, motion sensitive cameras were used to monitor scavenging species visits. Most carcasses (82%) disappeared or were decayed by the end of the 6-day study. Carcass persistence averaged 1.6 days in rural areas and 2.1 days in urban areas. We analyzed carcass persistence rates using a known-fate model framework in program MARK. Model selection based on Akaike's Information Criteria (AIC) indicated that the best model explaining carcass persistence rates included species and number of days of exposure; however, the model including area and number of days of exposure received approximately equal support. Model-averaged carcass persistence rates were higher for urban areas and for crow carcasses. Six mammalian and one avian species were documented scavenging upon carcasses. Dead wild birds could represent potential sources of oral WNV exposure to these scavenging species. Species composition of the scavenger assemblage was similar in urban and rural areas but "scavenging pressure" was greater in rural areas. ?? Wildlife Disease Association 2006.

  7. Improving predicted protein loop structure ranking using a Pareto-optimality consensus method.

    PubMed

    Li, Yaohang; Rata, Ionel; Chiu, See-wing; Jakobsson, Eric

    2010-07-20

    Accurate protein loop structure models are important to understand functions of many proteins. Identifying the native or near-native models by distinguishing them from the misfolded ones is a critical step in protein loop structure prediction. We have developed a Pareto Optimal Consensus (POC) method, which is a consensus model ranking approach to integrate multiple knowledge- or physics-based scoring functions. The procedure of identifying the models of best quality in a model set includes: 1) identifying the models at the Pareto optimal front with respect to a set of scoring functions, and 2) ranking them based on the fuzzy dominance relationship to the rest of the models. We apply the POC method to a large number of decoy sets for loops of 4- to 12-residue in length using a functional space composed of several carefully-selected scoring functions: Rosetta, DOPE, DDFIRE, OPLS-AA, and a triplet backbone dihedral potential developed in our lab. Our computational results show that the sets of Pareto-optimal decoys, which are typically composed of approximately 20% or less of the overall decoys in a set, have a good coverage of the best or near-best decoys in more than 99% of the loop targets. Compared to the individual scoring function yielding best selection accuracy in the decoy sets, the POC method yields 23%, 37%, and 64% less false positives in distinguishing the native conformation, indentifying a near-native model (RMSD < 0.5A from the native) as top-ranked, and selecting at least one near-native model in the top-5-ranked models, respectively. Similar effectiveness of the POC method is also found in the decoy sets from membrane protein loops. Furthermore, the POC method outperforms the other popularly-used consensus strategies in model ranking, such as rank-by-number, rank-by-rank, rank-by-vote, and regression-based methods. By integrating multiple knowledge- and physics-based scoring functions based on Pareto optimality and fuzzy dominance, the POC method is effective in distinguishing the best loop models from the other ones within a loop model set.

  8. Improving predicted protein loop structure ranking using a Pareto-optimality consensus method

    PubMed Central

    2010-01-01

    Background Accurate protein loop structure models are important to understand functions of many proteins. Identifying the native or near-native models by distinguishing them from the misfolded ones is a critical step in protein loop structure prediction. Results We have developed a Pareto Optimal Consensus (POC) method, which is a consensus model ranking approach to integrate multiple knowledge- or physics-based scoring functions. The procedure of identifying the models of best quality in a model set includes: 1) identifying the models at the Pareto optimal front with respect to a set of scoring functions, and 2) ranking them based on the fuzzy dominance relationship to the rest of the models. We apply the POC method to a large number of decoy sets for loops of 4- to 12-residue in length using a functional space composed of several carefully-selected scoring functions: Rosetta, DOPE, DDFIRE, OPLS-AA, and a triplet backbone dihedral potential developed in our lab. Our computational results show that the sets of Pareto-optimal decoys, which are typically composed of ~20% or less of the overall decoys in a set, have a good coverage of the best or near-best decoys in more than 99% of the loop targets. Compared to the individual scoring function yielding best selection accuracy in the decoy sets, the POC method yields 23%, 37%, and 64% less false positives in distinguishing the native conformation, indentifying a near-native model (RMSD < 0.5A from the native) as top-ranked, and selecting at least one near-native model in the top-5-ranked models, respectively. Similar effectiveness of the POC method is also found in the decoy sets from membrane protein loops. Furthermore, the POC method outperforms the other popularly-used consensus strategies in model ranking, such as rank-by-number, rank-by-rank, rank-by-vote, and regression-based methods. Conclusions By integrating multiple knowledge- and physics-based scoring functions based on Pareto optimality and fuzzy dominance, the POC method is effective in distinguishing the best loop models from the other ones within a loop model set. PMID:20642859

  9. Vulnerability of nontarget goose species to hunting with electronic snow goose calls

    USGS Publications Warehouse

    Caswell, J.H.; Afton, A.D.; Caswell, F.D.

    2003-01-01

    Since 1999, use of electronic calls has been legal for hunting lesser snow geese (Chen caerulescens caerulescens; hereafter snow geese) during special seasons or times of day when other waterfowl species could not be hunted in prairie Canada. Prior to expanding the use of electronic calls for hunting snow geese during fall hunting seasons, effects of these calls on nontarget goose species must be examined. Accordingly, we examined the vulnerability of Canada (Branta canadensis) and white-fronted geese (Anser albifrons) (dark geese) to electronic snow goose calls and 3 goose decoy sets (dark, mixed, and white) during the 1999 fall hunting seasons in Manitoba and Saskatchewan. Canada geese were 2.3 times more likely to fly within gun range (P<0.001) and the mean number killed/hour/hunter was 2.5 times greater (P=0.043) during control periods when hunters were silent or used traditional calling methods (i.e., hand-held and voice calls) than when hunters used electronic snow goose calls. Flock response and kill rate for Canada geese declined as proportions of white decoys increased in decoy sets (P<0.001). White-fronted geese were 1.8 times more likely to fly within gun range (P=0.050) and the mean number killed/hour/hunter was 5.0 times greater (P=0.022) during control periods than during periods when electronic snow goose calls were used. Flock response for white-fronted geese also declined as the proportion of white decoys increased in decoy sets (P<0.001). The legalization of electronic snow goose calls during fall hunting seasons in prairie Canada should not result in increased harvest of nontarget dark geese.

  10. Surveillance of influenza viruses in waterfowl used as decoys in Andalusia, Spain.

    PubMed

    Jurado-Tarifa, Estefanía; Napp, Sebastian; Gómez-Pacheco, Juan Manuel; Fernández-Morente, Manuel; Jaén-Téllez, Juan Antonio; Arenas, Antonio; García-Bocanegra, Ignacio

    2014-01-01

    A longitudinal study was carried out to determine the seroprevalence of avian influenza viruses (AIVs) in waterfowl used as decoys in Andalusia, southern Spain. A total of 2319 aquatic birds from 193 flocks were analyzed before and after the hunting season 2011-2012. In the first sampling, 403 out of 2319 (18.0%, CI95%: 15.8-19.0) decoys showed antibodies against AIVs by ELISA. The AI seroprevalence was significantly higher in geese (21.0%) than in ducks (11.7%) (P<0.001). Besides, the spatial distribution of AIVs was not homogeneous as significant differences among regions were observed. The prevalence of antibodies against AIVs subtypes H5 and H7 were 1.1% and 0.3%, respectively, using hemagglutination inhibition test (HI). The overall and H5 seroprevalences slightly increased after the hunting period (to 19.2% and 1.4%, respectively), while the H7 seroprevalence remained at the same level (0.3%). The proportion of flocks infected by AIVs was 65.3%, while 11.2% and 4.9% of flocks were positive for H5 and H7, respectively. Viral shedding was not detected in any of the 47 samples positive by both ELISA and HI, tested by RRT-PCR. The individual incidence after the hunting season was 3.4%. The fact that 57 animals seroconverted, 15 of which were confirmed by HI (12 H5 and 3 H7), was indication of contact with AIVs during the hunting period. The results indicate that waterfowl used as decoys are frequently exposed to AIVs and may be potentially useful as sentinels for AIVs monitoring. The seroprevalence detected and the seropositivity against AIVs H5 and H7, suggest that decoys can act as reservoirs of AIVs, which may be of animal and public health concern.

  11. A SELEX-Screened Aptamer of Human Hepatitis B Virus RNA Encapsidation Signal Suppresses Viral Replication

    PubMed Central

    Feng, Hui; Beck, Jürgen; Nassal, Michael; Hu, Kang-hong

    2011-01-01

    Background The specific interaction between hepatitis B virus (HBV) polymerase (P protein) and the ε RNA stem-loop on pregenomic (pg) RNA is crucial for viral replication. It triggers both pgRNA packaging and reverse transcription and thus represents an attractive antiviral target. RNA decoys mimicking ε in P protein binding but not supporting replication might represent novel HBV inhibitors. However, because generation of recombinant enzymatically active HBV polymerase is notoriously difficult, such decoys have as yet not been identified. Methodology/Principal Findings Here we used a SELEX approach, based on a new in vitro reconstitution system exploiting a recombinant truncated HBV P protein (miniP), to identify potential ε decoys in two large ε RNA pools with randomized upper stem. Selection of strongly P protein binding RNAs correlated with an unexpected strong enrichment of A residues. Two aptamers, S6 and S9, displayed particularly high affinity and specificity for miniP in vitro, yet did not support viral replication when part of a complete HBV genome. Introducing S9 RNA into transiently HBV producing HepG2 cells strongly suppressed pgRNA packaging and DNA synthesis, indicating the S9 RNA can indeed act as an ε decoy that competitively inhibits P protein binding to the authentic ε signal on pgRNA. Conclusions/Significance This study demonstrates the first successful identification of human HBV ε aptamers by an in vitro SELEX approach. Effective suppression of HBV replication by the S9 aptamer provides proof-of-principle for the ability of ε decoy RNAs to interfere with viral P-ε complex formation and suggests that S9-like RNAs may further be developed into useful therapeutics against chronic hepatitis B. PMID:22125633

  12. Effects of Smad decoy ODN on shear stress-induced atherosclerotic ApoE-/-mouse

    PubMed Central

    An, Hyun-Jin; Lee, Woo-Ram; Kim, Kyung-Hyun; Kim, Jung-Yeon; Kim, Woon-Hae; Park, Kwan-Kyu; Youn, Sung Won

    2015-01-01

    Atherosclerosis is a complex disease which involves both genetic and environmental factors in its development and progression. Shear stress is the drag force per unit area acting on the endothelium as a result of blood flow, and it plays a critical role in plaque location and progression. TGF-β1 is often regarded to have pro-atherosclerotic effect on vascular disease. TGF-β1 downstream targets Smad, for regulating a set of genes associated with atherosclerosis. Therefore, modulation of TGF-β1 and Smad expression may be the important targets for the prevention and treatment of shear stress-induced vascular disease. However, the precise mechanism of the anti-atherosclerotic effects of novel therapeutic approach has not been elucidated by using animal models regarding the shear stress-induced vascular disease. Therefore, we designed to test whether Smad decoy ODN would prevent the development of atherosclerosis in the shear stress-induced ApoE-/-mice on a western diet. We examined the effect of cast placement on the development of atherosclerosis, and the carotid artery was harvested at the sacrifice to observe histological changes. Also, we evaluated the impact of Smad decoy ODN in the regulation of genes expression related to atherosclerosis, including TGF-β1, PAI-1, and α-SMA. Our results showed that western diet with cast placement developed atherosclerosis in ApoE-/-mouse. Also, administration of Smad decoy ODN decreases the expression of TGF-β1, PAI-1, and α-SMA. These results demonstrate the potential of Smad decoy ODN to prevent the progression of atherosclerosis in ApoE-/-mouse model with western diet and shear stress. PMID:26097583

  13. Decoy receptor 3: an endogenous immunomodulator in cancer growth and inflammatory reactions.

    PubMed

    Hsieh, Shie-Liang; Lin, Wan-Wan

    2017-06-19

    Decoy receptor 3 (DcR3), also known as tumor necrosis factor receptor (TNFR) superfamily member 6b (TNFRSF6B), is a soluble decoy receptor which can neutralize the biological functions of three members of tumor necrosis factor superfamily (TNFSF): Fas ligand (FasL), LIGHT, and TL1A. In addition to 'decoy' function, recombinant DcR3.Fc is able to modulate the activation and differentiation of dendritic cells (DCs) and macrophages via 'non-decoy' action. DcR3-treated DCs skew T cell differentiation into Th2 phenotype, while DcR3-treated macrophages behave M2 phenotype. DcR3 is upregulated in various cancer cells and several inflammatory tissues, and is regarded as a potential biomarker to predict inflammatory disease progression and cancer metastasis. However, whether DcR3 is a pathogenic factor or a suppressor to attenuate inflammatory reactions, has not been discussed comprehensively yet. Because mouse genome does not have DcR3, it is not feasible to investigate its physiological functions by gene-knockout approach. However, DcR3-mediated effects in vitro are determined via overexpressing DcR3 or addition of recombinant DcR3.Fc fusion protein. Moreover, CD68-driven DcR3 transgenic mice are used to investigate DcR3-mediated systemic effects in vivo. Upregulation of DcR3 during inflammatory reactions exerts negative-feedback to suppress inflammation, while tumor cells hijack DcR3 to prevent apoptosis and promote tumor growth and invasion. Thus, 'switch-on' of DcR3 expression may be feasible for the treatment of inflammatory diseases and enhance tissue repairing, while 'switch-off' of DcR3 expression can enhance tumor apoptosis and suppress tumor growth in vivo.

  14. Decoy receptor 3 is a prognostic factor in renal cell cancer.

    PubMed

    Macher-Goeppinger, Stephan; Aulmann, Sebastian; Wagener, Nina; Funke, Benjamin; Tagscherer, Katrin E; Haferkamp, Axel; Hohenfellner, Markus; Kim, Sunghee; Autschbach, Frank; Schirmacher, Peter; Roth, Wilfried

    2008-10-01

    Decoy receptor 3 (DcR3) is a soluble protein that binds to and inactivates the death ligand CD95L. Here, we studied a possible association between DcR3 expression and prognosis in patients with renal cell carcinomas (RCCs). A tissue microarray containing RCC tumor tissue samples and corresponding normal tissue samples was generated. Decoy receptor 3 expression in tumors of 560 patients was examined by immunohistochemistry. The effect of DcR3 expression on disease-specific survival and progression-free survival was assessed using univariate analysis and multivariate Cox regression analysis. Decoy receptor 3 serum levels were determined by ELISA. High DcR3 expression was associated with high-grade (P = .005) and high-stage (P = .048) RCCs. The incidence of distant metastasis (P = .03) and lymph node metastasis (P = .002) was significantly higher in the group with high DcR3 expression. Decoy receptor 3 expression correlated negatively with disease-specific survival (P < .001) and progression-free survival (P < .001) in univariate analyses. A multivariate Cox regression analysis retained DcR3 expression as an independent prognostic factor that outperformed the Karnofsky performance status. In patients with high-stage RCCs expressing DcR3, the 2-year survival probability was 25%, whereas in patients with DcR3-negative tumors, the survival probability was 65% (P < .001). Moreover, DcR3 serum levels were significantly higher in patients with high-stage localized disease (P = .007) and metastatic disease (P = .001). DcR3 expression is an independent prognostic factor of RCC progression and mortality. Therefore, the assessment of DcR3 expression levels offers valuable prognostic information that could be used to select patients for adjuvant therapy studies.

  15. NF-kappaB transcription factor is required for inhibitory avoidance long-term memory in mice.

    PubMed

    Freudenthal, Ramiro; Boccia, Mariano M; Acosta, Gabriela B; Blake, Mariano G; Merlo, Emiliano; Baratti, Carlos M; Romano, Arturo

    2005-05-01

    Although it is generally accepted that memory consolidation requires regulation of gene expression, only a few transcription factors (TFs) have been clearly demonstrated to be specifically involved in this process. Increasing research data point to the participation of the Rel/nuclear factor-kappaB (NF-kappaB) family of TFs in memory and neural plasticity. Here we found that two independent inhibitors of NF-kappaB induced memory impairment in the one-trial step-through inhibitory avoidance paradigm in mice: post-training administration of the drug sulfasalazine and 2 h pretraining administration of a double-stranded DNA oligonucleotide containing the NF-kappaB consensus sequence (kappaB decoy). Conversely, one base mutation of the kappaB decoy (mut-kappaB decoy) injection did not affect long-term memory. Accordingly, the kappaB decoy inhibited NF-kappaB in hippocampus 2 h after injection but no inhibition was found with mut-kappaB decoy administration. A temporal course of hippocampal NF-kappaB activity after training was determined. Unexpectedly, an inhibition of NF-kappaB was found 15 min after training in shocked and unshocked groups when compared with the naïve group. Hippocampal NF-kappaB was activated 45 min after training in both shocked and unshocked groups, decreasing 1 h after training and returning to basal levels 2 and 4 h after training. On the basis of the latter results, we propose that activation of NF-kappaB in hippocampus is part of the molecular mechanism involved in the storage of contextual features that constitute the conditioned stimulus representation. The results presented here provide the first evidence to support NF-kappaB activity being regulated in hippocampus during consolidation, stressing the role of this TF as a conserved molecular mechanism for memory storage.

  16. Heterodimer Binding Scaffolds Recognition via the Analysis of Kinetically Hot Residues.

    PubMed

    Perišić, Ognjen

    2018-03-16

    Physical interactions between proteins are often difficult to decipher. The aim of this paper is to present an algorithm that is designed to recognize binding patches and supporting structural scaffolds of interacting heterodimer proteins using the Gaussian Network Model (GNM). The recognition is based on the (self) adjustable identification of kinetically hot residues and their connection to possible binding scaffolds. The kinetically hot residues are residues with the lowest entropy, i.e., the highest contribution to the weighted sum of the fastest modes per chain extracted via GNM. The algorithm adjusts the number of fast modes in the GNM's weighted sum calculation using the ratio of predicted and expected numbers of target residues (contact and the neighboring first-layer residues). This approach produces very good results when applied to dimers with high protein sequence length ratios. The protocol's ability to recognize near native decoys was compared to the ability of the residue-level statistical potential of Lu and Skolnick using the Sternberg and Vakser decoy dimers sets. The statistical potential produced better overall results, but in a number of cases its predicting ability was comparable, or even inferior, to the prediction ability of the adjustable GNM approach. The results presented in this paper suggest that in heterodimers at least one protein has interacting scaffold determined by the immovable, kinetically hot residues. In many cases, interacting proteins (especially if being of noticeably different sizes) either behave as a rigid lock and key or, presumably, exhibit the opposite dynamic behavior. While the binding surface of one protein is rigid and stable, its partner's interacting scaffold is more flexible and adaptable.

  17. L-3 Com AVISYS civil aviation self-protection system

    NASA Astrophysics Data System (ADS)

    Carey, Jim

    2006-05-01

    In early 2004, L-3 Com AVISYS Corporation (hereinafter referred to as L-3 AVISYS or AVISYS) completed a contract for the integration and deployment of an advanced Infrared Countermeasures self-protection suite for a Head of State Airbus A340 aircraft. This initial L-3 AVISYS IRCM Suite was named WIPPS (Widebody Integrated Platform Protection System). The A340 WIPPS installation provisions were FAA certified with the initial deployment of the modified aircraft. WIPPS is unique in that it utilizes a dual integrated missile warning subsystem to produce a robust, multi-spectral, ultra-low false alarm rate threat warning capability. WIPPS utilizes the Thales MWS-20 Pulsed Doppler Radar Active MWS and the EADS AN/AAR-60 Ultraviolet Passive MWS. These MWS subsystems are integrated through an L-3 AVISYS Electronic Warfare Control Set (EWCS). The EWCS also integrates the WIPPS MWS threat warning information with the A340 flight computer data to optimize ALE-47 Countermeasure Dispensing System IR decoy dispensing commands, program selection and timing. WIPPS utilizes standard and advanced IR Decoys produced by ARMTEC Defense and Alloy Surfaces. WIPPS demonstrated that when IR decoy dispensing is controlled by threat range and time-to-go information provided by an Active MWS, unsurpassed self protection levels are achievable. Recognizing the need for high volume civil aviation protection, L-3 AVISYS configured a variant of WIPPS optimized for commercial airline reliability requirements, safety requirements, supportability and most importantly, affordability. L-3 AVISYS refers to this IRCM suite as CAPS (Commercial Airliner Protection System). CAPS has been configured for applications to all civil aircraft ranging from the small Regional Jets to the largest Wide-bodies. This presentation and paper will provide an overview of the initial WIPPS IRCM Suite and the important factors that were considered in defining the CAPS configuration.

  18. Quantum correlations of lights in macroscopic environments

    NASA Astrophysics Data System (ADS)

    Sua, Yong Meng

    This dissertation presents a detailed study in exploring quantum correlations of lights in macroscopic environments. We have explored quantum correlations of single photons, weak coherent states, and polarization-correlated/polarization-entangled photons in macroscopic environments. These included macroscopic mirrors, macroscopic photon number, spatially separated observers, noisy photons source and propagation medium with loss or disturbances. We proposed a measurement scheme for observing quantum correlations and entanglement in the spatial properties of two macroscopic mirrors using single photons spatial compass state. We explored the phase space distribution features of spatial compass states, such as chessboard pattern by using the Wigner function. The displacement and tilt correlations of the two mirrors were manifested through the propensities of the compass states. This technique can be used to extract Einstein-Podolsky-Rosen correlations (EPR) of the two mirrors. We then formulated the discrete-like property of the propensity P b(m,n), which can be used to explore environmental perturbed quantum jumps of the EPR correlations in phase space. With single photons spatial compass state, the variances in position and momentum are much smaller than standard quantum limit when using a Gaussian TEM 00 beam. We observed intrinsic quantum correlations of weak coherent states between two parties through balanced homodyne detection. Our scheme can be used as a supplement to decoy-state BB84 protocol and differential phase-shift QKD protocol. We prepared four types of bipartite correlations +/- cos2(theta1 +/- theta 2) that shared between two parties. We also demonstrated bits correlations between two parties separated by 10 km optical fiber. The bits information will be protected by the large quantum phase fluctuation of weak coherent states, adding another physical layer of security to these protocols for quantum key distribution. Using 10 m of highly nonlinear fiber (HNLF) at 77 K, we observed coincidence to accidental-coincidence ratio of 130+/-5 for correlated photon-pair and Two-Photon Interference visibility >98% entangled photon-pair. We also verified the non-local behavior of polarization-entangled photon pair by violating Clauser-Horne-Shimony-Holt Bell's inequality by more than 12 standard deviations. With the HNLF at 300 K (77 K), photon-pair production rate about factor 3(2) higher than a 300 m dispersion-shifted fiber is observed. Then, we studied quantum correlation and interference of photon-pairs; with one photon of the photon-pair experiencing multiple scattering in a random medium. We observed that depolarization noise photon in multiple scattering degrading the purity of photon-pair, and the existence of Raman noise photon in a photon-pair source will contribute to the depolarization affect. We found that quantum correlation of polarization-entangled photon-pair is better preserved than polarization-correlated photon-pair as one photon of the photon-pair scattered through a random medium. Our findings showed that high purity polarization-entangled photon-pair is better candidate for long distance quantum key distribution.

  19. Design Architectures for Optically Multiplexed Imaging

    DTIC Science & Technology

    2015-09-16

    which single task is the highest priority task ∗ according to Equation 16. In es- sence , the task that is most often predicted to be of the...deployment (or a null deployment from inaction), our features consisted of pairwise relationships between each placed decoy and each missile. For each...de- coy/missile pairing, we have features describing whether a decoy had been placed such that the missile would be suc- cessfully distracted by

  20. A selective decoy-doxorubicin complex for targeted co-delivery, STAT3 probing and synergistic anti-cancer effect.

    PubMed

    Wang, Shao-Jen; Hou, Yung-Te; Chen, Lin-Chi

    2015-09-04

    A novel selective decoy oligodeoxynucleotide (dODN)-doxorubicin (DOX) complex is reported for cancer theranostics. It eliminates the use of a ligand or carrier for targeted delivery and disassembles into therapeutic dODN and DOX upon encountering over-activated STAT3 in cancer cells. Hence, in situ STAT3 probing and synergistic anti-cancer effect are attained at the same time.

  1. HTS for SMFS, organohalide respiration, new epigenetic mark, and a decoy receptor.

    PubMed

    2014-10-23

    Each month, Chemistry & Biology Select highlights a selection of research reports from the recent literature. These highlights are a snapshot of interesting research done across the field of chemical biology. This month's Select highlights an on-chip platform for high-throughput force microscopy, a structural view of organohalide respiration, evidence that 5-hydroxymethylcytosine is an epigenetic mark, and use of a decoy receptor to thwart oncogene signaling.

  2. Exploring the stability of ligand binding modes to proteins by molecular dynamics simulations.

    PubMed

    Liu, Kai; Watanabe, Etsurou; Kokubo, Hironori

    2017-02-01

    The binding mode prediction is of great importance to structure-based drug design. The discrimination of various binding poses of ligand generated by docking is a great challenge not only to docking score functions but also to the relatively expensive free energy calculation methods. Here we systematically analyzed the stability of various ligand poses under molecular dynamics (MD) simulation. First, a data set of 120 complexes was built based on the typical physicochemical properties of drug-like ligands. Three potential binding poses (one correct pose and two decoys) were selected for each ligand from self-docking in addition to the experimental pose. Then, five independent MD simulations for each pose were performed with different initial velocities for the statistical analysis. Finally, the stabilities of ligand poses under MD were evaluated and compared with the native one from crystal structure. We found that about 94% of the native poses were maintained stable during the simulations, which suggests that MD simulations are accurate enough to judge most experimental binding poses as stable properly. Interestingly, incorrect decoy poses were maintained much less and 38-44% of decoys could be excluded just by performing equilibrium MD simulations, though 56-62% of decoys were stable. The computationally-heavy binding free energy calculation can be performed only for these survived poses.

  3. Funnel traps capture a higher proportion of juvenile Great Tits Parus major than automatic traps

    USGS Publications Warehouse

    Senar, J.C.; Domenech, J.; Conroy, M.J.

    1999-01-01

    We compared capture rates of Great Tits at funnel traps, where several birds can be captured at once so that some decoy effect may appear, to those obtained at automatic traps, where only one bird can be trapped at a time, at trapping stations in northeastern Spain. Juvenile birds were mainly captured at funnel traps (79% of juvenile captures), whereas adult plumaged birds were captured at both types of traps (51% of captures were at the funnel traps) (test between ages, P<0.001). Juvenile Great Tits had lower body condition as measured by ptilochronology (P<0.01). These birds are more easily trapped in funnel traps, which may be acting as decoy traps, and thus are vulnerable to the same kinds of biases (eg age or body condition) that have been previously documented for decoy traps.

  4. Pictorial and conceptual representation of glimpsed pictures.

    PubMed

    Potter, Mary C; Staub, Adrian; O'Connor, Daniel H; Potter, Mary C

    2004-06-01

    Pictures seen in a rapid sequence are remembered briefly, but most are forgotten within a few seconds (M. C. Potter. A. Staub, J. Rado. & D. H. O'Connor. 2002). The authors investigated the pictorial and conceptual components of this fleeting memory by presenting 5 pictured scenes and immediately testing recognition of verbal titles (e.g., people at a table) or recognition of the pictures themselves. Recognition declined during testing, but initial performance was higher and the decline steeper when pictures were tested. A final experiment included test decoy pictures that were conceptually similar to but visually distinct from the original pictures. Yeses to decoys were higher than yeses to other distractors. Fleeting memory for glimpsed pictures has a strong conceptual component (conceptual short-term memory), but there is additional highly volatile pictorial memory (pictorial short-term memory) that is not tapped hy a gist title or decoy picture. ((c) 2004 APA, all rights reserved)

  5. Cues used by the black fly, Simulium annulus, for attraction to the common loon (Gavia immer).

    PubMed

    Weinandt, Meggin L; Meyer, Michael; Strand, Mac; Lindsay, Alec R

    2012-12-01

    The parasitic relationship between a black fly, Simulium annulus, and the common loon (Gavia immer) has been considered one of the most exclusive relationships between any host species and a black fly species. To test the host specificity of this blood-feeding insect, we made a series of bird decoy presentations to black flies on loon-inhabited lakes in northern Wisconsin, U.S.A. To examine the importance of chemical and visual cues for black fly detection of and attraction to hosts, we made decoy presentations with and without chemical cues. Flies attracted to the decoys were collected, identified to species, and quantified. Results showed that S. annulus had a strong preference for common loon visual and chemical cues, although visual cues from Canada geese (Branta canadensis) and mallards (Anas platyrynchos) did attract some flies in significantly smaller numbers. © 2012 The Society for Vector Ecology.

  6. Dual GPCR and GAG mimicry by the M3 chemokine decoy receptor

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Alexander-Brett, Jennifer M.; Fremont, Daved H.

    2008-09-23

    Viruses have evolved a myriad of evasion strategies focused on undermining chemokine-mediated immune surveillance, exemplified by the mouse {gamma}-herpesvirus 68 M3 decoy receptor. Crystal structures of M3 in complex with C chemokine ligand 1/lymphotactin and CC chemokine ligand 2/monocyte chemoattractant protein 1 reveal that invariant chemokine features associated with G protein-coupled receptor binding are primarily recognized by the decoy C-terminal domain, whereas the N-terminal domain (NTD) reconfigures to engage divergent basic residue clusters on the surface of chemokines. Favorable electrostatic forces dramatically enhance the association kinetics of chemokine binding by M3, with a primary role ascribed to acidic NTD regionsmore » that effectively mimic glycosaminoglycan interactions. Thus, M3 employs two distinct mechanisms of chemical imitation to potently sequester chemokines, thereby inhibiting chemokine receptor binding events as well as the formation of chemotactic gradients necessary for directed leukocyte trafficking.« less

  7. LeEix1 functions as a decoy receptor to attenuate LeEix2 signaling.

    PubMed

    Bar, Maya; Sharfman, Miya; Avni, Adi

    2011-03-01

    The receptors for the fungal elicitor EIX (LeEix1 and LeEix2) belong to a class of leucine-rich repeat cell-surface glycoproteins with a signal for receptor-mediated endocytosis. Both receptors are able to bind the EIX elicitor while only the LeEix2 receptor mediates defense responses. We show that LeEix1 acts as a decoy receptor and attenuates EIX induced internalization and signaling of the LeEix2 receptor. We demonstrate that BAK1 binds LeEix1 but not LeEix2. In plants where BAK1 was silenced, LeEix1 was no longer able to attenuate plant responses to EIX, indicating that BAK1 is required for this attenuation. We suggest that LeEix1 functions as a decoy receptor for LeEix2, a function which requires the kinase activity of BAK1.

  8. Conformational heterogeneity of the SAM-I riboswitch transcriptional ON state: a chaperone-like role for S-adenosyl methionine.

    PubMed

    Huang, Wei; Kim, Joohyun; Jha, Shantenu; Aboul-Ela, Fareed

    2012-05-18

    Riboswitches are promising targets for the design of novel antibiotics and engineering of portable genetic regulatory elements. There is evidence that variability in riboswitch properties allows tuning of expression for genes involved in different stages of biosynthetic pathways by mechanisms that are not currently understood. Here, we explore the mechanism for tuning of S-adenosyl methionine (SAM)-I riboswitch folding. Most SAM-I riboswitches function at the transcriptional level by sensing the cognate ligand SAM. SAM-I riboswitches orchestrate the biosynthetic pathways of cysteine, methionine, SAM, and so forth. We use base-pair probability predictions to examine the secondary-structure folding landscape of several SAM-I riboswitch sequences. We predict different folding behaviors for different SAM-I riboswitch sequences. We identify several "decoy" base-pairing interactions involving 5' riboswitch residues that can compete with the formation of a P1 helix, a component of the ligand-bound "transcription OFF" state, in the absence of SAM. We hypothesize that blockage of these interactions through SAM contacts contributes to stabilization of the OFF state in the presence of ligand. We also probe folding patterns for a SAM-I riboswitch RNA using constructs with different 3' truncation points experimentally. Folding was monitored through fluorescence, susceptibility to base-catalyzed cleavage, nuclear magnetic resonance, and indirectly through SAM binding. We identify key decision windows at which SAM can affect the folding pathway towards the OFF state. The presence of decoy conformations and differential sensitivities to SAM at different transcript lengths is crucial for SAM-I riboswitches to modulate gene expression in the context of global cellular metabolism. Copyright © 2012 Elsevier Ltd. All rights reserved.

  9. An Effectiveness Analysis of the Tactical Employment of Decoys

    DTIC Science & Technology

    1994-06-03

    desert made it impossible to hide the dense concentration of vehicles in the three assembly areas: 1st Armoured Division in Assembly Area (AA) Murrayfield...North, 24th Armoured Brigade in AA Murrayfield South, and 10th Armoured Division in AA Melting Pot. However, an ingenious combination of decoys and...hood, configured to resemble an ammo carrier, was often draped over tanks to disguise thenm12 To reinforce the story that the British main attack would

  10. G4-DNA Formation in the HRAS Promoter and Rational Design of Decoy Oligonucleotides for Cancer Therapy

    PubMed Central

    Membrino, Alexandro; Cogoi, Susanna; Pedersen, Erik B.; Xodo, Luigi E.

    2011-01-01

    HRAS is a proto-oncogene involved in the tumorigenesis of urinary bladder cancer. In the HRAS promoter we identified two G-rich elements, hras-1 and hras-2, that fold, respectively, into an antiparallel and a parallel quadruplex (qhras-1, qhras-2). When we introduced in sequence hras-1 or hras-2 two point mutations that block quadruplex formation, transcription increased 5-fold, but when we stabilized the G-quadruplexes by guanidinium phthalocyanines, transcription decreased to 20% of control. By ChIP we found that sequence hras-1 is bound only by MAZ, while hras-2 is bound by MAZ and Sp1: two transcription factors recognizing guanine boxes. We also discovered by EMSA that recombinant MAZ-GST binds to both HRAS quadruplexes, while Sp1-GST only binds to qhras-1. The over-expression of MAZ and Sp1 synergistically activates HRAS transcription, while silencing each gene by RNAi results in a strong down-regulation of transcription. All these data indicate that the HRAS G-quadruplexes behave as transcription repressors. Finally, we designed decoy oligonucleotides mimicking the HRAS quadruplexes, bearing (R)-1-O-[4-(1-Pyrenylethynyl) phenylmethyl] glycerol and LNA modifications to increase their stability and nuclease resistance (G4-decoys). The G4-decoys repressed HRAS transcription and caused a strong antiproliferative effect, mediated by apoptosis, in T24 bladder cancer cells where HRAS is mutated. PMID:21931711

  11. Suppression of wear particle induced pro-inflammatory cytokine and chemokine production in macrophages via NF-κB decoy oligodeoxynucleotide: A preliminary report

    PubMed Central

    Lin, Tzu-hua; Yao, Zhenyu; Sato, Taishi; Keeney, Michael; Li, Chenguang; Pajarinen, Jukka; Yang, Fan; Egashira, Kensuke; Goodman, Stuart B.

    2014-01-01

    Total joint replacement (TJR) is a very cost-effective surgery for end-stage arthritis. One important goal is to decrease the revision rate especially because TJR has been extended to younger patients. Continuous production of ultra-high molecular weight polyethylene (UHMWPE) wear particles induces macrophage infiltration and chronic inflammation, which can lead to peri-prosthetic osteolysis. Targeting individual pro-inflammatory cytokines directly has not reversed the osteolytic process in clinical trials, due to compensatory upregulation of other pro-inflammatory factors. We hypothesized that targeting the important transcription factor NF-κB could mitigate the inflammatory response to wear particles, potentially diminishing osteolysis. In the current study, we suppressed NF-κB activity in mouse RAW264.7 and human THP1 macrophage cell lines, as well as primary mouse and human macrophages, via competitive binding with double strand decoy oligodeoxynucleotide (ODN) containing an NF-κB binding element. We found that macrophage exposure to UHMWPE particles induced multiple pro-inflammatory cytokine and chemokine expression including TNF-α, MCP1, MIP1α and others. Importantly, the decoy ODN significantly suppressed the induced cytokine and chemokine expression in both murine and human macrophages, and resulted in suppression of macrophage recruitment. The strategic use of decoy NF-κB ODN, delivered locally, could potentially diminish particle-induced peri-prosthetic osteolysis. PMID:24814879

  12. MAZ-binding G4-decoy with locked nucleic acid and twisted intercalating nucleic acid modifications suppresses KRAS in pancreatic cancer cells and delays tumor growth in mice

    PubMed Central

    Cogoi, Susanna; Zorzet, Sonia; Rapozzi, Valentina; Géci, Imrich; Pedersen, Erik B.; Xodo, Luigi E.

    2013-01-01

    KRAS mutations are primary genetic lesions leading to pancreatic cancer. The promoter of human KRAS contains a nuclease-hypersensitive element (NHE) that can fold in G4-DNA structures binding to nuclear proteins, including MAZ (myc-associated zinc-finger). Here, we report that MAZ activates KRAS transcription. To knockdown oncogenic KRAS in pancreatic cancer cells, we designed oligonucleotides that mimic one of the G-quadruplexes formed by NHE (G4-decoys). To increase their nuclease resistance, two locked nucleic acid (LNA) modifications were introduced at the 3′-end, whereas to enhance the folding and stability, two polycyclic aromatic hydrocarbon units (TINA or AMANY) were inserted internally, to cap the quadruplex. The most active G4-decoy (2998), which had two para-TINAs, strongly suppressed KRAS expression in Panc-1 cells. It also repressed their metabolic activity (IC50 = 520 nM), and it inhibited cell growth and colony formation by activating apoptosis. We finally injected 2998 and control oligonucleotides 5153, 5154 (2 nmol/mouse) intratumorally in SCID mice bearing a Panc-1 xenograft. After three treatments, 2998 reduced tumor xenograft growth by 64% compared with control and increased the Kaplan–Meier median survival time by 70%. Together, our data show that MAZ-specific G4-decoys mimicking a KRAS quadruplex are promising for pancreatic cancer therapy. PMID:23471001

  13. Surveillance of Influenza Viruses in Waterfowl Used As Decoys in Andalusia, Spain

    PubMed Central

    Jurado-Tarifa, Estefanía; Napp, Sebastian; Gómez-Pacheco, Juan Manuel; Fernández-Morente, Manuel; Jaén-Téllez, Juan Antonio; Arenas, Antonio; García-Bocanegra, Ignacio

    2014-01-01

    A longitudinal study was carried out to determine the seroprevalence of avian influenza viruses (AIVs) in waterfowl used as decoys in Andalusia, southern Spain. A total of 2319 aquatic birds from 193 flocks were analyzed before and after the hunting season 2011–2012. In the first sampling, 403 out of 2319 (18.0%, CI95%: 15.8–19.0) decoys showed antibodies against AIVs by ELISA. The AI seroprevalence was significantly higher in geese (21.0%) than in ducks (11.7%) (P<0.001). Besides, the spatial distribution of AIVs was not homogeneous as significant differences among regions were observed. The prevalence of antibodies against AIVs subtypes H5 and H7 were 1.1% and 0.3%, respectively, using hemagglutination inhibition test (HI). The overall and H5 seroprevalences slightly increased after the hunting period (to 19.2% and 1.4%, respectively), while the H7 seroprevalence remained at the same level (0.3%). The proportion of flocks infected by AIVs was 65.3%, while 11.2% and 4.9% of flocks were positive for H5 and H7, respectively. Viral shedding was not detected in any of the 47 samples positive by both ELISA and HI, tested by RRT-PCR. The individual incidence after the hunting season was 3.4%. The fact that 57 animals seroconverted, 15 of which were confirmed by HI (12 H5 and 3 H7), was indication of contact with AIVs during the hunting period. The results indicate that waterfowl used as decoys are frequently exposed to AIVs and may be potentially useful as sentinels for AIVs monitoring. The seroprevalence detected and the seropositivity against AIVs H5 and H7, suggest that decoys can act as reservoirs of AIVs, which may be of animal and public health concern. PMID:24901946

  14. Mechanisms of the prevention and inhibition of the progression and development of non-alcoholic steatohepatitis by genetic and pharmacological decoy receptor 3 supplementation.

    PubMed

    Lee, Pei-Chang; Yang, Ling-Yu; Wang, Ying-Wen; Huang, Shiang-Fen; Lee, Kuei-Chuan; Hsieh, Yun-Cheng; Yang, Ying-Ying; Hsieh, Shie-Liang; Hou, Ming-Chih; Lin, Han-Chieh; Lee, Fa-Yuah; Lee, Shou-Dong

    2017-11-01

    Treatment of non-alcoholic steatohepatitis (NASH) is difficult due to the absence of a proven treatment and its comprehensive mechanisms. In the NASH animal model, upregulated hepatic inflammation and oxidative stress, with the resultant M1 polarization of macrophages as well as imbalanced adipocytokines, all accelerate NASH progression. As a member of the tumor necrosis factor receptor superfamily, decoy receptor 3 (DcR3) not only neutralizes the death ligands, but also performs immune modulations. In this study, we aimed to investigate the possible non-decoy effects of DcR3 on diet-induced NASH mice. Methionine- and choline-deficient (MCD) diet feeding for 9 weeks was applied to induce NASH in BALB/c mice. Decoy receptor 3 heterozygous transgenesis or pharmacological pretreatment with DcR3a for 1 month were designed as interventions. Intrahepatic inflammatory status as well as macrophage polarization, oxidative stress, and steatosis as well as lipogenic gene expression and fibrotic status were analyzed. Additionally, acute effects of DcR3a on HepG2 cells, Hep3B cells, and primary mouse hepatocytes in various MCD medium-stimulated changes were also evaluated. Both DcR3 genetic and pharmacologic supplement significantly reduced MCD diet-induced hepatic M1 polarization. In addition, DcR3 supplement attenuated MCD diet-increased hepatic inflammation, oxidative stress, adipocytokine imbalance, steatosis, and fibrogenesis. Moreover, acute DcR3a incubation in HepG2 cells, Hep3B cells, and mouse hepatocytes could normalize the expression of genes related to lipid oxidation along with inflammation and oxidative stress. The ability of DcR3 to attenuate hepatic steatosis and inflammation through its non-decoy effects of immune modulation and oxidative stress attenuation makes it a potential treatment for NASH. © 2017 The Japan Society of Hepatology.

  15. Adaptive spatial filtering for daytime satellite quantum key distribution

    NASA Astrophysics Data System (ADS)

    Gruneisen, Mark T.; Sickmiller, Brett A.; Flanagan, Michael B.; Black, James P.; Stoltenberg, Kurt E.; Duchane, Alexander W.

    2014-11-01

    The rate of secure key generation (SKG) in quantum key distribution (QKD) is adversely affected by optical noise and loss in the quantum channel. In a free-space atmospheric channel, the scattering of sunlight into the channel can lead to quantum bit error ratios (QBERs) sufficiently large to preclude SKG. Furthermore, atmospheric turbulence limits the degree to which spatial filtering can reduce sky noise without introducing signal losses. A system simulation quantifies the potential benefit of tracking and higher-order adaptive optics (AO) technologies to SKG rates in a daytime satellite engagement scenario. The simulations are performed assuming propagation from a low-Earth orbit (LEO) satellite to a terrestrial receiver that includes an AO system comprised of a Shack-Hartmann wave-front sensor (SHWFS) and a continuous-face-sheet deformable mirror (DM). The effects of atmospheric turbulence, tracking, and higher-order AO on the photon capture efficiency are simulated using statistical representations of turbulence and a time-domain waveoptics hardware emulator. Secure key generation rates are then calculated for the decoy state QKD protocol as a function of the receiver field of view (FOV) for various pointing angles. The results show that at FOVs smaller than previously considered, AO technologies can enhance SKG rates in daylight and even enable SKG where it would otherwise be prohibited as a consequence of either background optical noise or signal loss due to turbulence effects.

  16. Structural basis of GM-CSF and IL-2 sequestration by the viral decoy receptor GIF

    PubMed Central

    Felix, Jan; Kandiah, Eaazhisai; De Munck, Steven; Bloch, Yehudi; van Zundert, Gydo C.P.; Pauwels, Kris; Dansercoer, Ann; Novanska, Katka; Read, Randy J.; Bonvin, Alexandre M.J.J.; Vergauwen, Bjorn; Verstraete, Kenneth; Gutsche, Irina; Savvides, Savvas N.

    2016-01-01

    Subversion of the host immune system by viruses is often mediated by molecular decoys that sequester host proteins pivotal to mounting effective immune responses. The widespread mammalian pathogen parapox Orf virus deploys GIF, a member of the poxvirus immune evasion superfamily, to antagonize GM-CSF (granulocyte macrophage colony-stimulating factor) and IL-2 (interleukin-2), two pleiotropic cytokines of the mammalian immune system. However, structural and mechanistic insights into the unprecedented functional duality of GIF have remained elusive. Here we reveal that GIF employs a dimeric binding platform that sequesters two copies of its target cytokines with high affinity and slow dissociation kinetics to yield distinct complexes featuring mutually exclusive interaction footprints. We illustrate how GIF serves as a competitive decoy receptor by leveraging binding hotspots underlying the cognate receptor interactions of GM-CSF and IL-2, without sharing any structural similarity with the cytokine receptors. Our findings contribute to the tracing of novel molecular mimicry mechanisms employed by pathogenic viruses. PMID:27819269

  17. Sound segregation via embedded repetition is robust to inattention.

    PubMed

    Masutomi, Keiko; Barascud, Nicolas; Kashino, Makio; McDermott, Josh H; Chait, Maria

    2016-03-01

    The segregation of sound sources from the mixture of sounds that enters the ear is a core capacity of human hearing, but the extent to which this process is dependent on attention remains unclear. This study investigated the effect of attention on the ability to segregate sounds via repetition. We utilized a dual task design in which stimuli to be segregated were presented along with stimuli for a "decoy" task that required continuous monitoring. The task to assess segregation presented a target sound 10 times in a row, each time concurrent with a different distractor sound. McDermott, Wrobleski, and Oxenham (2011) demonstrated that repetition causes the target sound to be segregated from the distractors. Segregation was queried by asking listeners whether a subsequent probe sound was identical to the target. A control task presented similar stimuli but probed discrimination without engaging segregation processes. We present results from 3 different decoy tasks: a visual multiple object tracking task, a rapid serial visual presentation (RSVP) digit encoding task, and a demanding auditory monitoring task. Load was manipulated by using high- and low-demand versions of each decoy task. The data provide converging evidence of a small effect of attention that is nonspecific, in that it affected the segregation and control tasks to a similar extent. In all cases, segregation performance remained high despite the presence of a concurrent, objectively demanding decoy task. The results suggest that repetition-based segregation is robust to inattention. (c) 2016 APA, all rights reserved).

  18. Determination of an effective scoring function for RNA-RNA interactions with a physics-based double-iterative method.

    PubMed

    Yan, Yumeng; Wen, Zeyu; Zhang, Di; Huang, Sheng-You

    2018-05-18

    RNA-RNA interactions play fundamental roles in gene and cell regulation. Therefore, accurate prediction of RNA-RNA interactions is critical to determine their complex structures and understand the molecular mechanism of the interactions. Here, we have developed a physics-based double-iterative strategy to determine the effective potentials for RNA-RNA interactions based on a training set of 97 diverse RNA-RNA complexes. The double-iterative strategy circumvented the reference state problem in knowledge-based scoring functions by updating the potentials through iteration and also overcame the decoy-dependent limitation in previous iterative methods by constructing the decoys iteratively. The derived scoring function, which is referred to as DITScoreRR, was evaluated on an RNA-RNA docking benchmark of 60 test cases and compared with three other scoring functions. It was shown that for bound docking, our scoring function DITScoreRR obtained the excellent success rates of 90% and 98.3% in binding mode predictions when the top 1 and 10 predictions were considered, compared to 63.3% and 71.7% for van der Waals interactions, 45.0% and 65.0% for ITScorePP, and 11.7% and 26.7% for ZDOCK 2.1, respectively. For unbound docking, DITScoreRR achieved the good success rates of 53.3% and 71.7% in binding mode predictions when the top 1 and 10 predictions were considered, compared to 13.3% and 28.3% for van der Waals interactions, 11.7% and 26.7% for our ITScorePP, and 3.3% and 6.7% for ZDOCK 2.1, respectively. DITScoreRR also performed significantly better in ranking decoys and obtained significantly higher score-RMSD correlations than the other three scoring functions. DITScoreRR will be of great value for the prediction and design of RNA structures and RNA-RNA complexes.

  19. Differentiation of AmpC beta-lactamase binders vs. decoys using classification kNN QSAR modeling and application of the QSAR classifier to virtual screening

    NASA Astrophysics Data System (ADS)

    Hsieh, Jui-Hua; Wang, Xiang S.; Teotico, Denise; Golbraikh, Alexander; Tropsha, Alexander

    2008-09-01

    The use of inaccurate scoring functions in docking algorithms may result in the selection of compounds with high predicted binding affinity that nevertheless are known experimentally not to bind to the target receptor. Such falsely predicted binders have been termed `binding decoys'. We posed a question as to whether true binders and decoys could be distinguished based only on their structural chemical descriptors using approaches commonly used in ligand based drug design. We have applied the k-Nearest Neighbor ( kNN) classification QSAR approach to a dataset of compounds characterized as binders or binding decoys of AmpC beta-lactamase. Models were subjected to rigorous internal and external validation as part of our standard workflow and a special QSAR modeling scheme was employed that took into account the imbalanced ratio of inhibitors to non-binders (1:4) in this dataset. 342 predictive models were obtained with correct classification rate (CCR) for both training and test sets as high as 0.90 or higher. The prediction accuracy was as high as 100% (CCR = 1.00) for the external validation set composed of 10 compounds (5 true binders and 5 decoys) selected randomly from the original dataset. For an additional external set of 50 known non-binders, we have achieved the CCR of 0.87 using very conservative model applicability domain threshold. The validated binary kNN QSAR models were further employed for mining the NCGC AmpC screening dataset (69653 compounds). The consensus prediction of 64 compounds identified as screening hits in the AmpC PubChem assay disagreed with their annotation in PubChem but was in agreement with the results of secondary assays. At the same time, 15 compounds were identified as potential binders contrary to their annotation in PubChem. Five of them were tested experimentally and showed inhibitory activities in millimolar range with the highest binding constant Ki of 135 μM. Our studies suggest that validated QSAR models could complement structure based docking and scoring approaches in identifying promising hits by virtual screening of molecular libraries.

  20. Cheminformatics meets molecular mechanics: a combined application of knowledge-based pose scoring and physical force field-based hit scoring functions improves the accuracy of structure-based virtual screening.

    PubMed

    Hsieh, Jui-Hua; Yin, Shuangye; Wang, Xiang S; Liu, Shubin; Dokholyan, Nikolay V; Tropsha, Alexander

    2012-01-23

    Poor performance of scoring functions is a well-known bottleneck in structure-based virtual screening (VS), which is most frequently manifested in the scoring functions' inability to discriminate between true ligands vs known nonbinders (therefore designated as binding decoys). This deficiency leads to a large number of false positive hits resulting from VS. We have hypothesized that filtering out or penalizing docking poses recognized as non-native (i.e., pose decoys) should improve the performance of VS in terms of improved identification of true binders. Using several concepts from the field of cheminformatics, we have developed a novel approach to identifying pose decoys from an ensemble of poses generated by computational docking procedures. We demonstrate that the use of target-specific pose (scoring) filter in combination with a physical force field-based scoring function (MedusaScore) leads to significant improvement of hit rates in VS studies for 12 of the 13 benchmark sets from the clustered version of the Database of Useful Decoys (DUD). This new hybrid scoring function outperforms several conventional structure-based scoring functions, including XSCORE::HMSCORE, ChemScore, PLP, and Chemgauss3, in 6 out of 13 data sets at early stage of VS (up 1% decoys of the screening database). We compare our hybrid method with several novel VS methods that were recently reported to have good performances on the same DUD data sets. We find that the retrieved ligands using our method are chemically more diverse in comparison with two ligand-based methods (FieldScreen and FLAP::LBX). We also compare our method with FLAP::RBLB, a high-performance VS method that also utilizes both the receptor and the cognate ligand structures. Interestingly, we find that the top ligands retrieved using our method are highly complementary to those retrieved using FLAP::RBLB, hinting effective directions for best VS applications. We suggest that this integrative VS approach combining cheminformatics and molecular mechanics methodologies may be applied to a broad variety of protein targets to improve the outcome of structure-based drug discovery studies.

  1. TRAIL Death Receptor-4, Decoy Receptor-1 and Decoy Receptor-2 Expression on CD8+ T Cells Correlate with the Disease Severity in Patients with Rheumatoid Arthritis

    PubMed Central

    2010-01-01

    Background Rheumatoid Arthritis (RA) is a chronic autoimmune inflammatory disorder. Although the pathogenesis of disease is unclear, it is well known that T cells play a major role in both development and perpetuation of RA through activating macrophages and B cells. Since the lack of TNF-Related Apoptosis Inducing Ligand (TRAIL) expression resulted in defective thymocyte apoptosis leading to an autoimmune disease, we explored evidence for alterations in TRAIL/TRAIL receptor expression on peripheral T lymphocytes in the molecular mechanism of RA development. Methods The expression of TRAIL/TRAIL receptors on T cells in 20 RA patients and 12 control individuals were analyzed using flow cytometry. The correlation of TRAIL and its receptor expression profile was compared with clinical RA parameters (RA activity scored as per DAS28) using Spearman Rho Analysis. Results While no change was detected in the ratio of CD4+ to CD8+ T cells between controls and RA patient groups, upregulation of TRAIL and its receptors (both death and decoy) was detected on both CD4+ and CD8+ T cells in RA patients compared to control individuals. Death Receptor-4 (DR4) and the decoy receptors DcR1 and DcR2 on CD8+ T cells, but not on CD4+ T cells, were positively correlated with patients' DAS scores. Conclusions Our data suggest that TRAIL/TRAIL receptor expression profiles on T cells might be important in revelation of RA pathogenesis. PMID:20799941

  2. Xenoepitope substitution avoids deceptive imprinting and broadens the immune response to foot-and-mouth disease virus.

    PubMed

    Szczepanek, Steven M; Barrette, Roger W; Rood, Debra; Alejo, Diana; Silbart, Lawrence K

    2012-04-01

    Many RNA viruses encode error-prone polymerases which introduce mutations into B and T cell epitopes, providing a mechanism for immunological escape. When regions of hypervariability are found within immunodominant epitopes with no known function, they are referred to as "decoy epitopes," which often deceptively imprint the host's immune response. In this work, a decoy epitope was identified in the foot-and-mouth disease virus (FMDV) serotype O VP1 G-H loop after multiple sequence alignment of 118 isolates. A series of chimeric cyclic peptides resembling the type O G-H loop were prepared, each bearing a defined "B cell xenoepitope" from another virus in place of the native decoy epitope. These sequences were derived from porcine respiratory and reproductive syndrome virus (PRRSV), from HIV, or from a presumptively tolerogenic sequence from murine albumin and were subsequently used as immunogens in BALB/c mice. Cross-reactive antibody responses against all peptides were compared to a wild-type peptide and ovalbumin (OVA). A broadened antibody response was generated in animals inoculated with the PRRSV chimeric peptide, in which virus binding of serum antibodies was also observed. A B cell epitope mapping experiment did not reveal recognition of any contiguous linear epitopes, raising the possibility that the refocused response was directed to a conformational epitope. Taken together, these results indicate that xenoepitope substitution is a novel method for immune refocusing against decoy epitopes of RNA viruses such as FMDV as part of the rational design of next-generation vaccines.

  3. Function of OPG as a traffic regulator for RANKL is crucial for controlled osteoclastogenesis.

    PubMed

    Aoki, Shigeki; Honma, Masashi; Kariya, Yoshiaki; Nakamichi, Yuko; Ninomiya, Tadashi; Takahashi, Naoyuki; Udagawa, Nobuyuki; Suzuki, Hiroshi

    2010-09-01

    The amount of the receptor activator of NF-κB ligand (RANKL) on the osteoblastic cell surface is considered to determine the magnitude of the signal input to osteoclast precursors and the degree of osteoclastogenesis. Previously, we have shown that RANKL is localized predominantly in lysosomal organelles, but little is found on the osteoblastic cell surface, and consequently, the regulated subcellular trafficking of RANKL in osteoblastic cells is important for controlled osteoclastogenesis. Here we have examined the involvement of osteoprotegerin (OPG), which is currently recognized as a decoy receptor for RANKL, in the regulation of RANKL behavior. It was suggested that OPG already makes a complex with RANKL in the Golgi apparatus and that the complex formation is necessary for RANKL sorting to the secretory lysosomes. It was also shown that each structural domain of OPG is indispensable for exerting OPG function as a traffic regulator. In particular, the latter domains of OPG, whose physiologic functions have been unclear, were indicated to sort RANKL molecules to lysosomes from the Golgi apparatus. In addition, the overexpression of RANK-OPG chimeric protein, which retained OPG function as a decoy receptor but lost the function as a traffic regulator, inhibited endogenous OPG function as a traffic regulator selectively in osteoblastic cells and resulted in the upregulation of osteoclastogenic ability despite the increased number of decoy receptor molecules. Conclusively, OPG function as a traffic regulator for RANKL is crucial for regulating osteoclastogenesis at least as well as that as a decoy receptor. © 2010 American Society for Bone and Mineral Research.

  4. Reduction of Blood Pressure by AT1 Receptor Decoy Peptides.

    PubMed

    Re, Richard N; Chen, Ben; Alam, Jawed; Cook, Julia L

    2013-01-01

    We previously identified the binding of the chaperone protein gamma-aminobutyric acid receptor-associated protein (GABARAP) to a sequence on the carboxy-terminus of the angiotensin II AT1 receptor (AT1R) and showed that this binding enhances AT1R trafficking to the cell surface as well as angiotensin signaling. In this study, we treated sodium-depleted mice with decoy peptides consisting either of a fusion of the cell-penetrating peptide penetratin and the GABARAP/AT1R binding sequence or penetratin fused to a mutated AT1R sequence. We used telemetry to measure blood pressure. Systolic and diastolic pressure fell during the 24 hours following decoy peptide injection but not after control peptide injection. Active cell-penetrating decoy peptide decreased 24-hour average systolic blood pressure from 129.8 ± 4.7 mmHg to 125.0 ± 6.0 mmHg (mean ± standard deviation). Diastolic blood pressure fell from 99.0 ± 7.1 mmHg to 95.0 ± 9.2 mmHg (n=5). Administration of the control peptide raised systolic blood pressure from 128.7 ± 1.3 mmHg to 131.7 ± 2.9 mmHg and diastolic pressure from 93.9 ± 4.5 mmHg to 95.9 ± 4.2 mmHg (n=5). The decreases in both systolic and diastolic blood pressure after active peptide administration were statistically significant compared to control peptide administration (P<0.05, two-tailed Wilcoxon rank-sum test). These results indicate the physiological and potentially therapeutic relevance of inhibitors of GABARAP/AT1R binding.

  5. A Template-Based Protein Structure Reconstruction Method Using Deep Autoencoder Learning.

    PubMed

    Li, Haiou; Lyu, Qiang; Cheng, Jianlin

    2016-12-01

    Protein structure prediction is an important problem in computational biology, and is widely applied to various biomedical problems such as protein function study, protein design, and drug design. In this work, we developed a novel deep learning approach based on a deeply stacked denoising autoencoder for protein structure reconstruction. We applied our approach to a template-based protein structure prediction using only the 3D structural coordinates of homologous template proteins as input. The templates were identified for a target protein by a PSI-BLAST search. 3DRobot (a program that automatically generates diverse and well-packed protein structure decoys) was used to generate initial decoy models for the target from the templates. A stacked denoising autoencoder was trained on the decoys to obtain a deep learning model for the target protein. The trained deep model was then used to reconstruct the final structural model for the target sequence. With target proteins that have highly similar template proteins as benchmarks, the GDT-TS score of the predicted structures is greater than 0.7, suggesting that the deep autoencoder is a promising method for protein structure reconstruction.

  6. Decoy Strategies: The Structure of TL1A:DcR3 Complex

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    C Zhan; Y Patskovsky; Q Yan

    2011-12-31

    Decoy Receptor 3 (DcR3), a secreted member of the Tumor Necrosis Factor (TNF) receptor superfamily, neutralizes three different TNF ligands: FasL, LIGHT, and TL1A. Each of these ligands engages unique signaling receptors which direct distinct and critical immune responses. We report the crystal structures of the unliganded DcR3 ectodomain and its complex with TL1A, as well as complementary mutagenesis and biochemical studies. These analyses demonstrate that DcR3 interacts with invariant backbone and side-chain atoms in the membrane-proximal half of TL1A which supports recognition of its three distinct TNF ligands. Additional features serve as antideterminants that preclude interaction with other membersmore » of the TNF superfamily. This mode of interaction is unique among characterized TNF:TNFR family members and provides a mechanistic basis for the broadened specificity required to support the decoy function of DcR3, as well as for the rational manipulation of specificity and affinity of DcR3 and its ligands.« less

  7. Serum decoy receptor 3 level: a predictive marker for nodal metastasis and survival among oral cavity cancer patients.

    PubMed

    Tu, Hsi-Feng; Liu, Chung-Ji; Liu, Shyun-Yeu; Chen, Yu-Ping; Yu, En-Hao; Lin, Shu-Chun; Chang, Kuo-Wei

    2011-03-01

    Validating markers for prediction of nodal metastasis could be beneficial in treatment of oral cavity cancer. Decoy receptor 3 (DcR3), locus on 20q13, functions as a death decoy inhibiting apoptosis mediated by the tumor necrosis factor receptor (TNFR) family. This study analyzed the serum level of DcR3 in relationship to the clinical parameters of oral cavity cancer patients together with detection of DcR3 genomic copy number in primary and recurrent tumors. Elevated serum DcR3 was associated with nodal metastasis and worse prognosis. Gain of DcR3 copy number was detected in 17% of primary tumor tissue but not found in healthy areca chewers. Tissue from recurrent tumors showed more frequent DcR3 copy number alteration (48%) than the paired primary tumor tissue. Serum DcR3 level is a predictor for the nodal metastasis and survival among oral cavity cancer patients and the DcR3 copy number alteration could underlie oral carcinogenesis progression. Copyright © 2010 Wiley Periodicals, Inc.

  8. Docking ligands into flexible and solvated macromolecules. 7. Impact of protein flexibility and water molecules on docking-based virtual screening accuracy.

    PubMed

    Therrien, Eric; Weill, Nathanael; Tomberg, Anna; Corbeil, Christopher R; Lee, Devin; Moitessier, Nicolas

    2014-11-24

    The use of predictive computational methods in the drug discovery process is in a state of continual growth. Over the last two decades, an increasingly large number of docking tools have been developed to identify hits or optimize lead molecules through in-silico screening of chemical libraries to proteins. In recent years, the focus has been on implementing protein flexibility and water molecules. Our efforts led to the development of Fitted first reported in 2007 and further developed since then. In this study, we wished to evaluate the impact of protein flexibility and occurrence of water molecules on the accuracy of the Fitted docking program to discriminate active compounds from inactive compounds in virtual screening (VS) campaigns. For this purpose, a total of 171 proteins cocrystallized with small molecules representing 40 unique enzymes and receptors as well as sets of known ligands and decoys were selected from the Protein Data Bank (PDB) and the Directory of Useful Decoys (DUD), respectively. This study revealed that implementing displaceable crystallographic or computationally placed particle water molecules and protein flexibility can improve the enrichment in active compounds. In addition, an informed decision based on library diversity or research objectives (hit discovery vs lead optimization) on which implementation to use may lead to significant improvements.

  9. Optimizing physical energy functions for protein folding.

    PubMed

    Fujitsuka, Yoshimi; Takada, Shoji; Luthey-Schulten, Zaida A; Wolynes, Peter G

    2004-01-01

    We optimize a physical energy function for proteins with the use of the available structural database and perform three benchmark tests of the performance: (1) recognition of native structures in the background of predefined decoy sets of Levitt, (2) de novo structure prediction using fragment assembly sampling, and (3) molecular dynamics simulations. The energy parameter optimization is based on the energy landscape theory and uses a Monte Carlo search to find a set of parameters that seeks the largest ratio deltaE(s)/DeltaE for all proteins in a training set simultaneously. Here, deltaE(s) is the stability gap between the native and the average in the denatured states and DeltaE is the energy fluctuation among these states. Some of the energy parameters optimized are found to show significant correlation with experimentally observed quantities: (1) In the recognition test, the optimized function assigns the lowest energy to either the native or a near-native structure among many decoy structures for all the proteins studied. (2) Structure prediction with the fragment assembly sampling gives structure models with root mean square deviation less than 6 A in one of the top five cluster centers for five of six proteins studied. (3) Structure prediction using molecular dynamics simulation gives poorer performance, implying the importance of having a more precise description of local structures. The physical energy function solely inferred from a structural database neither utilizes sequence information from the family of the target nor the outcome of the secondary structure prediction but can produce the correct native fold for many small proteins. Copyright 2003 Wiley-Liss, Inc.

  10. PLGA microspheres encapsulating siRNA.

    PubMed

    De Rosa, Giuseppe; Salzano, Giuseppina

    2015-01-01

    The therapeutic use of small interfering RNA (siRNA) represents a new and powerful approach to suppress the expression of pathologically genes. However, biopharmaceutical drawbacks, such as short half-life, poor cellular uptake, and unspecific distribution into the body, hamper the development of siRNA-based therapeutics. Poly(lactide-co-glycolide), (PLGA) microspheres can be a useful tool to overcome these issues. siRNA can be encapsulated into the PLGA microspheres, which protects the loaded nucleic acid against the enzymatic degradation. Moreover, PLGA microspheres can be injected directly into the action site, where the siRNA can be released in controlled manner, thus avoiding the need of frequent invasive administrations. The complete biodegradability of PLGA to monomers easily metabolized by the body, and its approval by FDA and EMA for parenteral administration, assure the safety of this copolymer and do not require the removal of the device after the complete drug release. In chapter, a basic protocol for the preparation of PLGA microspheres encapsulating siRNA is described. This protocol is based on a double emulsion/solvent evaporation technique, a well known and easy to reproduce method. This specific protocol has been developed to encapsulate a siRNA anti-TNFα in PLGA microspheres, and it has been designed and optimized to achieve high siRNA encapsulation efficiency and slow siRNA release in vitro. However, it can be extended also to other siRNA as well as other RNA or DNA-based oligonucleotides (miRNA, antisense, decoy, etc.). Depending on the applications, chemical modifications of the backbone and site-specific modification within the siRNA sequences could be required.

  11. MicroRNA-433 Dampens Glucocorticoid Receptor Signaling, Impacting Circadian Rhythm and Osteoblastic Gene Expression.

    PubMed

    Smith, Spenser S; Dole, Neha S; Franceschetti, Tiziana; Hrdlicka, Henry C; Delany, Anne M

    2016-10-07

    Serum glucocorticoids play a critical role in synchronizing circadian rhythm in peripheral tissues, and multiple mechanisms regulate tissue sensitivity to glucocorticoids. In the skeleton, circadian rhythm helps coordinate bone formation and resorption. Circadian rhythm is regulated through transcriptional and post-transcriptional feedback loops that include microRNAs. How microRNAs regulate circadian rhythm in bone is unexplored. We show that in mouse calvaria, miR-433 displays robust circadian rhythm, peaking just after dark. In C3H/10T1/2 cells synchronized with a pulse of dexamethasone, inhibition of miR-433 using a tough decoy altered the period and amplitude of Per2 gene expression, suggesting that miR-433 regulates rhythm. Although miR-433 does not directly target the Per2 3'-UTR, it does target two rhythmically expressed genes in calvaria, Igf1 and Hif1α. miR-433 can target the glucocorticoid receptor; however, glucocorticoid receptor protein abundance was unaffected in miR-433 decoy cells. Rather, miR-433 inhibition dramatically enhanced glucocorticoid signaling due to increased nuclear receptor translocation, activating glucocorticoid receptor transcriptional targets. Last, in calvaria of transgenic mice expressing a miR-433 decoy in osteoblastic cells (Col3.6 promoter), the amplitude of Per2 and Bmal1 mRNA rhythm was increased, confirming that miR-433 regulates circadian rhythm. miR-433 was previously shown to target Runx2, and mRNA for Runx2 and its downstream target, osteocalcin, were also increased in miR-433 decoy mouse calvaria. We hypothesize that miR-433 helps maintain circadian rhythm in osteoblasts by regulating sensitivity to glucocorticoid receptor signaling. © 2016 by The American Society for Biochemistry and Molecular Biology, Inc.

  12. Dual Agonist Surrobody Simultaneously Activates Death Receptors DR4 and DR5 to Induce Cancer Cell Death.

    PubMed

    Milutinovic, Snezana; Kashyap, Arun K; Yanagi, Teruki; Wimer, Carina; Zhou, Sihong; O'Neil, Ryann; Kurtzman, Aaron L; Faynboym, Alexsandr; Xu, Li; Hannum, Charles H; Diaz, Paul W; Matsuzawa, Shu-ichi; Horowitz, Michael; Horowitz, Lawrence; Bhatt, Ramesh R; Reed, John C

    2016-01-01

    Death receptors of the TNF family are found on the surface of most cancer cells and their activation typically kills cancer cells through the stimulation of the extrinsic apoptotic pathway. The endogenous ligand for death receptors 4 and 5 (DR4 and DR5) is TNF-related apoptosis-inducing ligand, TRAIL (Apo2L). As most untransformed cells are not susceptible to TRAIL-induced apoptosis, death receptor activators have emerged as promising cancer therapeutic agents. One strategy to stimulate death receptors in cancer patients is to use soluble human recombinant TRAIL protein, but this agent has limitations of a short half-life and decoy receptor sequestration. Another strategy that attempted to evade decoy receptor sequestration and to provide improved pharmacokinetic properties was to generate DR4 or DR5 agonist antibodies. The resulting monoclonal agonist antibodies overcame the limitations of short half-life and avoided decoy receptor sequestration, but are limited by activating only one of the two death receptors. Here, we describe a DR4 and DR5 dual agonist produced using Surrobody technology that activates both DR4 and DR5 to induce apoptotic death of cancer cells in vitro and in vivo and also avoids decoy receptor sequestration. This fully human anti-DR4/DR5 Surrobody displays superior potency to DR4- and DR5-specific antibodies, even when combined with TRAIL-sensitizing proapoptotic agents. Moreover, cancer cells were less likely to acquire resistance to Surrobody than either anti-DR4 or anti-DR5 monospecific antibodies. Taken together, Surrobody shows promising preclinical proapoptotic activity against cancer cells, meriting further exploration of its potential as a novel cancer therapeutic agent. ©2015 American Association for Cancer Research.

  13. Dual agonist Surrobody™ simultaneously activates death receptors DR4 and DR5 to induce cancer cell death

    PubMed Central

    Milutinovic, Snezana; Kashyap, Arun K.; Yanagi, Teruki; Wimer, Carina; Zhou, Sihong; O' Neil, Ryann; Kurtzman, Aaron L.; Faynboym, Alexsandr; Xu, Li; Hannum, Charles H.; Diaz, Paul W.; Matsuzawa, Shu-ichi; Horowitz, Michael; Horowitz, Lawrence; Bhatt, Ramesh R.; Reed, John C.

    2015-01-01

    Death receptors of the Tumor Necrosis Factor (TNF) family are found on surface of most cancer cells and their activation typically kills cancer cells through the stimulation of the extrinsic apoptotic pathway. The endogenous ligand for death receptors-4 and -5 (DR4 and DR5) is Tumor Necrosis Factor-Related Apoptosis-Inducing Ligand, TRAIL (Apo2L). Since most untransformed cells are not susceptible to TRAIL-induced apoptosis, death receptor activators have emerged as promising cancer therapeutic agents. One strategy to stimulate death receptors in cancer patients is to use soluble human recombinant TRAIL protein, but this agent has limitations of a short half-life and decoy receptor sequestration. Another strategy that attempted to evade decoy receptor sequestration and to provide improved pharmacokinetic properties was to generate DR4 or DR5 agonist antibodies. The resulting monoclonal agonist antibodies overcame the limitations of short half-life and avoided decoy receptor sequestration, but are limited by activating only one of the two death receptors. Here, we describe a DR4 and DR5 dual agonist produced using Surrobody™ technology that activates both DR4 and DR5 to induce apoptotic death of cancer cells in vitro and in vivo and also avoids decoy receptor sequestration. This fully human anti-DR4/DR5 Surrobody displays superior potency to DR4- and DR5-specific antibodies, even when combined with TRAIL-sensitizing pro-apoptotic agents. Moreover, cancer cells were less likely to acquire resistance to Surrobody than either anti-DR4 or anti-DR5 mono-specific antibodies. Taken together, Surrobody shows promising preclinical pro-apoptotic activity against cancer cells, meriting further exploration of its potential as a novel cancer therapeutic agent. PMID:26516157

  14. MicroRNA-433 Dampens Glucocorticoid Receptor Signaling, Impacting Circadian Rhythm and Osteoblastic Gene Expression*

    PubMed Central

    Smith, Spenser S.; Dole, Neha S.; Franceschetti, Tiziana; Hrdlicka, Henry C.; Delany, Anne M.

    2016-01-01

    Serum glucocorticoids play a critical role in synchronizing circadian rhythm in peripheral tissues, and multiple mechanisms regulate tissue sensitivity to glucocorticoids. In the skeleton, circadian rhythm helps coordinate bone formation and resorption. Circadian rhythm is regulated through transcriptional and post-transcriptional feedback loops that include microRNAs. How microRNAs regulate circadian rhythm in bone is unexplored. We show that in mouse calvaria, miR-433 displays robust circadian rhythm, peaking just after dark. In C3H/10T1/2 cells synchronized with a pulse of dexamethasone, inhibition of miR-433 using a tough decoy altered the period and amplitude of Per2 gene expression, suggesting that miR-433 regulates rhythm. Although miR-433 does not directly target the Per2 3′-UTR, it does target two rhythmically expressed genes in calvaria, Igf1 and Hif1α. miR-433 can target the glucocorticoid receptor; however, glucocorticoid receptor protein abundance was unaffected in miR-433 decoy cells. Rather, miR-433 inhibition dramatically enhanced glucocorticoid signaling due to increased nuclear receptor translocation, activating glucocorticoid receptor transcriptional targets. Last, in calvaria of transgenic mice expressing a miR-433 decoy in osteoblastic cells (Col3.6 promoter), the amplitude of Per2 and Bmal1 mRNA rhythm was increased, confirming that miR-433 regulates circadian rhythm. miR-433 was previously shown to target Runx2, and mRNA for Runx2 and its downstream target, osteocalcin, were also increased in miR-433 decoy mouse calvaria. We hypothesize that miR-433 helps maintain circadian rhythm in osteoblasts by regulating sensitivity to glucocorticoid receptor signaling. PMID:27551048

  15. Strong light illumination on gain-switched semiconductor lasers helps the eavesdropper in practical quantum key distribution systems

    NASA Astrophysics Data System (ADS)

    Fei, Yang-yang; Meng, Xiang-dong; Gao, Ming; Yang, Yi; Wang, Hong; Ma, Zhi

    2018-07-01

    The temperature of the semiconductor diode increases under strong light illumination whether thermoelectric cooler is installed or not, which changes the output wavelength of the laser (Lee et al., 2017). However, other characteristics also vary as temperature increases. These variations may help the eavesdropper in practical quantum key distribution systems. We study the effects of temperature increase on gain-switched semiconductor lasers by simulating temperature dependent rate equations. The results show that temperature increase may cause large intensity fluctuation, decrease the output intensity and lead the signal state and decoy state distinguishable. We also propose a modified photon number splitting attack by exploiting the effects of temperature increase. Countermeasures are also proposed.

  16. Long-distance measurement-device-independent quantum key distribution with coherent-state superpositions.

    PubMed

    Yin, H-L; Cao, W-F; Fu, Y; Tang, Y-L; Liu, Y; Chen, T-Y; Chen, Z-B

    2014-09-15

    Measurement-device-independent quantum key distribution (MDI-QKD) with decoy-state method is believed to be securely applied to defeat various hacking attacks in practical quantum key distribution systems. Recently, the coherent-state superpositions (CSS) have emerged as an alternative to single-photon qubits for quantum information processing and metrology. Here, in this Letter, CSS are exploited as the source in MDI-QKD. We present an analytical method that gives two tight formulas to estimate the lower bound of yield and the upper bound of bit error rate. We exploit the standard statistical analysis and Chernoff bound to perform the parameter estimation. Chernoff bound can provide good bounds in the long-distance MDI-QKD. Our results show that with CSS, both the security transmission distance and secure key rate are significantly improved compared with those of the weak coherent states in the finite-data case.

  17. Decoy-state reference-frame-independent quantum key distribution with both source errors and statistical fluctuations

    NASA Astrophysics Data System (ADS)

    Liu, Kang; Li, Jian; Zhu, Jian-Rong; Zhang, Chun-Mei; Wang, Qin

    2017-12-01

    Not Available Project supported by the National Key Research and Development Program of China (Grant No. 2017YFA0304100), the National Natural Science Foundation of China (Grant Nos. 61475197, 61590932, 11774180, and 61705110), the Natural Science Foundation of the Jiangsu Higher Education Institutions (Grant Nos. 15KJA120002 and 17KJB140016), the Outstanding Youth Project of Jiangsu Province, China (Grant No. BK20150039), the Natural Science Foundation of Jiangsu Province, China (Grant No. BK20170902), and the Science Fund from the Nanjing University of Posts and Telecommunications, China (Grant No. NY217006).

  18. TRAM-Derived Decoy Peptides inhibits the inflammatory response in mouse mammary epithelial cells and a mastitis model in mice.

    PubMed

    Hu, Xiaoyu; Tian, Yuan; Wang, Tiancheng; Zhang, Wenlong; Wang, Wei; Gao, Xuejiao; Qu, Shihui; Cao, Yongguo; Zhang, Naisheng

    2015-10-05

    It has been proved that TRAM-Derived Decoy peptides have anti-inflammatory properties. In this study, we synthesized a TRAM-Derived decoy peptide (TM6), belongs to TRAM TIR domain, of which sequence is "N"-RQIKIWFQNRRMKWK, KENFLRDTWCNFQFY-"C" and evaluated the effects of TM6 on lipopolysaccharide-induced mastitis in mice. In vivo, LPS-induced mice mastitis model was established by injection of LPS through the duct of mammary gland. TM6 was injected 1h before or after LPS treatment. In vitro, primary mouse mammary epithelial cells were used to investigate the effects of TM6 on LPS-induced inflammatory responses. The results showed that TM6 inhibited LPS-induced mammary gland histopathologic changes, MPO activity, and TNF-α, IL-1β and IL-6 production in mice. In vitro, TM6 significantly inhibited LPS-induced TNF-α and IL-6 production, as well as NF-κB and MAPKs activation. In conclusion, this study demonstrated that TM6 had protective effects on LPS-mastitis and may be a promising therapeutic reagent for mastitis treatment. Copyright © 2015 Elsevier B.V. All rights reserved.

  19. Identify High-Quality Protein Structural Models by Enhanced K-Means.

    PubMed

    Wu, Hongjie; Li, Haiou; Jiang, Min; Chen, Cheng; Lv, Qiang; Wu, Chuang

    2017-01-01

    Background. One critical issue in protein three-dimensional structure prediction using either ab initio or comparative modeling involves identification of high-quality protein structural models from generated decoys. Currently, clustering algorithms are widely used to identify near-native models; however, their performance is dependent upon different conformational decoys, and, for some algorithms, the accuracy declines when the decoy population increases. Results. Here, we proposed two enhanced K -means clustering algorithms capable of robustly identifying high-quality protein structural models. The first one employs the clustering algorithm SPICKER to determine the initial centroids for basic K -means clustering ( SK -means), whereas the other employs squared distance to optimize the initial centroids ( K -means++). Our results showed that SK -means and K -means++ were more robust as compared with SPICKER alone, detecting 33 (59%) and 42 (75%) of 56 targets, respectively, with template modeling scores better than or equal to those of SPICKER. Conclusions. We observed that the classic K -means algorithm showed a similar performance to that of SPICKER, which is a widely used algorithm for protein-structure identification. Both SK -means and K -means++ demonstrated substantial improvements relative to results from SPICKER and classical K -means.

  20. Identify High-Quality Protein Structural Models by Enhanced K-Means

    PubMed Central

    Li, Haiou; Chen, Cheng; Lv, Qiang; Wu, Chuang

    2017-01-01

    Background. One critical issue in protein three-dimensional structure prediction using either ab initio or comparative modeling involves identification of high-quality protein structural models from generated decoys. Currently, clustering algorithms are widely used to identify near-native models; however, their performance is dependent upon different conformational decoys, and, for some algorithms, the accuracy declines when the decoy population increases. Results. Here, we proposed two enhanced K-means clustering algorithms capable of robustly identifying high-quality protein structural models. The first one employs the clustering algorithm SPICKER to determine the initial centroids for basic K-means clustering (SK-means), whereas the other employs squared distance to optimize the initial centroids (K-means++). Our results showed that SK-means and K-means++ were more robust as compared with SPICKER alone, detecting 33 (59%) and 42 (75%) of 56 targets, respectively, with template modeling scores better than or equal to those of SPICKER. Conclusions. We observed that the classic K-means algorithm showed a similar performance to that of SPICKER, which is a widely used algorithm for protein-structure identification. Both SK-means and K-means++ demonstrated substantial improvements relative to results from SPICKER and classical K-means. PMID:28421198

  1. Examination of China’s performance and thematic evolution in quantum cryptography research using quantitative and computational techniques

    PubMed Central

    2018-01-01

    This study performed two phases of analysis to shed light on the performance and thematic evolution of China’s quantum cryptography (QC) research. First, large-scale research publication metadata derived from QC research published from 2001–2017 was used to examine the research performance of China relative to that of global peers using established quantitative and qualitative measures. Second, this study identified the thematic evolution of China’s QC research using co-word cluster network analysis, a computational science mapping technique. The results from the first phase indicate that over the past 17 years, China’s performance has evolved dramatically, placing it in a leading position. Among the most significant findings is the exponential rate at which all of China’s performance indicators (i.e., Publication Frequency, citation score, H-index) are growing. China’s H-index (a normalized indicator) has surpassed all other countries’ over the last several years. The second phase of analysis shows how China’s main research focus has shifted among several QC themes, including quantum-key-distribution, photon-optical communication, network protocols, and quantum entanglement with an emphasis on applied research. Several themes were observed across time periods (e.g., photons, quantum-key-distribution, secret-messages, quantum-optics, quantum-signatures); some themes disappeared over time (e.g., computer-networks, attack-strategies, bell-state, polarization-state), while others emerged more recently (e.g., quantum-entanglement, decoy-state, unitary-operation). Findings from the first phase of analysis provide empirical evidence that China has emerged as the global driving force in QC. Considering China is the premier driving force in global QC research, findings from the second phase of analysis provide an understanding of China’s QC research themes, which can provide clarity into how QC technologies might take shape. QC and science and technology policy researchers can also use these findings to trace previous research directions and plan future lines of research. PMID:29385151

  2. Examination of China's performance and thematic evolution in quantum cryptography research using quantitative and computational techniques.

    PubMed

    Olijnyk, Nicholas V

    2018-01-01

    This study performed two phases of analysis to shed light on the performance and thematic evolution of China's quantum cryptography (QC) research. First, large-scale research publication metadata derived from QC research published from 2001-2017 was used to examine the research performance of China relative to that of global peers using established quantitative and qualitative measures. Second, this study identified the thematic evolution of China's QC research using co-word cluster network analysis, a computational science mapping technique. The results from the first phase indicate that over the past 17 years, China's performance has evolved dramatically, placing it in a leading position. Among the most significant findings is the exponential rate at which all of China's performance indicators (i.e., Publication Frequency, citation score, H-index) are growing. China's H-index (a normalized indicator) has surpassed all other countries' over the last several years. The second phase of analysis shows how China's main research focus has shifted among several QC themes, including quantum-key-distribution, photon-optical communication, network protocols, and quantum entanglement with an emphasis on applied research. Several themes were observed across time periods (e.g., photons, quantum-key-distribution, secret-messages, quantum-optics, quantum-signatures); some themes disappeared over time (e.g., computer-networks, attack-strategies, bell-state, polarization-state), while others emerged more recently (e.g., quantum-entanglement, decoy-state, unitary-operation). Findings from the first phase of analysis provide empirical evidence that China has emerged as the global driving force in QC. Considering China is the premier driving force in global QC research, findings from the second phase of analysis provide an understanding of China's QC research themes, which can provide clarity into how QC technologies might take shape. QC and science and technology policy researchers can also use these findings to trace previous research directions and plan future lines of research.

  3. Evaluation of the performance of 3D virtual screening protocols: RMSD comparisons, enrichment assessments, and decoy selection--what can we learn from earlier mistakes?

    PubMed

    Kirchmair, Johannes; Markt, Patrick; Distinto, Simona; Wolber, Gerhard; Langer, Thierry

    2008-01-01

    Within the last few years a considerable amount of evaluative studies has been published that investigate the performance of 3D virtual screening approaches. Thereby, in particular assessments of protein-ligand docking are facing remarkable interest in the scientific community. However, comparing virtual screening approaches is a non-trivial task. Several publications, especially in the field of molecular docking, suffer from shortcomings that are likely to affect the significance of the results considerably. These quality issues often arise from poor study design, biasing, by using improper or inexpressive enrichment descriptors, and from errors in interpretation of the data output. In this review we analyze recent literature evaluating 3D virtual screening methods, with focus on molecular docking. We highlight problematic issues and provide guidelines on how to improve the quality of computational studies. Since 3D virtual screening protocols are in general assessed by their ability to discriminate between active and inactive compounds, we summarize the impact of the composition and preparation of test sets on the outcome of evaluations. Moreover, we investigate the significance of both classic enrichment parameters and advanced descriptors for the performance of 3D virtual screening methods. Furthermore, we review the significance and suitability of RMSD as a measure for the accuracy of protein-ligand docking algorithms and of conformational space sub sampling algorithms.

  4. Comparative Analysis of Virtual Screening Approaches in the Search for Novel EphA2 Receptor Antagonists.

    PubMed

    Callegari, Donatella; Pala, Daniele; Scalvini, Laura; Tognolini, Massimiliano; Incerti, Matteo; Rivara, Silvia; Mor, Marco; Lodola, Alessio

    2015-09-17

    The EphA2 receptor and its ephrin-A1 ligand form a key cell communication system, which has been found overexpressed in many cancer types and involved in tumor growth. Recent medicinal chemistry efforts have identified bile acid derivatives as low micromolar binders of the EphA2 receptor. However, these compounds suffer from poor physicochemical properties, hampering their use in vivo. The identification of compounds able to disrupt the EphA2-ephrin-A1 complex lacking the bile acid scaffold may lead to new pharmacological tools suitable for in vivo studies. To identify the most promising virtual screening (VS) protocol aimed at finding novel EphA2 antagonists, we investigated the ability of both ligand-based and structure-based approaches to retrieve known EphA2 antagonists from libraries of decoys with similar molecular properties. While ligand-based VSs were conducted using UniPR129 and ephrin-A1 ligand as reference structures, structure-based VSs were performed with Glide, using the X-ray structure of the EphA2 receptor/ephrin-A1 complex. A comparison of enrichment factors showed that ligand-based approaches outperformed the structure-based ones, suggesting ligand-based methods using the G-H loop of ephrin-A1 ligand as template as the most promising protocols to search for novel EphA2 antagonists.

  5. KoBaMIN: a knowledge-based minimization web server for protein structure refinement.

    PubMed

    Rodrigues, João P G L M; Levitt, Michael; Chopra, Gaurav

    2012-07-01

    The KoBaMIN web server provides an online interface to a simple, consistent and computationally efficient protein structure refinement protocol based on minimization of a knowledge-based potential of mean force. The server can be used to refine either a single protein structure or an ensemble of proteins starting from their unrefined coordinates in PDB format. The refinement method is particularly fast and accurate due to the underlying knowledge-based potential derived from structures deposited in the PDB; as such, the energy function implicitly includes the effects of solvent and the crystal environment. Our server allows for an optional but recommended step that optimizes stereochemistry using the MESHI software. The KoBaMIN server also allows comparison of the refined structures with a provided reference structure to assess the changes brought about by the refinement protocol. The performance of KoBaMIN has been benchmarked widely on a large set of decoys, all models generated at the seventh worldwide experiments on critical assessment of techniques for protein structure prediction (CASP7) and it was also shown to produce top-ranking predictions in the refinement category at both CASP8 and CASP9, yielding consistently good results across a broad range of model quality values. The web server is fully functional and freely available at http://csb.stanford.edu/kobamin.

  6. CSAR 2014: A Benchmark Exercise Using Unpublished Data from Pharma.

    PubMed

    Carlson, Heather A; Smith, Richard D; Damm-Ganamet, Kelly L; Stuckey, Jeanne A; Ahmed, Aqeel; Convery, Maire A; Somers, Donald O; Kranz, Michael; Elkins, Patricia A; Cui, Guanglei; Peishoff, Catherine E; Lambert, Millard H; Dunbar, James B

    2016-06-27

    The 2014 CSAR Benchmark Exercise was the last community-wide exercise that was conducted by the group at the University of Michigan, Ann Arbor. For this event, GlaxoSmithKline (GSK) donated unpublished crystal structures and affinity data from in-house projects. Three targets were used: tRNA (m1G37) methyltransferase (TrmD), Spleen Tyrosine Kinase (SYK), and Factor Xa (FXa). A particularly strong feature of the GSK data is its large size, which lends greater statistical significance to comparisons between different methods. In Phase 1 of the CSAR 2014 Exercise, participants were given several protein-ligand complexes and asked to identify the one near-native pose from among 200 decoys provided by CSAR. Though decoys were requested by the community, we found that they complicated our analysis. We could not discern whether poor predictions were failures of the chosen method or an incompatibility between the participant's method and the setup protocol we used. This problem is inherent to decoys, and we strongly advise against their use. In Phase 2, participants had to dock and rank/score a set of small molecules given only the SMILES strings of the ligands and a protein structure with a different ligand bound. Overall, docking was a success for most participants, much better in Phase 2 than in Phase 1. However, scoring was a greater challenge. No particular approach to docking and scoring had an edge, and successful methods included empirical, knowledge-based, machine-learning, shape-fitting, and even those with solvation and entropy terms. Several groups were successful in ranking TrmD and/or SYK, but ranking FXa ligands was intractable for all participants. Methods that were able to dock well across all submitted systems include MDock,1 Glide-XP,2 PLANTS,3 Wilma,4 Gold,5 SMINA,6 Glide-XP2/PELE,7 FlexX,8 and MedusaDock.9 In fact, the submission based on Glide-XP2/PELE7 cross-docked all ligands to many crystal structures, and it was particularly impressive to see success across an ensemble of protein structures for multiple targets. For scoring/ranking, submissions that showed statistically significant achievement include MDock1 using ITScore1,10 with a flexible-ligand term,11 SMINA6 using Autodock-Vina,12,13 FlexX8 using HYDE,14 and Glide-XP2 using XP DockScore2 with and without ROCS15 shape similarity.16 Of course, these results are for only three protein targets, and many more systems need to be investigated to truly identify which approaches are more successful than others. Furthermore, our exercise is not a competition.

  7. Decoy peptide targeted to Toll-IL-1R domain inhibits LPS and TLR4-active metabolite morphine-3 glucuronide sensitization of sensory neurons.

    PubMed

    Allette, Yohance M; Kim, Youngsook; Randolph, Aaron L; Smith, Jared A; Ripsch, Matthew S; White, Fletcher A

    2017-06-16

    Accumulating evidence indicates that Toll-like receptor (TLR) signaling adapter protein interactions with Toll/Interleukin-1 Receptor (TIR) domains present in sensory neurons may modulate neuropathic pain states. Following ligand interaction with TLRs, TIR serves to both initiate intracellular signaling and facilitate recruitment of signaling adapter proteins to the intracytoplasmic domain. Although TLR TIR is central to a number of TLR signaling cascades, its role in sensory neurons is poorly understood. In this study we investigated the degree to which TLR TIR decoy peptide modified to include a TAT sequence (Trans-Activator of Transcription gene in HIV; TAT-4BB) affected LPS-induced intracellular calcium flux and excitation in sensory neurons, and behavioral changes due to TLR4 active metabolite, morphine-3-glucuronide (M3G) exposure in vivo. TAT-4BB inhibited LPS-induced calcium changes in a majority of sensory neurons and decreased LPS-dependent neuronal excitability in small diameter neurons. Acute systemic administration of the TAT-4BB reversed M3G-induced tactile allodynia in a dose-dependent manner but did not affect motor activity, anxiety or responses to noxious thermal stimulus. These data suggest that targeting TLR TIR domains may provide novel pharmacological targets to reduce or reverse TLR4-dependent pain behavior in the rodent.

  8. Quantum state sharing against the controller's cheating

    NASA Astrophysics Data System (ADS)

    Shi, Run-hua; Zhong, Hong; Huang, Liu-sheng

    2013-08-01

    Most existing QSTS schemes are equivalent to the controlled teleportation, in which a designated agent (i.e., the recoverer) can recover the teleported state with the help of the controllers. However, the controller may attempt to cheat the recoverer during the phase of recovering the secret state. How can we detect this cheating? In this paper, we considered the problem of detecting the controller's cheating in Quantum State Sharing, and further proposed an effective Quantum State Sharing scheme against the controller's cheating. We cleverly use Quantum Secret Sharing, Multiple Quantum States Sharing and decoy-particle techniques. In our scheme, via a previously shared entanglement state Alice can teleport multiple arbitrary multi-qubit states to Bob with the help of Charlie. Furthermore, by the classical information shared previously, Alice and Bob can check whether there is any cheating of Charlie. In addition, our scheme only needs to perform Bell-state and single-particle measurements, and to apply C-NOT gate and other single-particle unitary operations. With the present techniques, it is feasible to implement these necessary measurements and operations.

  9. Approach jamming effectiveness evaluation for surface-type infrared decoy in network centric warship formation

    NASA Astrophysics Data System (ADS)

    Lv, Mingshan

    2015-10-01

    The passive and photoelectrical jamming to anti-ship missile in the condition of network centric warship formation is an important research issue of fleet EW operation. An approach jamming method of shipborne surface-type infrared decoy countering the infrared image guided anti-ship missile is put forward. By analyzing the countering process the jamming effectiveness evaluation model is constructed. By simulation the method is proved t reasonable and effective. This method breaks through the traditional restrict that the passive and photoelectricity jamming measure can only be used in the end self-defence and provides a new method for network centric worship formation to support each other.

  10. Discovery of the glycogen phosphorylase-modulating activity of a resveratrol glucoside by using a virtual screening protocol optimized for solvation effects.

    PubMed

    Mavrokefalos, Nikolaos; Myrianthopoulos, Vassilios; Chajistamatiou, Aikaterini S; Chrysina, Evangelia D; Mikros, Emmanuel

    2015-04-01

    The identification of natural products that can modulate blood glucose levels is of great interest as it can possibly facilitate the utilization of mild interventions such as herbal medicine or functional foods in the treatment of chronic diseases like diabetes. One of the established drug targets for antihyperglycemic therapy is glycogen phosphorylase. To evaluate the glycogen phosphorylase inhibitory properties of an in-house compound collection consisting to a large extent of natural products, a stepwise virtual and experimental screening protocol was devised and implemented. The fact that the active site of glycogen phosphorylase is highly hydrated emphasized that a methodological aspect needed to be efficiently addressed prior to an in silico evaluation of the compound collection. The effect of water molecules on docking calculations was regarded as a key parameter in terms of virtual screening protocol optimization. Statistical analysis of 125 structures of glycogen phosphorylase and solvent mapping focusing on the active site hydration motif in combination with a retrospective screening revealed the importance of a set of 29 crystallographic water molecules for achieving high enrichment as to the discrimination between active compounds and inactive decoys. The scaling of Van der Waals radii of system atoms had an additional effect on screening performance. Having optimized the in silico protocol, a prospective evaluation of the in-house compound collection derived a set of 18 top-ranked natural products that were subsequently evaluated in vitro for their activity as glycogen phosphorylase inhibitors. Two phenolic glucosides with glycogen phosphorylase-modulating activity were identified, whereas the most potent compound affording mid-micromolar inhibition was a glucosidic derivative of resveratrol, a stilbene well-known for its wide range of biological activities. Results show the possible phytotherapeutic and nutraceutical potential of products common in the Mediterranean countries, such as red wine and Vitis products in general or green raw salads and herbal preparations, where such compounds are abundant. Georg Thieme Verlag KG Stuttgart · New York.

  11. A tissue microarray study of toll-like receptor 4, decoy receptor 3, and external signal regulated kinase 1/2 expressions in astrocytoma.

    PubMed

    Lin, Chih-Kung; Ting, Chun-Chieh; Tsai, Wen-Chiuan; Chen, Yuan-Wu; Hueng, Dueng-Yuan

    2016-01-01

    Decoy receptor 3 (DcR3) functions as a death decoy inhibiting apoptosis mediated by the tumor necrosis factor receptor family. It is highly expressed in many tumors and its expression can be regulated by the MAPK/ERK signaling pathway and ERK is a vital member of this pathway. Toll-like receptor 4 (TLR4) is expressed on immune cells. Increased TLR4 expression has been associated with various types of cancers. The study was conducted to investigate the expression of DcR3, ERK1/2, and TLR4 in astrocytomas and evaluate if they are validating markers for discriminating glioblastoma from anaplastic astrocytoma in limited surgical specimen. Expression of DcR3, ERK1/2, and TLR4 was determined by immunohistochemical staining of tissue microarray from 48 paraffin-embedded tissues. A binary logistic regression method was used to generate functions that discriminate between anaplastic astrocytomas and glioblastomas. The expression of TLR4 and DcR3 was significantly higher in glioblastomas than in anaplastic astrocytomas. DcR3 could discriminate anaplastic astrocytomas from glioblastomas with high sensitivity (93.8%), specificity (90%), and accuracy (92.3%). Our results suggest that DcR3 may be a useful marker for discriminating anaplastic astrocytomas from glioblastomas.

  12. Role of the chemokine decoy receptor D6 in balancing inflammation, immune activation, and antimicrobial resistance in Mycobacterium tuberculosis infection

    PubMed Central

    Di Liberto, Diana; Locati, Massimo; Caccamo, Nadia; Vecchi, Annunciata; Meraviglia, Serena; Salerno, Alfredo; Sireci, Guido; Nebuloni, Manuela; Caceres, Neus; Cardona, Pere-Joan; Dieli, Francesco; Mantovani, Alberto

    2008-01-01

    D6 is a decoy and scavenger receptor for inflammatory CC chemokines. D6-deficient mice were rapidly killed by intranasal administration of low doses of Mycobacterium tuberculosis. The death of D6−/− mice was associated with a dramatic local and systemic inflammatory response with levels of M. tuberculosis colony-forming units similar to control D6-proficient mice. D6-deficient mice showed an increased numbers of mononuclear cells (macrophages, dendritic cells, and CD4 and CD8 T lymphocytes) infiltrating inflamed tissues and lymph nodes, as well as abnormal increased concentrations of CC chemokines (CCL2, CCL3, CCL4, and CCL5) and proinflammatory cytokines (tumor necrosis factor α, interleukin 1β, and interferon γ) in bronchoalveolar lavage and serum. High levels of inflammatory cytokines in D6−/− infected mice were associated with liver and kidney damage, resulting in both liver and renal failure. Blocking inflammatory CC chemokines with a cocktail of antibodies reversed the inflammatory phenotype of D6−/− mice but led to less controlled growth of M. tuberculosis. Thus, the D6 decoy receptor plays a key role in setting the balance between antimicrobial resistance, immune activation, and inflammation in M. tuberculosis infection. PMID:18695004

  13. DECOY: Documenting Experiences with Cigarettes and Other Tobacco in Young Adults

    PubMed Central

    Berg, Carla J.; Haardörfer, Regine; Lewis, Michael; Getachew, Betelihem; Lloyd, Steven A.; Thomas, Sarah Fretti; Lanier, Angela; Trepanier, Kelleigh; Johnston, Teresa; Grimsley, Linda; Foster, Bruce; Benson, Stephanie; Smith, Alicia; Barr, Dana Boyd; Windle, Michael

    2016-01-01

    Objectives We examined psychographic characteristics associated with tobacco use among Project DECOY participants. Methods Project DECOY is a 2-year longitudinal mixed-methods study examining risk for tobacco use among 3418 young adults across 7 Georgia colleges/universities. Baseline measures included sociodemographics, tobacco use, and psychographics using the Values, Attitudes, and Lifestyle Scale. Bivariate and multivariable analyses were conducted to identify correlates of tobacco use. Results Past 30-day use prevalence was: 13.3% cigarettes; 11.3% little cigars/cigarillos (LCCs); 3.6% smokeless tobacco; 10.9% e-cigarettes; and 12.2% hookah. Controlling for sociodemographics, correlates of cigarette use included greater novelty seeking (p < .001) and intellectual curiosity (p = .010) and less interest in tangible creation (p = .002) and social conservatism (p < .001). Correlates of LCC use included greater novelty seeking (p < .001) and greater fashion orientation (p = .007). Correlates of smokeless tobacco use included greater novelty seeking (p = .006) and less intellectual curiosity (p < .001). Correlates of e-cigarette use included greater novelty seeking (p < .001) and less social conservatism (p = .002). Correlates of hookah use included greater novelty seeking (p < .001), fashion orientation (p = .044), and self-focused thinking (p = .002), and less social conservatism (p < .001). Conclusions Psychographic characteristics distinguish users of different tobacco products. PMID:27103410

  14. [Regression analysis to select native-like structures from decoys of antigen-antibody docking].

    PubMed

    Chen, Zhengshan; Chi, Xiangyang; Fan, Pengfei; Zhang, Guanying; Wang, Meirong; Yu, Changming; Chen, Wei

    2018-06-25

    Given the increasing exploitation of antibodies in different contexts such as molecular diagnostics and therapeutics, it would be beneficial to unravel properties of antigen-antibody interaction with modeling of computational protein-protein docking, especially, in the absence of a cocrystal structure. However, obtaining a native-like antigen-antibody structure remains challenging due in part to failing to reliably discriminate accurate from inaccurate structures among tens of thousands of decoys after computational docking with existing scoring function. We hypothesized that some important physicochemical and energetic features could be used to describe antigen-antibody interfaces and identify native-like antigen-antibody structure. We prepared a dataset, a subset of Protein-Protein Docking Benchmark Version 4.0, comprising 37 nonredundant 3D structures of antigen-antibody complexes, and used it to train and test multivariate logistic regression equation which took several important physicochemical and energetic features of decoys as dependent variables. Our results indicate that the ability to identify native-like structures of our method is superior to ZRANK and ZDOCK score for the subset of antigen-antibody complexes. And then, we use our method in workflow of predicting epitope of anti-Ebola glycoprotein monoclonal antibody-4G7 and identify three accurate residues in its epitope.

  15. Aberrant expression and function of death receptor-3 and death decoy receptor-3 in human cancer.

    PubMed

    Ge, Zhicheng; Sanders, Andrew J; Ye, Lin; Jiang, Wen G

    2011-03-01

    Death receptor-3 (DR3) and death decoy receptor-3 (DcR3) are both members of the tumour necrosis factor receptor (TNFR) superfamily. The TNFR superfamily contains eight death domain-containing receptors, including TNFR1 (also called DR1), Fas (also called DR2), DR3, DR4, DR5, DR6, NGFR and EDAR. Upon the binding of these receptors with their corresponding ligands, the death domain recruits various proteins that mediate both the death and proliferation of cells. Receptor function is negatively regulated by decoy receptors (DcR1, DcR2, DcR3 and OPG). DR3/DcR3 are a pair of positive and negative players with which vascular endothelial growth inhibitor (VEGI) interacts. VEGI has been suggested to be a potential tumour suppressor. The inhibitory effects of VEGI on cancer are manifested in three main areas: a direct effect on cancer cells, an anti-angiogenic effect on endothelial cells, and the stimulation of dendritic cell maturation. A recent study indicated that DR3 may be a new receptor for E-selectin, which has been reported to be associated with cancer metastasis. DcR3 is a soluble receptor, highly expressed in various tumours, which lacks an apparent transmembrane segment, prevents cytokine response through ligand binding and neutralization, and is an inhibitor of apoptosis. DcR3 serves as a decoy receptor for FasL, LIGHT and VEGI. The cytokine LIGHT activates various anti-tumour functions and is expected to be a promising candidate for cancer therapy. Certain tumours may escape FasL-dependent immune-cytotoxic attack by expressing DcR3, which blocks FasL function. DR3/DcR3 play profound roles in regulating cell death and proliferation in cancer. The present review briefly discusses DR3/DcR3 and attempts to elucidate the role of these negative and positive players in cancer.

  16. Isolation of epidermal cells and cDNA cloning of TNF decoy receptor 3 of conger eel, Conger myriaster.

    PubMed

    Tsutsui, Shigeyuki; Yoshino, Yuko; Matsui, Saho; Nakamura, Osamu; Muramoto, Koji; Watanabe, Tasuku

    2008-03-01

    By using EDTA and a trypsin solution, we established a method for isolating the epidermal cells of the conger eel, Conger myriaster. We then identified TNF decoy receptor (DcR) cDNA in the species from a suppression subtractive hybridization library prepared from the epidermal cells stimulated with LPS. The full-length cDNA of conger TNF DcR (conDcR) consisted of 1479 base pairs, and the protein comprised 286 amino acid residues. Phylogenetic analysis indicated that conDcR was clustered into a DcR3 branch. ConDcR is likely to act as an important immune-regulating factor in inhibiting the apoptosis-inducing effect of TNF in the skin of conger eel.

  17. Effects of an electric field on white sharks: in situ testing of an electric deterrent.

    PubMed

    Huveneers, Charlie; Rogers, Paul J; Semmens, Jayson M; Beckmann, Crystal; Kock, Alison A; Page, Brad; Goldsworthy, Simon D

    2013-01-01

    Elasmobranchs can detect minute electromagnetic fields, <1 nV cm(-1), using their ampullae of Lorenzini. Behavioural responses to electric fields have been investigated in various species, sometimes with the aim to develop shark deterrents to improve human safety. The present study tested the effects of the Shark Shield Freedom7™ electric deterrent on (1) the behaviour of 18 white sharks (Carcharodon carcharias) near a static bait, and (2) the rates of attacks on a towed seal decoy. In the first experiment, 116 trials using a static bait were performed at the Neptune Islands, South Australia. The proportion of baits taken during static bait trials was not affected by the electric field. The electric field, however, increased the time it took them to consume the bait, the number of interactions per approach, and decreased the proportion of interactions within two metres of the field source. The effect of the electric field was not uniform across all sharks. In the second experiment, 189 tows using a seal decoy were conducted near Seal Island, South Africa. No breaches and only two surface interactions were observed during the tows when the electric field was activated, compared with 16 breaches and 27 surface interactions without the electric field. The present study suggests that the behavioural response of white sharks and the level of risk reduction resulting from the electric field is contextually specific, and depends on the motivational state of sharks.

  18. Effects of an Electric Field on White Sharks: In Situ Testing of an Electric Deterrent

    PubMed Central

    Huveneers, Charlie; Rogers, Paul J.; Semmens, Jayson M.; Beckmann, Crystal; Kock, Alison A.; Page, Brad; Goldsworthy, Simon D.

    2013-01-01

    Elasmobranchs can detect minute electromagnetic fields, <1 nVcm–1, using their ampullae of Lorenzini. Behavioural responses to electric fields have been investigated in various species, sometimes with the aim to develop shark deterrents to improve human safety. The present study tested the effects of the Shark Shield Freedom7™ electric deterrent on (1) the behaviour of 18 white sharks (Carcharodon carcharias) near a static bait, and (2) the rates of attacks on a towed seal decoy. In the first experiment, 116 trials using a static bait were performed at the Neptune Islands, South Australia. The proportion of baits taken during static bait trials was not affected by the electric field. The electric field, however, increased the time it took them to consume the bait, the number of interactions per approach, and decreased the proportion of interactions within two metres of the field source. The effect of the electric field was not uniform across all sharks. In the second experiment, 189 tows using a seal decoy were conducted near Seal Island, South Africa. No breaches and only two surface interactions were observed during the tows when the electric field was activated, compared with 16 breaches and 27 surface interactions without the electric field. The present study suggests that the behavioural response of white sharks and the level of risk reduction resulting from the electric field is contextually specific, and depends on the motivational state of sharks. PMID:23658766

  19. Handler beliefs affect scent detection dog outcomes.

    PubMed

    Lit, Lisa; Schweitzer, Julie B; Oberbauer, Anita M

    2011-05-01

    Our aim was to evaluate how human beliefs affect working dog outcomes in an applied environment. We asked whether beliefs of scent detection dog handlers affect team performance and evaluated relative importance of human versus dog influences on handlers' beliefs. Eighteen drug and/or explosive detection dog/handler teams each completed two sets of four brief search scenarios (conditions). Handlers were falsely told that two conditions contained a paper marking scent location (human influence). Two conditions contained decoy scents (food/toy) to encourage dog interest in a false location (dog influence). Conditions were (1) control; (2) paper marker; (3) decoy scent; and (4) paper marker at decoy scent. No conditions contained drug or explosive scent; any alerting response was incorrect. A repeated measures analysis of variance was used with search condition as the independent variable and number of alerts as the dependent variable. Additional nonparametric tests compared human and dog influence. There were 225 incorrect responses, with no differences in mean responses across conditions. Response patterns differed by condition. There were more correct (no alert responses) searches in conditions without markers. Within marked conditions, handlers reported that dogs alerted more at marked locations than other locations. Handlers' beliefs that scent was present potentiated handler identification of detection dog alerts. Human more than dog influences affected alert locations. This confirms that handler beliefs affect outcomes of scent detection dog deployments.

  20. Extent of tooth decay in the mouth and increased need for replacement of dental restorations: the New England Children's Amalgam Trial.

    PubMed

    Trachtenberg, Felicia; Maserejian, Nancy Nairi; Tavares, Mary; Soncini, Jennifer Ann; Hayes, Catherine

    2008-01-01

    The purpose of this study was to assess the relationship between baseline caries experience and the restoration replacement rate in children. The 5-year New England Children's Amalgam Trial recruited 534 6- to 10-year-old children with 2 or more carious posterior teeth. The association between decoy and longevity of restorations was assessed. Restorations with no follow-up (N = 391) were excluded from analysis. The average follow-up was 3.0 +/- 1.6 years in 489 children. Restorations with follow-up (N = 3,604) were placed in mouths with a median of 15 dfs/DFS and 8 dft/DFT. The need for replacement increased significantly (P < or = .001) with increasing numbers of dfs/DFS and dft/DFT. After 5 years of follow-up, at least 15% of restorations in a mouth with > or = 14 dfs/DFS needed replacement, compared to 9% for 2 to 5 dfs/DFS. Comparing dft/DFT after 5 years of follow-up, there was a 23% replacement rate for > or = 12 dft/DFT compared to 10% for 2 to 3 dft/DFT. Decoy in the mouth had a greater association with the need for replacement due to new caries compared to replacement due to recurrent caries. Children with more decoy at the time of restoration placement were at higher risk for replacement of restorations.

  1. Can a pairwise contact potential stabilize native protein folds against decoys obtained by threading?

    PubMed

    Vendruscolo, M; Najmanovich, R; Domany, E

    2000-02-01

    We present a method to derive contact energy parameters from large sets of proteins. The basic requirement on which our method is based is that for each protein in the database the native contact map has lower energy than all its decoy conformations that are obtained by threading. Only when this condition is satisfied one can use the proposed energy function for fold identification. Such a set of parameters can be found (by perceptron learning) if Mp, the number of proteins in the database, is not too large. Other aspects that influence the existence of such a solution are the exact definition of contact and the value of the critical distance Rc, below which two residues are considered to be in contact. Another important novel feature of our approach is its ability to determine whether an energy function of some suitable proposed form can or cannot be parameterized in a way that satisfies our basic requirement. As a demonstration of this, we determine the region in the (Rc, Mp) plane in which the problem is solvable, i.e., we can find a set of contact parameters that stabilize simultaneously all the native conformations. We show that for large enough databases the contact approximation to the energy cannot stabilize all the native folds even against the decoys obtained by gapless threading.

  2. The relationship of plasma decoy receptor 3 and coronary collateral circulation in patients with coronary artery disease.

    PubMed

    Yan, Youyou; Song, Dandan; Liu, Lulu; Meng, Xiuping; Qi, Chao; Wang, Junnan

    2017-11-15

    Previously, decoy receptor 3 (DcR3) was found to be a potential angiogenetic factor, while the relationship of DcR3 with coronary collateral circulation formation has not been investigated. In this study, we aimed to investigate whether plasma decoy receptor 3 levels was associated with CCC formation and evaluate its predictive power for CCC status in patients with coronary artery disease. Among patients who underwent coronary angiography with coronary artery disease and had a stenosis of ≥90% were included in our study. Collateral degree was graded according to Rentrope Cohen classification. Patients with grade 2 or 3 collateral degree were enrolled in good CCC group and patients with grade 0 or 1 collateral degree were enrolled in poor CCC group. Plasma DcR3 level was significantly higher in good CCC group (328.00±230.82 vs 194.84±130.63ng/l, p<0.01) and positively correlated with Rentrope grade (p<0.01). In addition, plasma DcR3 was also positively correlated with VEGF-A. Both ROC (receiver operating characteristic curve) and multinomial logistical regression analysis showed that plasma DcR3 displayed potent predictive power for CCC status. Higher plasma DcR3 level was related to better CCC formation and displayed potent predictive power for CCC status. Copyright © 2017. Published by Elsevier Inc.

  3. Scalable quantum information processing with photons and atoms

    NASA Astrophysics Data System (ADS)

    Pan, Jian-Wei

    Over the past three decades, the promises of super-fast quantum computing and secure quantum cryptography have spurred a world-wide interest in quantum information, generating fascinating quantum technologies for coherent manipulation of individual quantum systems. However, the distance of fiber-based quantum communications is limited due to intrinsic fiber loss and decreasing of entanglement quality. Moreover, probabilistic single-photon source and entanglement source demand exponentially increased overheads for scalable quantum information processing. To overcome these problems, we are taking two paths in parallel: quantum repeaters and through satellite. We used the decoy-state QKD protocol to close the loophole of imperfect photon source, and used the measurement-device-independent QKD protocol to close the loophole of imperfect photon detectors--two main loopholes in quantum cryptograph. Based on these techniques, we are now building world's biggest quantum secure communication backbone, from Beijing to Shanghai, with a distance exceeding 2000 km. Meanwhile, we are developing practically useful quantum repeaters that combine entanglement swapping, entanglement purification, and quantum memory for the ultra-long distance quantum communication. The second line is satellite-based global quantum communication, taking advantage of the negligible photon loss and decoherence in the atmosphere. We realized teleportation and entanglement distribution over 100 km, and later on a rapidly moving platform. We are also making efforts toward the generation of multiphoton entanglement and its use in teleportation of multiple properties of a single quantum particle, topological error correction, quantum algorithms for solving systems of linear equations and machine learning. Finally, I will talk about our recent experiments on quantum simulations on ultracold atoms. On the one hand, by applying an optical Raman lattice technique, we realized a two-dimensional spin-obit (SO) coupling and topological bands with ultracold bosonic atoms. A controllable crossover between 2D and 1D SO couplings is studied, and the SO effects and nontrivial band topology are observe. On the other hand, utilizing a two-dimensional spin-dependent optical superlattice and a single layer of atom cloud, we directly observed the four-body ring-exchange coupling and the Anyonic fractional statistics.

  4. Decoy state method for quantum cryptography based on phase coding into faint laser pulses

    NASA Astrophysics Data System (ADS)

    Kulik, S. P.; Molotkov, S. N.

    2017-12-01

    We discuss the photon number splitting attack (PNS) in systems of quantum cryptography with phase coding. It is shown that this attack, as well as the structural equations for the PNS attack for phase encoding, differs physically from the analogous attack applied to the polarization coding. As far as we know, in practice, in all works to date processing of experimental data has been done for phase coding, but using formulas for polarization coding. This can lead to inadequate results for the length of the secret key. These calculations are important for the correct interpretation of the results, especially if it concerns the criterion of secrecy in quantum cryptography.

  5. Statistical analysis of EGFR structures' performance in virtual screening

    NASA Astrophysics Data System (ADS)

    Li, Yan; Li, Xiang; Dong, Zigang

    2015-11-01

    In this work the ability of EGFR structures to distinguish true inhibitors from decoys in docking and MM-PBSA is assessed by statistical procedures. The docking performance depends critically on the receptor conformation and bound state. The enrichment of known inhibitors is well correlated with the difference between EGFR structures rather than the bound-ligand property. The optimal structures for virtual screening can be selected based purely on the complex information. And the mixed combination of distinct EGFR conformations is recommended for ensemble docking. In MM-PBSA, a variety of EGFR structures have identically good performance in the scoring and ranking of known inhibitors, indicating that the choice of the receptor structure has little effect on the screening.

  6. Plant targets for Pseudomonas syringae type III effectors: virulence targets or guarded decoys?

    PubMed

    Block, Anna; Alfano, James R

    2011-02-01

    The phytopathogenic bacterium Pseudomonas syringae can suppress both pathogen-associated molecular pattern (PAMP)-triggered immunity (PTI) and effector-triggered immunity (ETI) by the injection of type III effector (T3E) proteins into host cells. T3Es achieve immune suppression using a variety of strategies including interference with immune receptor signaling, blocking RNA pathways and vesicle trafficking, and altering organelle function. T3Es can be recognized indirectly by resistance proteins monitoring specific T3E targets resulting in ETI. It is presently unclear whether the monitored targets represent bona fide virulence targets or guarded decoys. Extensive overlap between PTI and ETI signaling suggests that T3Es may suppress both pathways through common targets and by possessing multiple activities. Copyright © 2010 Elsevier Ltd. All rights reserved.

  7. Informatic analysis for hidden pulse attack exploiting spectral characteristics of optics in plug-and-play quantum key distribution system

    NASA Astrophysics Data System (ADS)

    Ko, Heasin; Lim, Kyongchun; Oh, Junsang; Rhee, June-Koo Kevin

    2016-10-01

    Quantum channel loopholes due to imperfect implementations of practical devices expose quantum key distribution (QKD) systems to potential eavesdropping attacks. Even though QKD systems are implemented with optical devices that are highly selective on spectral characteristics, information theory-based analysis about a pertinent attack strategy built with a reasonable framework exploiting it has never been clarified. This paper proposes a new type of trojan horse attack called hidden pulse attack that can be applied in a plug-and-play QKD system, using general and optimal attack strategies that can extract quantum information from phase-disturbed quantum states of eavesdropper's hidden pulses. It exploits spectral characteristics of a photodiode used in a plug-and-play QKD system in order to probe modulation states of photon qubits. We analyze the security performance of the decoy-state BB84 QKD system under the optimal hidden pulse attack model that shows enormous performance degradation in terms of both secret key rate and transmission distance.

  8. Technology evaluation: VEGF Trap (cancer), Regeneron/sanofi-aventis.

    PubMed

    Lau, Sin C; Rosa, Daniela D; Jayson, Gordon

    2005-10-01

    sanofi-aventis (formerly Aventis) and Regeneron are developing systemic VEGF Trap, a soluble decoy receptor comprising portions of VEGF receptors 1 and 2, for the potential intravenous/subcutaneous treatment of cancer.

  9. 4D Flexible Atom-Pairs: An efficient probabilistic conformational space comparison for ligand-based virtual screening

    PubMed Central

    2011-01-01

    Background The performance of 3D-based virtual screening similarity functions is affected by the applied conformations of compounds. Therefore, the results of 3D approaches are often less robust than 2D approaches. The application of 3D methods on multiple conformer data sets normally reduces this weakness, but entails a significant computational overhead. Therefore, we developed a special conformational space encoding by means of Gaussian mixture models and a similarity function that operates on these models. The application of a model-based encoding allows an efficient comparison of the conformational space of compounds. Results Comparisons of our 4D flexible atom-pair approach with over 15 state-of-the-art 2D- and 3D-based virtual screening similarity functions on the 40 data sets of the Directory of Useful Decoys show a robust performance of our approach. Even 3D-based approaches that operate on multiple conformers yield inferior results. The 4D flexible atom-pair method achieves an averaged AUC value of 0.78 on the filtered Directory of Useful Decoys data sets. The best 2D- and 3D-based approaches of this study yield an AUC value of 0.74 and 0.72, respectively. As a result, the 4D flexible atom-pair approach achieves an average rank of 1.25 with respect to 15 other state-of-the-art similarity functions and four different evaluation metrics. Conclusions Our 4D method yields a robust performance on 40 pharmaceutically relevant targets. The conformational space encoding enables an efficient comparison of the conformational space. Therefore, the weakness of the 3D-based approaches on single conformations is circumvented. With over 100,000 similarity calculations on a single desktop CPU, the utilization of the 4D flexible atom-pair in real-world applications is feasible. PMID:21733172

  10. Female ornamentation and territorial conflicts in collared flycatchers ( Ficedula albicollis)

    NASA Astrophysics Data System (ADS)

    Hegyi, Gergely; Garamszegi, László Zsolt; Eens, Marcel; Török, János

    2008-10-01

    Female ornaments in species with conventional sex roles often indicate individual quality, but the evolutionary forces maintaining them are less clear. Sexual competition for breeding opportunities may represent an important role for female signals, especially in polygynous species, but there is little experimental evidence for this. The wing patch size (WPS) of female collared flycatchers indicates age and body condition and predicts social mating patterns. We challenged nest-building females with decoy females of varying WPS and found that the aggressive response of residents increased with decoy WPS, suggesting a role for this female ornament in territorial competition. Our results explain why female WPS predicts territorial distances when mated to a polygynous male and indicate that the role of WPS in female competitive interactions is similar to that in males of the same population.

  11. Subversion of cytokine networks by virally encoded decoy receptors

    PubMed Central

    Epperson, Megan L.; Lee, Chung A.; Fremont, Daved H.

    2012-01-01

    Summary During the course of evolution, viruses have captured or created a diverse array of open reading frames that encode for proteins that serve to evade and sabotage the host innate and adaptive immune responses, which would otherwise lead to their elimination. These viral genomes are some of the best textbooks of immunology ever written. The established arsenal of immunomodulatory proteins encoded by viruses is large and growing and includes specificities for virtually all known inflammatory pathways and targets. The focus of this review is on herpes and poxvirus-encoded cytokine and chemokine binding proteins that serve to undermine the coordination of host immune surveillance. Structural and mechanistic studies of these decoy receptors have provided a wealth of information, not only about viral pathogenesis but also about the inner workings of cytokine signaling networks. PMID:23046131

  12. A novel nonsteroidal antifibrotic oligo decoy containing the TGF-beta element found in the COL1A1 gene which regulates murine schistosomiasis liver fibrosis.

    PubMed

    Boros, D L; Singh, K P; Gerard, H C; Hudson, A P; White, S L; Cutroneo, K R

    2005-08-01

    Schistosomiasis mansoni disseminated worm eggs in mice and humans induce granulomatous inflammations and cumulative fibrosis causing morbidity and possibly mortality. In this study, intrahepatic and I.V. injections of a double-stranded oligodeoxynucleotide decoy containing the TGF-beta regulatory element found in the distal promoter of the COL1A1 gene into worm-infected mice suppressed TGF-beta1, COL1A1, tissue inhibitor of metalloproteinase-1, and decreased COL3A1 mRNAs to a lesser extent. Sequence comparisons within the mouse genome found homologous sequences within the COL3A1, TGF-beta1, and TIMP-1 5' flanking regions. Cold competition gel mobility shift assays using these homologous sequences with 5' and 3' flanking regions found in the natural COL1A1 gene showed competition. Competitive gel mobility assays in a separate experiment showed no competition using a 5-base mutated or scrambled sequence. Explanted liver granulomas from saline-injected mice incorporated 10.45 +/- 1.7% (3)H-proline into newly synthesized collagen, whereas decoy-treated mice showed no collagen synthesis. Compared with the saline control schistosomiasis mice phosphorothioate double-stranded oligodeoxynucleotide treatment decreased total liver collagen content (i.e. hydroxy-4-proline) by 34%. This novel molecular approach has the potential to be employed as a novel antifibrotic treatment modality. (c) 2005 Wiley-Liss, Inc.

  13. A discriminatory function for prediction of protein-DNA interactions based on alpha shape modeling.

    PubMed

    Zhou, Weiqiang; Yan, Hong

    2010-10-15

    Protein-DNA interaction has significant importance in many biological processes. However, the underlying principle of the molecular recognition process is still largely unknown. As more high-resolution 3D structures of protein-DNA complex are becoming available, the surface characteristics of the complex become an important research topic. In our work, we apply an alpha shape model to represent the surface structure of the protein-DNA complex and developed an interface-atom curvature-dependent conditional probability discriminatory function for the prediction of protein-DNA interaction. The interface-atom curvature-dependent formalism captures atomic interaction details better than the atomic distance-based method. The proposed method provides good performance in discriminating the native structures from the docking decoy sets, and outperforms the distance-dependent formalism in terms of the z-score. Computer experiment results show that the curvature-dependent formalism with the optimal parameters can achieve a native z-score of -8.17 in discriminating the native structure from the highest surface-complementarity scored decoy set and a native z-score of -7.38 in discriminating the native structure from the lowest RMSD decoy set. The interface-atom curvature-dependent formalism can also be used to predict apo version of DNA-binding proteins. These results suggest that the interface-atom curvature-dependent formalism has a good prediction capability for protein-DNA interactions. The code and data sets are available for download on http://www.hy8.com/bioinformatics.htm kenandzhou@hotmail.com.

  14. Simultaneous immunostaining with anti-S100P and anti-SV40 antibodies revealed the origin of BK virus-infected decoy cells in voided urine samples.

    PubMed

    Ariyasu, S; Yanai, H; Sato, M; Shinno, Y; Taniguchi, K; Yamadori, I; Miki, Y; Sato, Y; Yoshino, T; Takahashi, K

    2015-08-01

    Methods for determining the origin of BK virus (BKV)-infected cells (decoy cells) in clinical urine samples have not been established although they could enhance the diagnosis of BKV infection in immunocompromised patients. We performed simultaneous immunostaining with anti-S100P (a urothelial marker) and anti-SV40 antibodies in 66 clinical urine samples exhibiting SV40 positivity and a decoy-cell appearance on Papanicolaou staining. The clinical voided urine samples included seven cases of renal transplantation, 47 cases of cancer therapy and 12 cases of non-neoplastic disease. SurePath(™) liquid-based cytology was used for the urine samples. BKV-infected cells were categorized as SV40(+)/S100P(+) and SV40 (+)/S100p(-). SV40(+)/S100P(-) cells were found in 55 cases (83.4%); nine cases (13.6%) carried both SV40(+)/S100P(-) and SV40(+)/S100P(+) cells. The former were identified as BKV infection in renal tubules and the latter in both the renal tubules and urothelial epithelia. The remaining two cases (3.0%) had only SV40(+)/S100P(+) cells of urothelial origin. Simultaneous immunostaining with anti-S100P and anti-SV40 is a useful method for determining the origin of BKV-infected cells in clinical urine samples from immunocompromised patients such as renal transplantation recipients. © 2014 John Wiley & Sons Ltd.

  15. Selecting an optimal number of binding site waters to improve virtual screening enrichments against the adenosine A2A receptor.

    PubMed

    Lenselink, Eelke B; Beuming, Thijs; Sherman, Woody; van Vlijmen, Herman W T; IJzerman, Adriaan P

    2014-06-23

    A major challenge in structure-based virtual screening (VS) involves the treatment of explicit water molecules during docking in order to improve the enrichment of active compounds over decoys. Here we have investigated this in the context of the adenosine A2A receptor, where water molecules have previously been shown to be important for achieving high enrichment rates with docking, and where the positions of some binding site waters are known from a high-resolution crystal structure. The effect of these waters (both their presence and orientations) on VS enrichment was assessed using a carefully curated set of 299 high affinity A2A antagonists and 17,337 decoys. We show that including certain crystal waters greatly improves VS enrichment and that optimization of water hydrogen positions is needed in order to achieve the best results. We also show that waters derived from a molecular dynamics simulation - without any knowledge of crystallographic waters - can improve enrichments to a similar degree as the crystallographic waters, which makes this strategy applicable to structures without experimental knowledge of water positions. Finally, we used decision trees to select an ensemble of structures with different water molecule positions and orientations that outperforms any single structure with water molecules. The approach presented here is validated against independent test sets of A2A receptor antagonists and decoys from the literature. In general, this water optimization strategy could be applied to any target with waters-mediated protein-ligand interactions.

  16. The chemokine decoy receptor D6 prevents excessive inflammation and adverse ventricular remodeling after myocardial infarction.

    PubMed

    Cochain, Clément; Auvynet, Constance; Poupel, Lucie; Vilar, José; Dumeau, Edouard; Richart, Adèle; Récalde, Alice; Zouggari, Yasmine; Yin, Kiave Yune Ho Wang; Bruneval, Patrick; Renault, Gilles; Marchiol, Carmen; Bonnin, Philippe; Lévy, Bernard; Bonecchi, Raffaella; Locati, Massimo; Combadière, Christophe; Silvestre, Jean-Sébastien

    2012-09-01

    Leukocyte infiltration in ischemic areas is a hallmark of myocardial infarction, and overwhelming infiltration of innate immune cells has been shown to promote adverse remodeling and cardiac rupture. Recruitment of inflammatory cells in the ischemic heart depends highly on the family of CC-chemokines and their receptors. Here, we hypothesized that the chemokine decoy receptor D6, which specifically binds and scavenges inflammatory CC-chemokines, might limit inflammation and adverse cardiac remodeling after infarction. D6 was expressed in human and murine infarcted myocardium. In a murine model of myocardial infarction, D6 deficiency led to increased chemokine (C-C motif) ligand 2 and chemokine (C-C motif) ligand 3 levels in the ischemic heart. D6-deficient (D6(-/-)) infarcts displayed increased infiltration of pathogenic neutrophils and Ly6Chi monocytes, associated with strong matrix metalloproteinase-9 and matrix metalloproteinase-2 activities in the ischemic heart. D6(-/-) mice were cardiac rupture prone after myocardial infarction, and functional analysis revealed that D6(-/-) hearts had features of adverse remodeling with left ventricle dilation and reduced ejection fraction. Bone marrow chimera experiments showed that leukocyte-borne D6 had no role in this setting, and that leukocyte-specific chemokine (C-C motif) receptor 2 deficiency rescued the adverse phenotype observed in D6(-/-) mice. We show for the first time that the chemokine decoy receptor D6 limits CC-chemokine-dependent pathogenic inflammation and is required for adequate cardiac remodeling after myocardial infarction.

  17. Lymphotoxin beta receptor (Lt betaR): dual roles in demyelination and remyelination and successful therapeutic intervention using Lt betaR-Ig protein.

    PubMed

    Plant, Sheila R; Iocca, Heather A; Wang, Ying; Thrash, J Cameron; O'Connor, Brian P; Arnett, Heather A; Fu, Yang-Xin; Carson, Monica J; Ting, Jenny P-Y

    2007-07-11

    Inflammation mediated by macrophages is increasingly found to play a central role in diseases and disorders that affect a myriad of organs, prominent among these are diseases of the CNS. The neurotoxicant-induced, cuprizone model of demyelination is ideally suited for the analysis of inflammatory events. Demyelination on exposure to cuprizone is accompanied by predictable microglial activation and astrogliosis, and, after cuprizone withdrawal, this activation reproducibly diminishes during remyelination. This study demonstrates enhanced expression of lymphotoxin beta receptor (Lt betaR) during the demyelination phase of this model, and Lt betaR is found in areas enriched with microglial and astroglial cells. Deletion of the Lt betaR gene (Lt betaR-/-) resulted in a significant delay in demyelination but also a slight delay in remyelination. Inhibition of Lt betaR signaling by an Lt betaR-Ig fusion decoy protein successfully delayed demyelination in wild-type mice. Unexpectedly, this Lt betaR-Ig decoy protein dramatically accelerated the rate of remyelination, even after the maximal pathological disease state had been reached. This strongly indicates the beneficial role of Lt betaR-Ig in the delay of demyelination and the acceleration of remyelination. The discrepancy between remyelination rates in these systems could be attributed to developmental abnormalities in the immune systems of Lt betaR-/- mice. These findings bode well for the use of an inhibitory Lt betaR-Ig as a candidate biological therapy in demyelinating disorders, because it is beneficial during both demyelination and remyelination.

  18. Experimental quantum key distribution with simulated ground-to-satellite photon losses and processing limitations

    NASA Astrophysics Data System (ADS)

    Bourgoin, Jean-Philippe; Gigov, Nikolay; Higgins, Brendon L.; Yan, Zhizhong; Meyer-Scott, Evan; Khandani, Amir K.; Lütkenhaus, Norbert; Jennewein, Thomas

    2015-11-01

    Quantum key distribution (QKD) has the potential to improve communications security by offering cryptographic keys whose security relies on the fundamental properties of quantum physics. The use of a trusted quantum receiver on an orbiting satellite is the most practical near-term solution to the challenge of achieving long-distance (global-scale) QKD, currently limited to a few hundred kilometers on the ground. This scenario presents unique challenges, such as high photon losses and restricted classical data transmission and processing power due to the limitations of a typical satellite platform. Here we demonstrate the feasibility of such a system by implementing a QKD protocol, with optical transmission and full post-processing, in the high-loss regime using minimized computing hardware at the receiver. Employing weak coherent pulses with decoy states, we demonstrate the production of secure key bits at up to 56.5 dB of photon loss. We further illustrate the feasibility of a satellite uplink by generating a secure key while experimentally emulating the varying losses predicted for realistic low-Earth-orbit satellite passes at 600 km altitude. With a 76 MHz source and including finite-size analysis, we extract 3374 bits of a secure key from the best pass. We also illustrate the potential benefit of combining multiple passes together: while one suboptimal "upper-quartile" pass produces no finite-sized key with our source, the combination of three such passes allows us to extract 165 bits of a secure key. Alternatively, we find that by increasing the signal rate to 300 MHz it would be possible to extract 21 570 bits of a secure finite-sized key in just a single upper-quartile pass.

  19. A kind of universal quantum secret sharing protocol

    NASA Astrophysics Data System (ADS)

    Chen, Xiu-Bo; Dou, Zhao; Xu, Gang; He, Xiao-Yu; Yang, Yi-Xian

    2017-01-01

    Universality is an important feature, but less researched in quantum communication protocols. In this paper, a kind of universal quantum secret sharing protocol is investigated. Firstly, we design a quantum secret sharing protocol based on the Borras-Plastino-Batle (BPB) state. Departing from previous research, our protocol has a salient feature in that participants in our protocol only need projective measurement instead of any unitary operations. It makes our protocol more flexible. Secondly, universality of quantum communication protocols is studied for the first time. More specifically, module division of quantum communication protocols and coupling between different modules are discussed. Our aforementioned protocol is analyzed as an example. On one hand, plenty of quantum states (the BPB-class states and the BPB-like-class states, which are proposed in this paper) could be used as carrier to perform our protocol. On the other hand, our protocol also could be regarded as a quantum private comparison protocol with a little revision. These features are rare for quantum communication protocols, and make our protocol more robust. Thirdly, entanglements of the BPB-class states are calculated in the Appendix.

  20. A kind of universal quantum secret sharing protocol.

    PubMed

    Chen, Xiu-Bo; Dou, Zhao; Xu, Gang; He, Xiao-Yu; Yang, Yi-Xian

    2017-01-12

    Universality is an important feature, but less researched in quantum communication protocols. In this paper, a kind of universal quantum secret sharing protocol is investigated. Firstly, we design a quantum secret sharing protocol based on the Borras-Plastino-Batle (BPB) state. Departing from previous research, our protocol has a salient feature in that participants in our protocol only need projective measurement instead of any unitary operations. It makes our protocol more flexible. Secondly, universality of quantum communication protocols is studied for the first time. More specifically, module division of quantum communication protocols and coupling between different modules are discussed. Our aforementioned protocol is analyzed as an example. On one hand, plenty of quantum states (the BPB-class states and the BPB-like-class states, which are proposed in this paper) could be used as carrier to perform our protocol. On the other hand, our protocol also could be regarded as a quantum private comparison protocol with a little revision. These features are rare for quantum communication protocols, and make our protocol more robust. Thirdly, entanglements of the BPB-class states are calculated in the Appendix.

  1. A kind of universal quantum secret sharing protocol

    PubMed Central

    Chen, Xiu-Bo; Dou, Zhao; Xu, Gang; He, Xiao-Yu; Yang, Yi-Xian

    2017-01-01

    Universality is an important feature, but less researched in quantum communication protocols. In this paper, a kind of universal quantum secret sharing protocol is investigated. Firstly, we design a quantum secret sharing protocol based on the Borras-Plastino-Batle (BPB) state. Departing from previous research, our protocol has a salient feature in that participants in our protocol only need projective measurement instead of any unitary operations. It makes our protocol more flexible. Secondly, universality of quantum communication protocols is studied for the first time. More specifically, module division of quantum communication protocols and coupling between different modules are discussed. Our aforementioned protocol is analyzed as an example. On one hand, plenty of quantum states (the BPB-class states and the BPB-like-class states, which are proposed in this paper) could be used as carrier to perform our protocol. On the other hand, our protocol also could be regarded as a quantum private comparison protocol with a little revision. These features are rare for quantum communication protocols, and make our protocol more robust. Thirdly, entanglements of the BPB-class states are calculated in the Appendix. PMID:28079109

  2. Controlled quantum secure direct communication by entanglement distillation or generalized measurement

    NASA Astrophysics Data System (ADS)

    Tan, Xiaoqing; Zhang, Xiaoqian

    2016-05-01

    We propose two controlled quantum secure communication schemes by entanglement distillation or generalized measurement. The sender Alice, the receiver Bob and the controllers David and Cliff take part in the whole schemes. The supervisors David and Cliff can control the information transmitted from Alice to Bob by adjusting the local measurement angles θ _4 and θ _3. Bob can verify his secret information by classical one-way function after communication. The average amount of information is analyzed and compared for these two methods by MATLAB. The generalized measurement is a better scheme. Our schemes are secure against some well-known attacks because classical encryption and decoy states are used to ensure the security of the classical channel and the quantum channel.

  3. A model-guided symbolic execution approach for network protocol implementations and vulnerability detection.

    PubMed

    Wen, Shameng; Meng, Qingkun; Feng, Chao; Tang, Chaojing

    2017-01-01

    Formal techniques have been devoted to analyzing whether network protocol specifications violate security policies; however, these methods cannot detect vulnerabilities in the implementations of the network protocols themselves. Symbolic execution can be used to analyze the paths of the network protocol implementations, but for stateful network protocols, it is difficult to reach the deep states of the protocol. This paper proposes a novel model-guided approach to detect vulnerabilities in network protocol implementations. Our method first abstracts a finite state machine (FSM) model, then utilizes the model to guide the symbolic execution. This approach achieves high coverage of both the code and the protocol states. The proposed method is implemented and applied to test numerous real-world network protocol implementations. The experimental results indicate that the proposed method is more effective than traditional fuzzing methods such as SPIKE at detecting vulnerabilities in the deep states of network protocol implementations.

  4. 76 FR 25299 - Notice of Petitions by Firms for Determination of Eligibility To Apply for Trade Adjustment...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-04

    ... manufactures acoustic Inc. Braintree, MA 02184. countermeasures--electro-acoustic products used to decoy/confuse acoustic homing torpedoes, sonar transducers. Any party having a substantial interest in these...

  5. Sharks shape the geometry of a selfish seal herd: experimental evidence from seal decoys.

    PubMed

    De Vos, Alta; O'Riain, M Justin

    2010-02-23

    Many animals respond to predation risk by forming groups. Evolutionary explanations for group formation in previously ungrouped, but loosely associated prey have typically evoked the selfish herd hypothesis. However, despite over 600 studies across a diverse array of taxa, the critical assumptions of this hypothesis have remained collectively untested, owing to several confounding problems in real predator-prey systems. To solve this, we manipulated the domains of danger of Cape fur seal (Arctocephalus pusillus pusillus) decoys to provide evidence that a selfish reduction in a seals' domain of danger results in a proportional reduction in its predation risk from ambush shark attacks. This behaviour confers a survival advantage to individual seals within a group and explains the evolution of selfish herds in a prey species. These findings empirically elevate Hamilton's selfish herd hypothesis to more than a 'theoretical curiosity'.

  6. Sharks shape the geometry of a selfish seal herd: experimental evidence from seal decoys

    PubMed Central

    De Vos, Alta; O'Riain, M. Justin

    2010-01-01

    Many animals respond to predation risk by forming groups. Evolutionary explanations for group formation in previously ungrouped, but loosely associated prey have typically evoked the selfish herd hypothesis. However, despite over 600 studies across a diverse array of taxa, the critical assumptions of this hypothesis have remained collectively untested, owing to several confounding problems in real predator–prey systems. To solve this, we manipulated the domains of danger of Cape fur seal (Arctocephalus pusillus pusillus) decoys to provide evidence that a selfish reduction in a seals' domain of danger results in a proportional reduction in its predation risk from ambush shark attacks. This behaviour confers a survival advantage to individual seals within a group and explains the evolution of selfish herds in a prey species. These findings empirically elevate Hamilton's selfish herd hypothesis to more than a ‘theoretical curiosity’. PMID:19793737

  7. Poxvirus-encoded TNF decoy receptors inhibit the biological activity of transmembrane TNF.

    PubMed

    Pontejo, Sergio M; Alejo, Ali; Alcami, Antonio

    2015-10-01

    Poxviruses encode up to four different soluble TNF receptors, named cytokine response modifier B (CrmB), CrmC, CrmD and CrmE. These proteins mimic the extracellular domain of the cellular TNF receptors to bind and inhibit the activity of TNF and, in some cases, other TNF superfamily ligands. Most of these ligands are released after the enzymic cleavage of a membrane precursor. However, transmembrane TNF (tmTNF) is not only a precursor of soluble TNF but also exerts specific pro-inflammatory and immunological activities. Here, we report that viral TNF receptors bound and inhibited tmTNF and describe some interesting differences in their activity against the soluble cytokine. Thus, CrmE, which does not inhibit mouse soluble TNF, could block murine tmTNF-induced cytotoxicity. We propose that this anti-tmTNF effect should be taken into consideration when assessing the role of viral TNF decoy receptors in the pathogenesis of poxvirus.

  8. Denosumab mimics the natural decoy receptor osteoprotegerin by interacting with its major binding site on RANKL.

    PubMed

    Schieferdecker, Aneta; Voigt, Mareike; Riecken, Kristoffer; Braig, Friederike; Schinke, Thorsten; Loges, Sonja; Bokemeyer, Carsten; Fehse, Boris; Binder, Mascha

    2014-08-30

    Bone homeostasis critically relies on the RANKL-RANK-OPG axis which can be targeted by the fully human monoclonal antibody denosumab in conditions with increased bone resporption such as bone metastases. The binding site and therefore the molecular mechanism by which this antibody inhibits RANKL has not been characterized so far. Here, we used random peptide phage display library screenings to identify the denosumab epitope on RANKL. Alignments of phage derived peptide sequences with RANKL suggested that this antibody recognized a linear epitope between position T233 and Y241. Mutational analysis confirmed the core residues as critical for this interaction. The spatial localization of this epitope on a 3-dimensional model of RANKL showed that it overlapped with the major binding sites of OPG and RANK on RANKL. We conclude that denosumab inhibits RANKL by both functional and molecular mimicry of the natural decoy receptor OPG.

  9. Multi-Hop Teleportation of an Unknown Qubit State Based on W States

    NASA Astrophysics Data System (ADS)

    Zhou, Xiang-Zhen; Yu, Xu-Tao; Zhang, Zai-Chen

    2018-04-01

    Quantum teleportation is important in quantum communication networks. Considering that quantum state information is also transmitted between two distant nodes, intermediated nodes are employed and two multi-hop teleportation protocols based on W state are proposed. One is hop-by-hop teleportation protocol and the other is the improved multi-hop teleportation protocol with centralized unitary transformation. In hop-by-hop protocol, the transmitted quantum state needs to be recovered at every node on the route. In improved multi-hop teleportation protocol with centralized unitary transformation, intermediate nodes need not to recover the transmitted quantum state. Compared to the hop-by-hop protocol, the improved protocol can reduce the transmission delay and improve the transmission efficiency.

  10. Surflex-Dock: Docking benchmarks and real-world application

    NASA Astrophysics Data System (ADS)

    Spitzer, Russell; Jain, Ajay N.

    2012-06-01

    Benchmarks for molecular docking have historically focused on re-docking the cognate ligand of a well-determined protein-ligand complex to measure geometric pose prediction accuracy, and measurement of virtual screening performance has been focused on increasingly large and diverse sets of target protein structures, cognate ligands, and various types of decoy sets. Here, pose prediction is reported on the Astex Diverse set of 85 protein ligand complexes, and virtual screening performance is reported on the DUD set of 40 protein targets. In both cases, prepared structures of targets and ligands were provided by symposium organizers. The re-prepared data sets yielded results not significantly different than previous reports of Surflex-Dock on the two benchmarks. Minor changes to protein coordinates resulting from complex pre-optimization had large effects on observed performance, highlighting the limitations of cognate ligand re-docking for pose prediction assessment. Docking protocols developed for cross-docking, which address protein flexibility and produce discrete families of predicted poses, produced substantially better performance for pose prediction. Performance on virtual screening performance was shown to benefit by employing and combining multiple screening methods: docking, 2D molecular similarity, and 3D molecular similarity. In addition, use of multiple protein conformations significantly improved screening enrichment.

  11. Comparative Biochemical and Functional Analysis of Viral and Human Secreted Tumor Necrosis Factor (TNF) Decoy Receptors*

    PubMed Central

    Pontejo, Sergio M.; Alejo, Ali; Alcami, Antonio

    2015-01-01

    The blockade of tumor necrosis factor (TNF) by etanercept, a soluble version of the human TNF receptor 2 (hTNFR2), is a well established strategy to inhibit adverse TNF-mediated inflammatory responses in the clinic. A similar strategy is employed by poxviruses, encoding four viral TNF decoy receptor homologues (vTNFRs) named cytokine response modifier B (CrmB), CrmC, CrmD, and CrmE. These vTNFRs are differentially expressed by poxviral species, suggesting distinct immunomodulatory properties. Whereas the human variola virus and mouse ectromelia virus encode one vTNFR, the broad host range cowpox virus encodes all vTNFRs. We report the first comprehensive study of the functional and binding properties of these four vTNFRs, providing an explanation for their expression profile among different poxviruses. In addition, the vTNFRs activities were compared with the hTNFR2 used in the clinic. Interestingly, CrmB from variola virus, the causative agent of smallpox, is the most potent TNFR of those tested here including hTNFR2. Furthermore, we demonstrate a new immunomodulatory activity of vTNFRs, showing that CrmB and CrmD also inhibit the activity of lymphotoxin β. Similarly, we report for the first time that the hTNFR2 blocks the biological activity of lymphotoxin β. The characterization of vTNFRs optimized during virus-host evolution to modulate the host immune response provides relevant information about their potential role in pathogenesis and may be used to improve anti-inflammatory therapies based on soluble decoy TNFRs. PMID:25940088

  12. Maximal Unbiased Benchmarking Data Sets for Human Chemokine Receptors and Comparative Analysis.

    PubMed

    Xia, Jie; Reid, Terry-Elinor; Wu, Song; Zhang, Liangren; Wang, Xiang Simon

    2018-05-29

    Chemokine receptors (CRs) have long been druggable targets for the treatment of inflammatory diseases and HIV-1 infection. As a powerful technique, virtual screening (VS) has been widely applied to identifying small molecule leads for modern drug targets including CRs. For rational selection of a wide variety of VS approaches, ligand enrichment assessment based on a benchmarking data set has become an indispensable practice. However, the lack of versatile benchmarking sets for the whole CRs family that are able to unbiasedly evaluate every single approach including both structure- and ligand-based VS somewhat hinders modern drug discovery efforts. To address this issue, we constructed Maximal Unbiased Benchmarking Data sets for human Chemokine Receptors (MUBD-hCRs) using our recently developed tools of MUBD-DecoyMaker. The MUBD-hCRs encompasses 13 subtypes out of 20 chemokine receptors, composed of 404 ligands and 15756 decoys so far and is readily expandable in the future. It had been thoroughly validated that MUBD-hCRs ligands are chemically diverse while its decoys are maximal unbiased in terms of "artificial enrichment", "analogue bias". In addition, we studied the performance of MUBD-hCRs, in particular CXCR4 and CCR5 data sets, in ligand enrichment assessments of both structure- and ligand-based VS approaches in comparison with other benchmarking data sets available in the public domain and demonstrated that MUBD-hCRs is very capable of designating the optimal VS approach. MUBD-hCRs is a unique and maximal unbiased benchmarking set that covers major CRs subtypes so far.

  13. Aberrant expression of decoy receptor 3 in human breast cancer: relevance to lymphangiogenesis.

    PubMed

    Wu, Qiuwan; Zheng, Yahong; Chen, Donghan; Li, Xiaohong; Lu, Chuanhui; Zhang, Zhiming

    2014-05-15

    Decoy receptor 3 (DcR3), a decoy receptor against Fas ligand belonging to the tumor necrosis factor receptor superfamily, is overexpressed in some forms of cancer. It was recently reported that DcR3 could protect endothelial cells from apoptosis, implying a potential role in the development of vessels, whereas its role in the lymphangiogenesis remains unclear. In the present study, we studied the DcR3 expression and its relationship with the lymphatic microvessel density (LMVD) to investigate if it played a role in the lymph metastasis of human breast cancer. Real-time polymerase chain reaction and immunohistochemistry were performed to measure the messenger RNA and protein expression of DcR3 in the breast cancer tissues, noncancerous counterparts, and axillary lymph node from 63 patients. LMVD in these specimens was assessed by counting the D2-40 labeled-microvessels. Furthermore, the correlations between DcR3 expression and LMVD and other clinicopathologic parameters were analyzed. DcR3 was overexpressed in the breast cancer tissue of 58 patients (92.1%) and was also expressed in vascular endothelial cells and tumor cells in the lymph nodes. LMVD in cancer tissue and lymph nodes were both positively correlated to the aberrant expression of DcR3. The relevance between DcR3 overexpression and LMVD revealed the existence of possible links between DcR3 and lymphangiogenesis. Based on these findings, it is important to further explore the regulation of lymphangiogenesis operated by the reverse tumor necrosis factor signaling of DcR3. Copyright © 2014 The Authors. Published by Elsevier Inc. All rights reserved.

  14. Security of six-state quantum key distribution protocol with threshold detectors

    PubMed Central

    Kato, Go; Tamaki, Kiyoshi

    2016-01-01

    The security of quantum key distribution (QKD) is established by a security proof, and the security proof puts some assumptions on the devices consisting of a QKD system. Among such assumptions, security proofs of the six-state protocol assume the use of photon number resolving (PNR) detector, and as a result the bit error rate threshold for secure key generation for the six-state protocol is higher than that for the BB84 protocol. Unfortunately, however, this type of detector is demanding in terms of technological level compared to the standard threshold detector, and removing the necessity of such a detector enhances the feasibility of the implementation of the six-state protocol. Here, we develop the security proof for the six-state protocol and show that we can use the threshold detector for the six-state protocol. Importantly, the bit error rate threshold for the key generation for the six-state protocol (12.611%) remains almost the same as the one (12.619%) that is derived from the existing security proofs assuming the use of PNR detectors. This clearly demonstrates feasibility of the six-state protocol with practical devices. PMID:27443610

  15. A Novel Approach for Efficient Pharmacophore-based Virtual Screening: Method and Applications

    PubMed Central

    Dror, Oranit; Schneidman-Duhovny, Dina; Inbar, Yuval; Nussinov, Ruth; Wolfson, Haim J.

    2009-01-01

    Virtual screening is emerging as a productive and cost-effective technology in rational drug design for the identification of novel lead compounds. An important model for virtual screening is the pharmacophore. Pharmacophore is the spatial configuration of essential features that enable a ligand molecule to interact with a specific target receptor. In the absence of a known receptor structure, a pharmacophore can be identified from a set of ligands that have been observed to interact with the target receptor. Here, we present a novel computational method for pharmacophore detection and virtual screening. The pharmacophore detection module is able to: (i) align multiple flexible ligands in a deterministic manner without exhaustive enumeration of the conformational space, (ii) detect subsets of input ligands that may bind to different binding sites or have different binding modes, (iii) address cases where the input ligands have different affinities by defining weighted pharmacophores based on the number of ligands that share them, and (iv) automatically select the most appropriate pharmacophore candidates for virtual screening. The algorithm is highly efficient, allowing a fast exploration of the chemical space by virtual screening of huge compound databases. The performance of PharmaGist was successfully evaluated on a commonly used dataset of G-Protein Coupled Receptor alpha1A. Additionally, a large-scale evaluation using the DUD (directory of useful decoys) dataset was performed. DUD contains 2950 active ligands for 40 different receptors, with 36 decoy compounds for each active ligand. PharmaGist enrichment rates are comparable with other state-of-the-art tools for virtual screening. Availability The software is available for download. A user-friendly web interface for pharmacophore detection is available at http://bioinfo3d.cs.tau.ac.il/PharmaGist. PMID:19803502

  16. On Docking, Scoring and Assessing Protein-DNA Complexes in a Rigid-Body Framework

    PubMed Central

    Parisien, Marc; Freed, Karl F.; Sosnick, Tobin R.

    2012-01-01

    We consider the identification of interacting protein-nucleic acid partners using the rigid body docking method FTdock, which is systematic and exhaustive in the exploration of docking conformations. The accuracy of rigid body docking methods is tested using known protein-DNA complexes for which the docked and undocked structures are both available. Additional tests with large decoy sets probe the efficacy of two published statistically derived scoring functions that contain a huge number of parameters. In contrast, we demonstrate that state-of-the-art machine learning techniques can enormously reduce the number of parameters required, thereby identifying the relevant docking features using a miniscule fraction of the number of parameters in the prior works. The present machine learning study considers a 300 dimensional vector (dependent on only 15 parameters), termed the Chemical Context Profile (CCP), where each dimension reflects a specific type of protein amino acid-nucleic acid base interaction. The CCP is designed to capture the chemical complementarities of the interface and is well suited for machine learning techniques. Our objective function is the Chemical Context Discrepancy (CCD), which is defined as the angle between the native system's CCP vector and the decoy's vector and which serves as a substitute for the more commonly used root mean squared deviation (RMSD). We demonstrate that the CCP provides a useful scoring function when certain dimensions are properly weighted. Finally, we explore how the amino acids on a protein's surface can help guide DNA binding, first through long-range interactions, followed by direct contacts, according to specific preferences for either the major or minor grooves of the DNA. PMID:22393431

  17. Satellite-to-ground quantum key distribution.

    PubMed

    Liao, Sheng-Kai; Cai, Wen-Qi; Liu, Wei-Yue; Zhang, Liang; Li, Yang; Ren, Ji-Gang; Yin, Juan; Shen, Qi; Cao, Yuan; Li, Zheng-Ping; Li, Feng-Zhi; Chen, Xia-Wei; Sun, Li-Hua; Jia, Jian-Jun; Wu, Jin-Cai; Jiang, Xiao-Jun; Wang, Jian-Feng; Huang, Yong-Mei; Wang, Qiang; Zhou, Yi-Lin; Deng, Lei; Xi, Tao; Ma, Lu; Hu, Tai; Zhang, Qiang; Chen, Yu-Ao; Liu, Nai-Le; Wang, Xiang-Bin; Zhu, Zhen-Cai; Lu, Chao-Yang; Shu, Rong; Peng, Cheng-Zhi; Wang, Jian-Yu; Pan, Jian-Wei

    2017-09-07

    Quantum key distribution (QKD) uses individual light quanta in quantum superposition states to guarantee unconditional communication security between distant parties. However, the distance over which QKD is achievable has been limited to a few hundred kilometres, owing to the channel loss that occurs when using optical fibres or terrestrial free space that exponentially reduces the photon transmission rate. Satellite-based QKD has the potential to help to establish a global-scale quantum network, owing to the negligible photon loss and decoherence experienced in empty space. Here we report the development and launch of a low-Earth-orbit satellite for implementing decoy-state QKD-a form of QKD that uses weak coherent pulses at high channel loss and is secure because photon-number-splitting eavesdropping can be detected. We achieve a kilohertz key rate from the satellite to the ground over a distance of up to 1,200 kilometres. This key rate is around 20 orders of magnitudes greater than that expected using an optical fibre of the same length. The establishment of a reliable and efficient space-to-ground link for quantum-state transmission paves the way to global-scale quantum networks.

  18. Ship Arrangements and Combat System Performance

    DTIC Science & Technology

    1980-01-01

    British Navy a3 well as for export. The Seafan System uses a 15-barrelled rocket launchei:. The launcher launches the Honeydew infrared decoy or the...Department Chairmat, Code 61 Department of Physics and Chemistry Naval Postgraduate School Monterey, C&, 939406 • 62

  19. Threshold quantum secret sharing based on single qubit

    NASA Astrophysics Data System (ADS)

    Lu, Changbin; Miao, Fuyou; Meng, Keju; Yu, Yue

    2018-03-01

    Based on unitary phase shift operation on single qubit in association with Shamir's ( t, n) secret sharing, a ( t, n) threshold quantum secret sharing scheme (or ( t, n)-QSS) is proposed to share both classical information and quantum states. The scheme uses decoy photons to prevent eavesdropping and employs the secret in Shamir's scheme as the private value to guarantee the correctness of secret reconstruction. Analyses show it is resistant to typical intercept-and-resend attack, entangle-and-measure attack and participant attacks such as entanglement swapping attack. Moreover, it is easier to realize in physic and more practical in applications when compared with related ones. By the method in our scheme, new ( t, n)-QSS schemes can be easily constructed using other classical ( t, n) secret sharing.

  20. Generalized Teleportation and Entanglement Recycling

    NASA Astrophysics Data System (ADS)

    Strelchuk, Sergii; Horodecki, Michał; Oppenheim, Jonathan

    2013-01-01

    We introduce new teleportation protocols which are generalizations of the original teleportation protocols that use the Pauli group and the port-based teleportation protocols, introduced by Hiroshima and Ishizaka, that use the symmetric permutation group. We derive sufficient conditions for a set of operations, which in general need not form a group, to give rise to a teleportation protocol and provide examples of such schemes. This generalization leads to protocols with novel properties and is needed to push forward new schemes of computation based on them. Port-based teleportation protocols and our generalizations use a large resource state consisting of N singlets to teleport only a single qubit state reliably. We provide two distinct protocols which recycle the resource state to teleport multiple states with error linearly increasing with their number. The first protocol consists of sequentially teleporting qubit states, and the second teleports them in a bulk.

  1. Generalized teleportation and entanglement recycling.

    PubMed

    Strelchuk, Sergii; Horodecki, Michał; Oppenheim, Jonathan

    2013-01-04

    We introduce new teleportation protocols which are generalizations of the original teleportation protocols that use the Pauli group and the port-based teleportation protocols, introduced by Hiroshima and Ishizaka, that use the symmetric permutation group. We derive sufficient conditions for a set of operations, which in general need not form a group, to give rise to a teleportation protocol and provide examples of such schemes. This generalization leads to protocols with novel properties and is needed to push forward new schemes of computation based on them. Port-based teleportation protocols and our generalizations use a large resource state consisting of N singlets to teleport only a single qubit state reliably. We provide two distinct protocols which recycle the resource state to teleport multiple states with error linearly increasing with their number. The first protocol consists of sequentially teleporting qubit states, and the second teleports them in a bulk.

  2. Dynamic undocking and the quasi-bound state as tools for drug discovery

    NASA Astrophysics Data System (ADS)

    Ruiz-Carmona, Sergio; Schmidtke, Peter; Luque, F. Javier; Baker, Lisa; Matassova, Natalia; Davis, Ben; Roughley, Stephen; Murray, James; Hubbard, Rod; Barril, Xavier

    2017-03-01

    There is a pressing need for new technologies that improve the efficacy and efficiency of drug discovery. Structure-based methods have contributed towards this goal but they focus on predicting the binding affinity of protein-ligand complexes, which is notoriously difficult. We adopt an alternative approach that evaluates structural, rather than thermodynamic, stability. As bioactive molecules present a static binding mode, we devised dynamic undocking (DUck), a fast computational method to calculate the work necessary to reach a quasi-bound state at which the ligand has just broken the most important native contact with the receptor. This non-equilibrium property is surprisingly effective in virtual screening because true ligands form more-resilient interactions than decoys. Notably, DUck is orthogonal to docking and other 'thermodynamic' methods. We demonstrate the potential of the docking-undocking combination in a fragment screening against the molecular chaperone and oncology target Hsp90, for which we obtain novel chemotypes and a hit rate that approaches 40%.

  3. Quantum key distribution over 120 km using ultrahigh purity single-photon source and superconducting single-photon detectors.

    PubMed

    Takemoto, Kazuya; Nambu, Yoshihiro; Miyazawa, Toshiyuki; Sakuma, Yoshiki; Yamamoto, Tsuyoshi; Yorozu, Shinichi; Arakawa, Yasuhiko

    2015-09-25

    Advances in single-photon sources (SPSs) and single-photon detectors (SPDs) promise unique applications in the field of quantum information technology. In this paper, we report long-distance quantum key distribution (QKD) by using state-of-the-art devices: a quantum-dot SPS (QD SPS) emitting a photon in the telecom band of 1.5 μm and a superconducting nanowire SPD (SNSPD). At the distance of 100 km, we obtained the maximal secure key rate of 27.6 bps without using decoy states, which is at least threefold larger than the rate obtained in the previously reported 50-km-long QKD experiment. We also succeeded in transmitting secure keys at the rate of 0.307 bps over 120 km. This is the longest QKD distance yet reported by using known true SPSs. The ultralow multiphoton emissions of our SPS and ultralow dark count of the SNSPD contributed to this result. The experimental results demonstrate the potential applicability of QD SPSs to practical telecom QKD networks.

  4. Generation of concatenated Greenberger-Horne-Zeilinger-type entangled coherent state based on linear optics

    NASA Astrophysics Data System (ADS)

    Guo, Rui; Zhou, Lan; Gu, Shi-Pu; Wang, Xing-Fu; Sheng, Yu-Bo

    2017-03-01

    The concatenated Greenberger-Horne-Zeilinger (C-GHZ) state is a new type of multipartite entangled state, which has potential application in future quantum information. In this paper, we propose a protocol of constructing arbitrary C-GHZ entangled state approximatively. Different from previous protocols, each logic qubit is encoded in the coherent state. This protocol is based on the linear optics, which is feasible in experimental technology. This protocol may be useful in quantum information based on the C-GHZ state.

  5. Requirement of the cyclic adenosine monophosphate response element-binding protein for hepatitis B virus replication.

    PubMed

    Kim, Bo Kyung; Lim, Seoung Ok; Park, Yun Gyu

    2008-08-01

    The cyclic adenosine monophosphate-response element (CRE)-transcription factor complex participates in the regulation of viral gene expression and pathologic processes caused by various viruses. The hepatitis B virus (HBV) enhancer I directs liver-specific transcription of viral genes and contains a CRE sequence (HBV-CRE); however, whether the HBV-CRE and CRE-binding protein (CREB) are required for the HBV life cycle remains to be determined. This study was designed to investigate the role of CREB in HBV replication and gene expression. Sequence-comparison analysis of 984 HBVs reported worldwide showed that the HBV-CRE sequence is highly conserved, indicating the possibility that it plays an important role in the HBV life cycle. The binding of CREB to the HBV-CRE site was markedly inhibited by oligonucleotides containing HBV-CRE and consensus CRE sequences in vitro and in vivo. The HBV promoter activity was demonstrated to be dependent upon the transactivation activity of CREB. Treatment with CRE decoy oligonucleotides reduced HBV promoter activity, and this was reversed by CREB overexpression. The levels of viral transcripts, DNA, and antigens were remarkably decreased in response to the overexpression of CREB mutants or treatment with the CRE decoy oligonucleotides, whereas enhancing CREB activity increased the levels of viral transcripts. In addition, introduction of a three-base mutation into the HBV-CRE led to a marked reduction in HBV messenger RNA synthesis. Taken together, our results demonstrate that both replication and gene expression of HBV require a functional CREB and HBV-CRE. We have also demonstrated that CRE decoy oligonucleotides and the overexpression of CREB mutants can effectively block the HBV life cycle, suggesting that interventions against CREB activity could provide a new avenue to treat HBV infection.

  6. A mouse model study of toxicity and biodistribution of a replication defective adenovirus serotype 5 virus with its genome engineered to contain a decoy hyper binding site to sequester and suppress oncogenic HMGA1 as a new cancer treatment therapy.

    PubMed

    Hassan, Faizule; Lossie, Sarah L; Kasik, Ellen P; Channon, Audrey M; Ni, Shuisong; Kennedy, Michael A

    2018-01-01

    The HGMA1 architectural transcription factor is highly overexpressed in many human cancers. Because HMGA1 is a hub for regulation of many oncogenes, its overexpression in cancer plays a central role in cancer progression and therefore HMGA1 is gaining increasing attention as a target for development of therapeutic approaches to suppress either its expression or action in cancer cells. We have developed the strategy of introducing decoy hyper binding sites for HMGA1 into the nucleus of cancer cells with the goal of competetively sequestering overexpressed HMGA1 and thus suppressing its oncogenic action. Towards achieving this goal, we have introduced an HMGA1 decoy hyper binding site composed of six copies of a high affinity HMGA1 binding site into the genome of the replication defective adenovirus serotype 5 genome and shown that the engineered virus effectively reduces the viability of human pancreatic and cancer cells. Here we report the first pre-clinical measures of toxicity and biodistribution of the engineered virus in C57BL/6J Black 6 mice. The immune response to exposure of the engineered virus was determined by assaying the serum levels of key cytokines, IL-6 and TNF-α. Toxicity due to exposure to the virus was determined by measuring the serum levels of the liver enzymes aspartate aminotransferase and alanine aminotransferase. Biodistribution was measured following direct injection into the pancreas or liver by quantifying viral loads in the pancreas, liver, spleen and brain.

  7. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Park, Serk In, E-mail: serkin@korea.edu; The BK21 Plus Program for Biomedical Sciences, Korea University College of Medicine, Seoul; Department of Medicine and Center for Bone Biology, Vanderbilt University School of Medicine, Nashville, TN

    The radiation stress induces cytotoxic responses of cell death as well as cytoprotective responses of cell survival. Understanding exact cellular mechanism and signal transduction pathways is important in improving cancer radiotherapy. Increasing evidence suggests that cyclic AMP response element binding protein (CREB)/activating transcription factor (ATF) family proteins act as a survival factor and a signaling molecule in response to stress. We postulated that CREB inhibition via CRE decoy oligonucleotide increases tumor cell sensitization to γ-irradiation-induced cytotoxic stress. In the present study, we demonstrate that CREB phosphorylation and CREB DNA-protein complex formation increased in time- and radiation dose-dependent manners, while theremore » was no significant change in total protein level of CREB. In addition, CREB was phosphorylated in response to γ-irradiation through p38 MAPK pathway. Further investigation revealed that CREB blockade by decoy oligonucleotides functionally inhibited transactivation of CREB, and significantly increased radiosensitivity of multiple human cancer cell lines including TP53- and/or RB-mutated cells with minimal effects on normal cells. We also demonstrate that tumor cells ectopically expressing dominant negative mutant CREB (KCREB) and the cells treated with p38 MAPK inhibitors were more sensitive to γ-irradiation than wild type parental cells or control-treated cells. Taken together, we conclude that CREB protects tumor cells from γ-irradiation, and combination of CREB inhibition plus ionizing radiation will be a promising radiotherapeutic approach. - Highlights: • γ-Irradiation induced CREB phosphorylation and CRE-directed transcription in tumor. • γ-Irradiation-induced transcriptional activation of CREB was via p38 MAPK pathway. • CRE blockade increased radiosensitivity of tumor cells but not of normal cells. • CRE decoy oligonucleotides or p38 MAPK inhibitors can be used as radiosensitizers.« less

  8. Comparative Biochemical and Functional Analysis of Viral and Human Secreted Tumor Necrosis Factor (TNF) Decoy Receptors.

    PubMed

    Pontejo, Sergio M; Alejo, Ali; Alcami, Antonio

    2015-06-26

    The blockade of tumor necrosis factor (TNF) by etanercept, a soluble version of the human TNF receptor 2 (hTNFR2), is a well established strategy to inhibit adverse TNF-mediated inflammatory responses in the clinic. A similar strategy is employed by poxviruses, encoding four viral TNF decoy receptor homologues (vTNFRs) named cytokine response modifier B (CrmB), CrmC, CrmD, and CrmE. These vTNFRs are differentially expressed by poxviral species, suggesting distinct immunomodulatory properties. Whereas the human variola virus and mouse ectromelia virus encode one vTNFR, the broad host range cowpox virus encodes all vTNFRs. We report the first comprehensive study of the functional and binding properties of these four vTNFRs, providing an explanation for their expression profile among different poxviruses. In addition, the vTNFRs activities were compared with the hTNFR2 used in the clinic. Interestingly, CrmB from variola virus, the causative agent of smallpox, is the most potent TNFR of those tested here including hTNFR2. Furthermore, we demonstrate a new immunomodulatory activity of vTNFRs, showing that CrmB and CrmD also inhibit the activity of lymphotoxin β. Similarly, we report for the first time that the hTNFR2 blocks the biological activity of lymphotoxin β. The characterization of vTNFRs optimized during virus-host evolution to modulate the host immune response provides relevant information about their potential role in pathogenesis and may be used to improve anti-inflammatory therapies based on soluble decoy TNFRs. © 2015 by The American Society for Biochemistry and Molecular Biology, Inc.

  9. Naval electronic warfare simulation for effectiveness assessment and softkill programmability facility

    NASA Astrophysics Data System (ADS)

    Lançon, F.

    2011-06-01

    The Anti-ship Missile (ASM) threat to be faced by ships will become more diverse and difficult. Intelligence, rules of engagement constraints, fast reaction-time for effective softkill solution require specific tools to design Electronic Warfare (EW) systems and to integrate it onboard ship. SAGEM Company provides decoy launcher system [1] and its associated Naval Electronic Warfare Simulation tool (NEWS) to permit softkill effectiveness analysis for anti-ship missile defence. NEWS tool generates virtual environment for missile-ship engagement and counter-measure simulator over a wide spectrum: RF, IR, EO. It integrates EW Command & Control (EWC2) process which is implemented in decoy launcher system and performs Monte-Carlo batch processing to evaluate softkill effectiveness in different engagement situations. NEWS is designed to allow immediate EWC2 process integration from simulation to real decoy launcher system. By design, it allows the final operator to be able to program, test and integrate its own EWC2 module and EW library onboard, so intelligence of each user is protected and evolution of threat can be taken into account through EW library update. The objectives of NEWS tool are also to define a methodology for trial definition and trial data reduction. Growth potential would permit to design new concept for EWC2 programmability and real time effectiveness estimation in EW system. This tool can also be used for operator training purpose. This paper presents the architecture design, the softkill programmability facility concept and the flexibility for onboard integration on ship. The concept of this operationally focused simulation, which is to use only one tool for design, development, trial validation and operational use, will be demonstrated.

  10. CCL2 binding is CCR2 independent in primary adult human astrocytes.

    PubMed

    Fouillet, A; Mawson, J; Suliman, O; Sharrack, B; Romero, I A; Woodroofe, M N

    2012-02-09

    Chemokines are low relative molecular mass proteins, which have chemoattractant actions on many cell types. The chemokine, CCL2, has been shown to play a major role in the recruitment of monocytes in central nervous system (CNS) lesions in multiple sclerosis (MS). Since resident astrocytes constitute a major source of chemokine synthesis including CCL2, we were interested to assess the regulation of CCL2 by astrocytes. We showed that CCL2 bound to the cell surface of astrocytes and binding was not modulated by inflammatory conditions. However, CCR2 protein was not detected nor was activation of the classical CCR2 downstream signaling pathways. Recent studies have shown that non-signaling decoy chemokine receptors bind and modulate the expression of chemokines at site of inflammation. Here, we show that the D6 chemokine decoy receptor is constitutively expressed by primary human adult astrocytes at both mRNA and protein level. In addition, CCL3, which binds to D6, but not CCL19, which does not bind to D6, displaced CCL2 binding to astrocytes; indicating that CCL2 may bind to this cell type via the D6 receptor. Our results suggest that CCL2 binding to primary adult human astrocytes is CCR2-independent and is likely to be mediated via the D6 decoy chemokine receptor. Therefore we propose that astrocytes are implicated in both the establishment of chemokine gradients for the migration of leukocytes into and within the CNS and in the regulation of CCL2 levels at inflammatory sites in the CNS. Copyright © 2011 Elsevier B.V. All rights reserved.

  11. A comparison of the additional protocols of the five nuclear weapon states and the ensuing safeguards benefits to international nonproliferation efforts

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Uribe, Eva C; Sandoval, M Analisa; Sandoval, Marisa N

    2009-01-01

    With the 6 January 2009 entry into force of the Additional Protocol by the United States of America, all five declared Nuclear Weapon States that are part of the Nonproliferation Treaty have signed, ratified, and put into force the Additional Protocol. This paper makes a comparison of the strengths and weaknesses of the five Additional Protocols in force by the five Nuclear Weapon States with respect to the benefits to international nonproliferation aims. This paper also documents the added safeguards burden to the five declared Nuclear Weapon States that these Additional Protocols put on the states with respect to accessmore » to their civilian nuclear programs and the hosting of complementary access activities as part of the Additional Protocol.« less

  12. Improving the efficiency of single and multiple teleportation protocols based on the direct use of partially entangled states

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Fortes, Raphael; Rigolin, Gustavo, E-mail: rigolin@ifi.unicamp.br

    We push the limits of the direct use of partially pure entangled states to perform quantum teleportation by presenting several protocols in many different scenarios that achieve the optimal efficiency possible. We review and put in a single formalism the three major strategies known to date that allow one to use partially entangled states for direct quantum teleportation (no distillation strategies permitted) and compare their efficiencies in real world implementations. We show how one can improve the efficiency of many direct teleportation protocols by combining these techniques. We then develop new teleportation protocols employing multipartite partially entangled states. The threemore » techniques are also used here in order to achieve the highest efficiency possible. Finally, we prove the upper bound for the optimal success rate for protocols based on partially entangled Bell states and show that some of the protocols here developed achieve such a bound. -- Highlights: •Optimal direct teleportation protocols using directly partially entangled states. •We put in a single formalism all strategies of direct teleportation. •We extend these techniques for multipartite partially entangle states. •We give upper bounds for the optimal efficiency of these protocols.« less

  13. Anti-Noise Bidirectional Quantum Steganography Protocol with Large Payload

    NASA Astrophysics Data System (ADS)

    Qu, Zhiguo; Chen, Siyi; Ji, Sai; Ma, Songya; Wang, Xiaojun

    2018-06-01

    An anti-noise bidirectional quantum steganography protocol with large payload protocol is proposed in this paper. In the new protocol, Alice and Bob enable to transmit classical information bits to each other while teleporting secret quantum states covertly. The new protocol introduces the bidirectional quantum remote state preparation into the bidirectional quantum secure communication, not only to expand secret information from classical bits to quantum state, but also extract the phase and amplitude values of secret quantum state for greatly enlarging the capacity of secret information. The new protocol can also achieve better imperceptibility, since the eavesdropper can hardly detect the hidden channel or even obtain effective secret quantum states. Comparing with the previous quantum steganography achievements, due to its unique bidirectional quantum steganography, the new protocol can obtain higher transmission efficiency and better availability. Furthermore, the new algorithm can effectively resist quantum noises through theoretical analysis. Finally, the performance analysis proves the conclusion that the new protocol not only has good imperceptibility, high security, but also large payload.

  14. Anti-Noise Bidirectional Quantum Steganography Protocol with Large Payload

    NASA Astrophysics Data System (ADS)

    Qu, Zhiguo; Chen, Siyi; Ji, Sai; Ma, Songya; Wang, Xiaojun

    2018-03-01

    An anti-noise bidirectional quantum steganography protocol with large payload protocol is proposed in this paper. In the new protocol, Alice and Bob enable to transmit classical information bits to each other while teleporting secret quantum states covertly. The new protocol introduces the bidirectional quantum remote state preparation into the bidirectional quantum secure communication, not only to expand secret information from classical bits to quantum state, but also extract the phase and amplitude values of secret quantum state for greatly enlarging the capacity of secret information. The new protocol can also achieve better imperceptibility, since the eavesdropper can hardly detect the hidden channel or even obtain effective secret quantum states. Comparing with the previous quantum steganography achievements, due to its unique bidirectional quantum steganography, the new protocol can obtain higher transmission efficiency and better availability. Furthermore, the new algorithm can effectively resist quantum noises through theoretical analysis. Finally, the performance analysis proves the conclusion that the new protocol not only has good imperceptibility, high security, but also large payload.

  15. Deceptive Imprinting and Immune Refocusing in Vaccine Design

    USDA-ARS?s Scientific Manuscript database

    A large number of the world’s most widespread and problematic pathogens evade host immune responses by inducing strain specific immunity to immunodominant epitopes with high mutation rates capable of altering antigenic profiles. The immune system appears to be decoyed into reacting to these immunod...

  16. The Decoy Duck.

    ERIC Educational Resources Information Center

    Ryan, Anna

    1997-01-01

    Describes the development processes of an instructional video for use in a course offered through the Extended Learning Institute of Northern Virginia Community College entitled Women Writers II. Characterizes the process of transforming this English course from a print-based to a distance-learning course as time-consuming, creative, and…

  17. Baiting Inside Attackers using Decoy Documents

    DTIC Science & Technology

    2008-09-16

    viewed. Animated images allow the senders to monitor how long the message was displayed. The web bugs operate without alerting the user of the...Military Computer Security Policies”. IEEE Symposium on Security and Privacy, 1987. [5] Demers, A., Gehrke, J., Hong, M., Panda , B., Riedewald, M., Sharma

  18. Thermodynamics for the Formation of Double-Stranded DNA-Single-Walled Carbon Nanotube Hybrids.

    PubMed

    Shiraki, Tomohiro; Tsuzuki, Akiko; Toshimitsu, Fumiyuki; Nakashima, Naotoshi

    2016-03-24

    For the first time, the thermodynamics are described for the formation of double-stranded DNA (ds-DNA)-single-walled carbon nanotube (SWNT) hybrids. This treatment is applied to the exchange reaction of sodium cholate (SC) molecules on SWNTs and the ds-DNAs d(A)20 -d(T)20 and nuclear factor (NF)-κB decoy. UV/Vis/near-IR spectroscopy with temperature variations was used for analyzing the exchange reaction on the SWNTs with four different chiralities: (n,m)=(8,3), (6,5), (7,5), and (8,6). Single-stranded DNAs (ss-DNAs), including d(A)20 and d(T)20, are also used for comparison. The d(A)20-d(T)20 shows a drastic change in its thermodynamic parameters around the melting temperature (Tm ) of the DNA oligomer. No such Tm dependency was measured, owing to high Tm in the NF-κB decoy DNA and no Tm in the ss-DNA. © 2016 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  19. Importance of the pharmacological profile of the bound ligand in enrichment on nuclear receptors: toward the use of experimentally validated decoy ligands.

    PubMed

    Lagarde, Nathalie; Zagury, Jean-François; Montes, Matthieu

    2014-10-27

    The evaluation of virtual ligand screening methods is of major importance to ensure their reliability. Taking into account the agonist/antagonist pharmacological profile should improve the quality of the benchmarking data sets since ligand binding can induce conformational changes in the nuclear receptor structure and such changes may vary according to the agonist/antagonist ligand profile. We indeed found that splitting the agonist and antagonist ligands into two separate data sets for a given nuclear receptor target significantly enhances the quality of the evaluation. The pharmacological profile of the ligand bound in the binding site of the target structure was also found to be an additional critical parameter. We also illustrate that active compound data sets for a given pharmacological activity can be used as a set of experimentally validated decoy ligands for another pharmacological activity to ensure a reliable and challenging evaluation of virtual screening methods.

  20. Dynamic analysis of a parasite population model.

    PubMed

    Sibona, G J; Condat, C A

    2002-03-01

    We study the dynamics of a model that describes the competitive interaction between an invading species (a parasite) and its antibodies in an living being. This model was recently used to examine the dynamical competition between Tripanosoma cruzi and its antibodies during the acute phase of Chagas' disease. Depending on the antibody properties, the model yields three types of outcomes, corresponding, respectively, to healing, chronic disease, and host death. Here, we study the dynamics of the parasite-antibody interaction with the help of simulations, obtaining phase trajectories and phase diagrams for the system. We show that, under certain conditions, the size of the parasite inoculation can be crucial for the infection outcome and that a retardation in the stimulated production of an antibody species may result in the parasite gaining a definitive advantage. We also find a criterion for the relative sizes of the parameters that are required if parasite-generated decoys are indeed to help the invasion. Decoys may also induce a qualitatively different outcome: a limit cycle for the antibody-parasite population phase trajectories.

  1. Protein model discrimination using mutational sensitivity derived from deep sequencing.

    PubMed

    Adkar, Bharat V; Tripathi, Arti; Sahoo, Anusmita; Bajaj, Kanika; Goswami, Devrishi; Chakrabarti, Purbani; Swarnkar, Mohit K; Gokhale, Rajesh S; Varadarajan, Raghavan

    2012-02-08

    A major bottleneck in protein structure prediction is the selection of correct models from a pool of decoys. Relative activities of ∼1,200 individual single-site mutants in a saturation library of the bacterial toxin CcdB were estimated by determining their relative populations using deep sequencing. This phenotypic information was used to define an empirical score for each residue (RankScore), which correlated with the residue depth, and identify active-site residues. Using these correlations, ∼98% of correct models of CcdB (RMSD ≤ 4Å) were identified from a large set of decoys. The model-discrimination methodology was further validated on eleven different monomeric proteins using simulated RankScore values. The methodology is also a rapid, accurate way to obtain relative activities of each mutant in a large pool and derive sequence-structure-function relationships without protein isolation or characterization. It can be applied to any system in which mutational effects can be monitored by a phenotypic readout. Copyright © 2012 Elsevier Ltd. All rights reserved.

  2. Dynamic analysis of a parasite population model

    NASA Astrophysics Data System (ADS)

    Sibona, G. J.; Condat, C. A.

    2002-03-01

    We study the dynamics of a model that describes the competitive interaction between an invading species (a parasite) and its antibodies in an living being. This model was recently used to examine the dynamical competition between Tripanosoma cruzi and its antibodies during the acute phase of Chagas' disease. Depending on the antibody properties, the model yields three types of outcomes, corresponding, respectively, to healing, chronic disease, and host death. Here, we study the dynamics of the parasite-antibody interaction with the help of simulations, obtaining phase trajectories and phase diagrams for the system. We show that, under certain conditions, the size of the parasite inoculation can be crucial for the infection outcome and that a retardation in the stimulated production of an antibody species may result in the parasite gaining a definitive advantage. We also find a criterion for the relative sizes of the parameters that are required if parasite-generated decoys are indeed to help the invasion. Decoys may also induce a qualitatively different outcome: a limit cycle for the antibody-parasite population phase trajectories.

  3. Decoy receptor 3 expression in esophageal squamous cell carcinoma: correlation with tumour invasion and metastasis.

    PubMed

    Xiong, Gang; Guo, Hong; Ge, Xiaodong; Xu, Xueqing; Yang, Xiaoya; Yang, Kang; Jiang, Yaoguang; Bai, Yun

    2011-03-01

    Decoy receptor 3 (DcR3) is a soluble receptor, which can bind to and inactivate the apoptosis-inducing ligands. We studied a possible association between DcR3 expression and clinicopathologic features in patients with esophageal squamous cell carcinoma (ESCC). The mRNA expression of DcR3 was examined by RT-PCR in 109 primary ESCC patients. For the 52 pairs of DcR3 positive tissues, the protein expression was determined by immunohistochemistry. There was a strong correlation among DcR3 mRNA expression and tumor invasion (P=0.01) and lymph node metastasis (P=0.036). We also found that there was a correlation between DcR3 overexpression with lymph node metastasis (P=0.014) in 52 pairs of DCR3 mRNA positive tissues. Our finding suggested that the overexpression of DcR3 is significantly related with ESCC clinical staging. DcR3 might be a candidate as a tumor specific biomarker for ESCC.

  4. [Association of serum decoy receptor 3 protein level with the clinicopathologic features of bladder transitional cell carcinoma].

    PubMed

    Wang, Dong; Wang, Jian; Chen, Guojun

    2013-12-01

    To investigate the association of serum levels of decoy receptor 3(DcR3) protein and the clinicopathologic features of bladder transitional cell carcinoma. Enzyme-linked immunosorbent assay was used to examine the serum levels of DcR3 in patients with bladder transitional cell carcinoma for analysis of its association with the patients' age, gender, clinical stages and pathological classification. The patients with bladder transitional cell carcinoma showed a significantly elevated serum level of DcR3 (183.43 ∓78.45 pg/m1) compared with the normal level (116.65∓97.43 pg/m1, P<0.05). The serum level of DcR3 in the patients showed close correlations with the TNM stage and pathological classification of the tumor (P<0.05) but not with the patients' age or gender (P>0.05). In patients with bladder transitional cell carcinoma, a high serum level of DcR3 suggests a higher malignancy of the tumor.

  5. Generation of an arbitrary concatenated Greenberger-Horne-Zeilinger state with single photons

    NASA Astrophysics Data System (ADS)

    Chen, Shan-Shan; Zhou, Lan; Sheng, Yu-Bo

    2017-02-01

    The concatenated Greenberger-Horne-Zeilinger (C-GHZ) state is a new kind of logic-qubit entangled state, which may have extensive applications in future quantum communication. In this letter, we propose a protocol for constructing an arbitrary C-GHZ state with single photons. We exploit the cross-Kerr nonlinearity for this purpose. This protocol has some advantages over previous protocols. First, it only requires two kinds of cross-Kerr nonlinearities to generate single phase shifts  ±θ. Second, it is not necessary to use sophisticated m-photon Toffoli gates. Third, this protocol is deterministic and can be used to generate an arbitrary C-GHZ state. This protocol may be useful in future quantum information processing based on the C-GHZ state.

  6. Continuous-variable quantum key distribution with a leakage from state preparation

    NASA Astrophysics Data System (ADS)

    Derkach, Ivan; Usenko, Vladyslav C.; Filip, Radim

    2017-12-01

    We address side-channel leakage in a trusted preparation station of continuous-variable quantum key distribution with coherent and squeezed states. We consider two different scenarios: multimode Gaussian modulation, directly accessible to an eavesdropper, or side-channel loss of the signal states prior to the modulation stage. We show the negative impact of excessive modulation on both the coherent- and squeezed-state protocols. The impact is more pronounced for squeezed-state protocols and may require optimization of squeezing in the case of noisy quantum channels. Further, we demonstrate that the coherent-state protocol is immune to side-channel signal state leakage prior to modulation, while the squeezed-state protocol is vulnerable to such attacks, becoming more sensitive to the noise in the channel. In the general case of noisy quantum channels the signal squeezing can be optimized to provide best performance of the protocol in the presence of side-channel leakage prior to modulation. Our results demonstrate that leakage from the trusted source in continuous-variable quantum key distribution should not be underestimated and squeezing optimization is needed to overcome coherent state protocols.

  7. Quantum Private Query Based on Bell State and Single Photons

    NASA Astrophysics Data System (ADS)

    Gao, Xiang; Chang, Yan; Zhang, Shi-Bin; Yang, Fan; Zhang, Yan

    2018-03-01

    Quantum private query (QPQ) can protect both user's and database holder's privacy. In this paper, we propose a novel quantum private query protocol based on Bell state and single photons. As far as we know, no one has ever proposed the QPQ based on Bell state. By using the decoherence-free (DF) states, our protocol can resist the collective noise. Besides that, our protocol is a one-way quantum protocol, which can resist the Trojan horse attack and reduce the communication complexity. Our protocol can not only guarantee the participants' privacy but also stand against an external eavesdropper.

  8. Bidirectional Teleportation Protocol in Quantum Wireless Multi-hop Network

    NASA Astrophysics Data System (ADS)

    Cai, Rui; Yu, Xu-Tao; Zhang, Zai-Chen

    2018-06-01

    We propose a bidirectional quantum teleportation protocol based on a composite GHZ-Bell state. In this protocol, the composite GHZ-Bell state channel is transformed into two-Bell state channel through gate operations and single qubit measurements. The channel transformation will lead to different kinds of quantum channel states, so a method is proposed to help determine the unitary matrices effectively under different quantum channels. Furthermore, we discuss the bidirectional teleportation protocol in the quantum wireless multi-hop network. This paper is aimed to provide a bidirectional teleportation protocol and study the bidirectional multi-hop teleportation in the quantum wireless communication network.

  9. Bidirectional Teleportation Protocol in Quantum Wireless Multi-hop Network

    NASA Astrophysics Data System (ADS)

    Cai, Rui; Yu, Xu-Tao; Zhang, Zai-Chen

    2018-02-01

    We propose a bidirectional quantum teleportation protocol based on a composite GHZ-Bell state. In this protocol, the composite GHZ-Bell state channel is transformed into two-Bell state channel through gate operations and single qubit measurements. The channel transformation will lead to different kinds of quantum channel states, so a method is proposed to help determine the unitary matrices effectively under different quantum channels. Furthermore, we discuss the bidirectional teleportation protocol in the quantum wireless multi-hop network. This paper is aimed to provide a bidirectional teleportation protocol and study the bidirectional multi-hop teleportation in the quantum wireless communication network.

  10. Benchmark of four popular virtual screening programs: construction of the active/decoy dataset remains a major determinant of measured performance.

    PubMed

    Chaput, Ludovic; Martinez-Sanz, Juan; Saettel, Nicolas; Mouawad, Liliane

    2016-01-01

    In a structure-based virtual screening, the choice of the docking program is essential for the success of a hit identification. Benchmarks are meant to help in guiding this choice, especially when undertaken on a large variety of protein targets. Here, the performance of four popular virtual screening programs, Gold, Glide, Surflex and FlexX, is compared using the Directory of Useful Decoys-Enhanced database (DUD-E), which includes 102 targets with an average of 224 ligands per target and 50 decoys per ligand, generated to avoid biases in the benchmarking. Then, a relationship between these program performances and the properties of the targets or the small molecules was investigated. The comparison was based on two metrics, with three different parameters each. The BEDROC scores with α = 80.5, indicated that, on the overall database, Glide succeeded (score > 0.5) for 30 targets, Gold for 27, FlexX for 14 and Surflex for 11. The performance did not depend on the hydrophobicity nor the openness of the protein cavities, neither on the families to which the proteins belong. However, despite the care in the construction of the DUD-E database, the small differences that remain between the actives and the decoys likely explain the successes of Gold, Surflex and FlexX. Moreover, the similarity between the actives of a target and its crystal structure ligand seems to be at the basis of the good performance of Glide. When all targets with significant biases are removed from the benchmarking, a subset of 47 targets remains, for which Glide succeeded for only 5 targets, Gold for 4 and FlexX and Surflex for 2. The performance dramatic drop of all four programs when the biases are removed shows that we should beware of virtual screening benchmarks, because good performances may be due to wrong reasons. Therefore, benchmarking would hardly provide guidelines for virtual screening experiments, despite the tendency that is maintained, i.e., Glide and Gold display better performance than FlexX and Surflex. We recommend to always use several programs and combine their results. Graphical AbstractSummary of the results obtained by virtual screening with the four programs, Glide, Gold, Surflex and FlexX, on the 102 targets of the DUD-E database. The percentage of targets with successful results, i.e., with BDEROC(α = 80.5) > 0.5, when the entire database is considered are in Blue, and when targets with biased chemical libraries are removed are in Red.

  11. The general theory of three-party quantum secret sharing protocols over phase-damping channels

    NASA Astrophysics Data System (ADS)

    Song, Ting-Ting; Wen, Qiao-Yan; Qin, Su-Juan; Zhang, Wei-Wei; Sun, Ying

    2013-10-01

    The general theory of three-party QSS protocols with the noisy quantum channels is discussed. When the particles are transmitted through the noisy quantum channels, the initial pure three-qubit tripartite entangled states would be changed into mixed states. We analyze the security of QSS protocols with the different kinds of three-qubit tripartite entangled states under phase-damping channels and figure out, for different kinds of initial states, the successful probabilities that Alice's secret can be recovered by legal agents are different. Comparing with one recent QSS protocol based on GHZ states, our scheme is secure, and has a little smaller key rate than that of the recent protocol.

  12. Feasible logic Bell-state analysis with linear optics

    PubMed Central

    Zhou, Lan; Sheng, Yu-Bo

    2016-01-01

    We describe a feasible logic Bell-state analysis protocol by employing the logic entanglement to be the robust concatenated Greenberger-Horne-Zeilinger (C-GHZ) state. This protocol only uses polarization beam splitters and half-wave plates, which are available in current experimental technology. We can conveniently identify two of the logic Bell states. This protocol can be easily generalized to the arbitrary C-GHZ state analysis. We can also distinguish two N-logic-qubit C-GHZ states. As the previous theory and experiment both showed that the C-GHZ state has the robustness feature, this logic Bell-state analysis and C-GHZ state analysis may be essential for linear-optical quantum computation protocols whose building blocks are logic-qubit entangled state. PMID:26877208

  13. Feasible logic Bell-state analysis with linear optics.

    PubMed

    Zhou, Lan; Sheng, Yu-Bo

    2016-02-15

    We describe a feasible logic Bell-state analysis protocol by employing the logic entanglement to be the robust concatenated Greenberger-Horne-Zeilinger (C-GHZ) state. This protocol only uses polarization beam splitters and half-wave plates, which are available in current experimental technology. We can conveniently identify two of the logic Bell states. This protocol can be easily generalized to the arbitrary C-GHZ state analysis. We can also distinguish two N-logic-qubit C-GHZ states. As the previous theory and experiment both showed that the C-GHZ state has the robustness feature, this logic Bell-state analysis and C-GHZ state analysis may be essential for linear-optical quantum computation protocols whose building blocks are logic-qubit entangled state.

  14. Faithful One-way Trip Deterministic Secure Quantum Communication Scheme Against Collective Rotating Noise Based on Order Rearrangement of Photon Pairs

    NASA Astrophysics Data System (ADS)

    Yuan, Hao; Zhang, Qin; Hong, Liang; Yin, Wen-jie; Xu, Dong

    2014-08-01

    We present a novel scheme for deterministic secure quantum communication (DSQC) over collective rotating noisy channel. Four special two-qubit states are found can constitute a noise-free subspaces, and so are utilized as quantum information carriers. In this scheme, the information carriers transmite over the quantum channel only one time, which can effectively reduce the influence of other noise existing in quantum channel. The information receiver need only perform two single-photon collective measurements to decode the secret messages, which can make the present scheme more convenient in practical application. It will be showed that our scheme has a relatively high information capacity and intrisic efficiency. Foremostly, the decoy photon pair checking technique and the order rearrangement of photon pairs technique guarantee that the present scheme is unconditionally secure.

  15. The Design of Finite State Machine for Asynchronous Replication Protocol

    NASA Astrophysics Data System (ADS)

    Wang, Yanlong; Li, Zhanhuai; Lin, Wei; Hei, Minglei; Hao, Jianhua

    Data replication is a key way to design a disaster tolerance system and to achieve reliability and availability. It is difficult for a replication protocol to deal with the diverse and complex environment. This means that data is less well replicated than it ought to be. To reduce data loss and to optimize replication protocols, we (1) present a finite state machine, (2) run it to manage an asynchronous replication protocol and (3) report a simple evaluation of the asynchronous replication protocol based on our state machine. It's proved that our state machine is applicable to guarantee the asynchronous replication protocol running in the proper state to the largest extent in the event of various possible events. It also can helpful to build up replication-based disaster tolerance systems to ensure the business continuity.

  16. Elder Abuse Identification in the Prehospital Setting: An Examination of State Emergency Medical Services Protocols.

    PubMed

    Namboodri, Brooke L; Rosen, Tony; Dayaa, Joseph A; Bischof, Jason J; Ramadan, Nadeem; Patel, Mehul D; Grover, Joseph; Brice, Jane H; Platts-Mills, Timothy F

    2018-03-22

    To describe statewide emergency medical service (EMS) protocols relating to identification, management, and reporting of elder abuse in the prehospital setting. Cross-sectional analysis. Statewide EMS protocols in the United States. Publicly available statewide EMS protocols identified from published literature, http://EMSprotocols.org, and each state's public health website. Protocols were reviewed to determine whether elder abuse was mentioned, elder abuse was defined, potential indicators of elder abuse were listed, management of older adults experiencing abuse was described, and instructions regarding reporting were provided. EMS protocols for child abuse were reviewed in the same manner for the purpose of comparison. Of the 35 publicly available statewide EMS protocols, only 14 (40.0%) mention elder abuse. Of protocols that mention elder abuse, 6 (42.9%) define elder abuse, 10 (71.4%) describe indicators of elder abuse, 8 (57.1%) provide instruction regarding management, and 12 (85.7%) provide instruction regarding reporting. Almost twice as many states met each of these metrics for child abuse. Statewide EMS protocols for elder abuse vary in regard to identification, management, and reporting, with the majority of states having no content on this subject. Expansion and standardization of protocols may increase the identification of elder abuse. © 2018, Copyright the Authors Journal compilation © 2018, The American Geriatrics Society.

  17. Non-adiabatic quantum state preparation and quantum state transport in chains of Rydberg atoms

    NASA Astrophysics Data System (ADS)

    Ostmann, Maike; Minář, Jiří; Marcuzzi, Matteo; Levi, Emanuele; Lesanovsky, Igor

    2017-12-01

    Motivated by recent progress in the experimental manipulation of cold atoms in optical lattices, we study three different protocols for non-adiabatic quantum state preparation and state transport in chains of Rydberg atoms. The protocols we discuss are based on the blockade mechanism between atoms which, when excited to a Rydberg state, interact through a van der Waals potential, and rely on single-site addressing. Specifically, we discuss protocols for efficient creation of an antiferromagnetic GHZ state, a class of matrix product states including a so-called Rydberg crystal and for the state transport of a single-qubit quantum state between two ends of a chain of atoms. We identify system parameters allowing for the operation of the protocols on timescales shorter than the lifetime of the Rydberg states while yielding high fidelity output states. We discuss the effect of positional disorder on the resulting states and comment on limitations due to other sources of noise such as radiative decay of the Rydberg states. The proposed protocols provide a testbed for benchmarking the performance of quantum information processing platforms based on Rydberg atoms.

  18. Production of Functional Proteins: Balance of Shear Stress and Gravity

    NASA Technical Reports Server (NTRS)

    Goodwin, Thomas John (Inventor); Hammond, Timothy Grant (Inventor); Haysen, James Howard (Inventor)

    2005-01-01

    The present invention provides for a method of culturing cells and inducing the expression of at least one gene in the cell culture. The method provides for contacting the cell with a transcription factor decoy oligonucleotide sequence directed against a nucleotide sequence encoding a shear stress response element.

  19. 50 CFR 32.47 - Nevada.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... public from 1 hour before legal sunrise until 1 hour after legal sunset. 4. You may only possess approved... refuge hunting area during the migratory waterfowl hunting season. 3. You may only possess approved... not allow permanent or pit blinds on the refuge. You must remove all blind materials and decoys...

  20. 50 CFR 92.20 - Methods and means.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... birds: (a) Swivel guns, shotguns larger than 10 gauge, punt guns, battery guns, machine guns, fish hooks, poisons, drugs, explosives, or stupefying substances; (b) Shooting from a sinkbox or any other type of low...) Hunting from any type of aircraft; (d) Taking waterfowl and other species using live birds as decoys...

  1. 50 CFR 92.20 - Methods and means.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... birds: (a) Swivel guns, shotguns larger than 10 gauge, punt guns, battery guns, machine guns, fish hooks, poisons, drugs, explosives, or stupefying substances; (b) Shooting from a sinkbox or any other type of low...) Hunting from any type of aircraft; (d) Taking waterfowl and other species using live birds as decoys...

  2. 50 CFR 92.20 - Methods and means.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... birds: (a) Swivel guns, shotguns larger than 10 gauge, punt guns, battery guns, machine guns, fish hooks, poisons, drugs, explosives, or stupefying substances; (b) Shooting from a sinkbox or any other type of low...) Hunting from any type of aircraft; (d) Taking waterfowl and other species using live birds as decoys...

  3. 50 CFR 92.20 - Methods and means.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... birds: (a) Swivel guns, shotguns larger than 10 gauge, punt guns, battery guns, machine guns, fish hooks, poisons, drugs, explosives, or stupefying substances; (b) Shooting from a sinkbox or any other type of low...) Hunting from any type of aircraft; (d) Taking waterfowl and other species using live birds as decoys...

  4. Rosetta:MSF: a modular framework for multi-state computational protein design.

    PubMed

    Löffler, Patrick; Schmitz, Samuel; Hupfeld, Enrico; Sterner, Reinhard; Merkl, Rainer

    2017-06-01

    Computational protein design (CPD) is a powerful technique to engineer existing proteins or to design novel ones that display desired properties. Rosetta is a software suite including algorithms for computational modeling and analysis of protein structures and offers many elaborate protocols created to solve highly specific tasks of protein engineering. Most of Rosetta's protocols optimize sequences based on a single conformation (i. e. design state). However, challenging CPD objectives like multi-specificity design or the concurrent consideration of positive and negative design goals demand the simultaneous assessment of multiple states. This is why we have developed the multi-state framework MSF that facilitates the implementation of Rosetta's single-state protocols in a multi-state environment and made available two frequently used protocols. Utilizing MSF, we demonstrated for one of these protocols that multi-state design yields a 15% higher performance than single-state design on a ligand-binding benchmark consisting of structural conformations. With this protocol, we designed de novo nine retro-aldolases on a conformational ensemble deduced from a (βα)8-barrel protein. All variants displayed measurable catalytic activity, testifying to a high success rate for this concept of multi-state enzyme design.

  5. Rosetta:MSF: a modular framework for multi-state computational protein design

    PubMed Central

    Hupfeld, Enrico; Sterner, Reinhard

    2017-01-01

    Computational protein design (CPD) is a powerful technique to engineer existing proteins or to design novel ones that display desired properties. Rosetta is a software suite including algorithms for computational modeling and analysis of protein structures and offers many elaborate protocols created to solve highly specific tasks of protein engineering. Most of Rosetta’s protocols optimize sequences based on a single conformation (i. e. design state). However, challenging CPD objectives like multi-specificity design or the concurrent consideration of positive and negative design goals demand the simultaneous assessment of multiple states. This is why we have developed the multi-state framework MSF that facilitates the implementation of Rosetta’s single-state protocols in a multi-state environment and made available two frequently used protocols. Utilizing MSF, we demonstrated for one of these protocols that multi-state design yields a 15% higher performance than single-state design on a ligand-binding benchmark consisting of structural conformations. With this protocol, we designed de novo nine retro-aldolases on a conformational ensemble deduced from a (βα)8-barrel protein. All variants displayed measurable catalytic activity, testifying to a high success rate for this concept of multi-state enzyme design. PMID:28604768

  6. Iterative tailoring of optical quantum states with homodyne measurements.

    PubMed

    Etesse, Jean; Kanseri, Bhaskar; Tualle-Brouri, Rosa

    2014-12-01

    As they can travel long distances, free space optical quantum states are good candidates for carrying information in quantum information technology protocols. These states, however, are often complex to produce and require protocols whose success probability drops quickly with an increase of the mean photon number. Here we propose a new protocol for the generation and growth of arbitrary states, based on one by one coherent adjunctions of the simple state superposition α|0〉 + β|1〉. Due to the nature of the protocol, which allows for the use of quantum memories, it can lead to high performances.

  7. Deterministic entanglement distillation for secure double-server blind quantum computation.

    PubMed

    Sheng, Yu-Bo; Zhou, Lan

    2015-01-15

    Blind quantum computation (BQC) provides an efficient method for the client who does not have enough sophisticated technology and knowledge to perform universal quantum computation. The single-server BQC protocol requires the client to have some minimum quantum ability, while the double-server BQC protocol makes the client's device completely classical, resorting to the pure and clean Bell state shared by two servers. Here, we provide a deterministic entanglement distillation protocol in a practical noisy environment for the double-server BQC protocol. This protocol can get the pure maximally entangled Bell state. The success probability can reach 100% in principle. The distilled maximally entangled states can be remaind to perform the BQC protocol subsequently. The parties who perform the distillation protocol do not need to exchange the classical information and they learn nothing from the client. It makes this protocol unconditionally secure and suitable for the future BQC protocol.

  8. Deterministic entanglement distillation for secure double-server blind quantum computation

    PubMed Central

    Sheng, Yu-Bo; Zhou, Lan

    2015-01-01

    Blind quantum computation (BQC) provides an efficient method for the client who does not have enough sophisticated technology and knowledge to perform universal quantum computation. The single-server BQC protocol requires the client to have some minimum quantum ability, while the double-server BQC protocol makes the client's device completely classical, resorting to the pure and clean Bell state shared by two servers. Here, we provide a deterministic entanglement distillation protocol in a practical noisy environment for the double-server BQC protocol. This protocol can get the pure maximally entangled Bell state. The success probability can reach 100% in principle. The distilled maximally entangled states can be remaind to perform the BQC protocol subsequently. The parties who perform the distillation protocol do not need to exchange the classical information and they learn nothing from the client. It makes this protocol unconditionally secure and suitable for the future BQC protocol. PMID:25588565

  9. Novel Multi-Party Quantum Key Agreement Protocol with G-Like States and Bell States

    NASA Astrophysics Data System (ADS)

    Min, Shi-Qi; Chen, Hua-Ying; Gong, Li-Hua

    2018-03-01

    A significant aspect of quantum cryptography is quantum key agreement (QKA), which ensures the security of key agreement protocols by quantum information theory. The fairness of an absolute security multi-party quantum key agreement (MQKA) protocol demands that all participants can affect the protocol result equally so as to establish a shared key and that nobody can determine the shared key by himself/herself. We found that it is difficult for the existing multi-party quantum key agreement protocol to withstand the collusion attacks. Put differently, it is possible for several cooperated and untruthful participants to determine the final key without being detected. To address this issue, based on the entanglement swapping between G-like state and Bell states, a new multi-party quantum key agreement protocol is put forward. The proposed protocol makes full use of EPR pairs as quantum resources, and adopts Bell measurement and unitary operation to share a secret key. Besides, the proposed protocol is fair, secure and efficient without involving a third party quantum center. It demonstrates that the protocol is capable of protecting users' privacy and meeting the requirement of fairness. Moreover, it is feasible to carry out the protocol with existing technologies.

  10. Novel Multi-Party Quantum Key Agreement Protocol with G-Like States and Bell States

    NASA Astrophysics Data System (ADS)

    Min, Shi-Qi; Chen, Hua-Ying; Gong, Li-Hua

    2018-06-01

    A significant aspect of quantum cryptography is quantum key agreement (QKA), which ensures the security of key agreement protocols by quantum information theory. The fairness of an absolute security multi-party quantum key agreement (MQKA) protocol demands that all participants can affect the protocol result equally so as to establish a shared key and that nobody can determine the shared key by himself/herself. We found that it is difficult for the existing multi-party quantum key agreement protocol to withstand the collusion attacks. Put differently, it is possible for several cooperated and untruthful participants to determine the final key without being detected. To address this issue, based on the entanglement swapping between G-like state and Bell states, a new multi-party quantum key agreement protocol is put forward. The proposed protocol makes full use of EPR pairs as quantum resources, and adopts Bell measurement and unitary operation to share a secret key. Besides, the proposed protocol is fair, secure and efficient without involving a third party quantum center. It demonstrates that the protocol is capable of protecting users' privacy and meeting the requirement of fairness. Moreover, it is feasible to carry out the protocol with existing technologies.

  11. 40 CFR 82.4 - Prohibitions for class I controlled substances.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... not Party to the 1987 Montreal Protocol unless that foreign state is complying with the 1987 Montreal Protocol (For ratification status, see: http://ozone.unep.org/new_site/en/treaty_ratification_status.php... Montreal Protocol, unless that foreign state is complying with the 1987 Montreal Protocol (For ratification...

  12. Electronic Entanglement Concentration for the Concatenated Greenberger-Horne-Zeilinger State

    NASA Astrophysics Data System (ADS)

    Ding, Shang-Ping; Zhou, Lan; Gu, Shi-Pu; Wang, Xing-Fu; Sheng, Yu-Bo

    2017-06-01

    Concatenated Greenberger-Horne-Zeilinger (C-GHZ) state, which encodes many physical qubits in a logic qubit will have important applications in both quantum communication and computation. In this paper, we will describe an entanglement concentration protocol (ECP) for electronic C-GHZ state, by exploiting the electronic polarization beam splitters (PBSs) and charge detection. This protocol has several advantages. First, the parties do not need to know the exact coefficients of the initial less-entangled C-GHZ state, which makes this protocol feasible. Second, with the help of charge detection, the distilled maximally entangled C-GHZ state can be remained for future application. Third, this protocol can be repeated to obtain a higher success probability. We hope that this protocol can be useful in future quantum computation based on electrons.

  13. Quantum key distribution over 120 km using ultrahigh purity single-photon source and superconducting single-photon detectors

    PubMed Central

    Takemoto, Kazuya; Nambu, Yoshihiro; Miyazawa, Toshiyuki; Sakuma, Yoshiki; Yamamoto, Tsuyoshi; Yorozu, Shinichi; Arakawa, Yasuhiko

    2015-01-01

    Advances in single-photon sources (SPSs) and single-photon detectors (SPDs) promise unique applications in the field of quantum information technology. In this paper, we report long-distance quantum key distribution (QKD) by using state-of-the-art devices: a quantum-dot SPS (QD SPS) emitting a photon in the telecom band of 1.5 μm and a superconducting nanowire SPD (SNSPD). At the distance of 100 km, we obtained the maximal secure key rate of 27.6 bps without using decoy states, which is at least threefold larger than the rate obtained in the previously reported 50-km-long QKD experiment. We also succeeded in transmitting secure keys at the rate of 0.307 bps over 120 km. This is the longest QKD distance yet reported by using known true SPSs. The ultralow multiphoton emissions of our SPS and ultralow dark count of the SNSPD contributed to this result. The experimental results demonstrate the potential applicability of QD SPSs to practical telecom QKD networks. PMID:26404010

  14. Articulation of Phonologically Similar Items Disrupts Free Recall of Nonwords

    ERIC Educational Resources Information Center

    Nishiyama, Ryoji; Ukita, Jun

    2013-01-01

    The present study sought to clarify whether phonological similarity of encoded information impairs free recall performance (the phonological similarity effect: PSE) for nonwords. Five experiments examined the influence of the encoding process on the PSE in a step-by-step fashion, by using lists that consisted of phonologically similar (decoy)…

  15. Preference Reversal in Multiattribute Choice

    ERIC Educational Resources Information Center

    Tsetsos, Konstantinos; Usher, Marius; Chater, Nick

    2010-01-01

    A central puzzle for theories of choice is that people's preferences between options can be reversed by the presence of decoy options (that are not chosen) or by the presence of other irrelevant options added to the choice set. Three types of reversal effect reported in the decision-making literature, the attraction, compromise, and similarity…

  16. Effects of a Driver Enforcement Program on Yielding to Pedestrians

    ERIC Educational Resources Information Center

    Van Houten, Ron; Malenfant, J. E. Louis

    2004-01-01

    A driver-yielding enforcement program that included decoy pedestrians, feedback flyers, written and verbal warnings, and saturation enforcement for a 2-week period was evaluated in the city of Miami Beach using a multiple baseline design. During baseline, data were collected at crosswalks along two major corridors. Treatment was introduced first…

  17. Hiding in Plain Sight: leaf beetles (Chrysomelidae: Galerucinae) use feeding damage as a masquerade decoy

    USDA-ARS?s Scientific Manuscript database

    To avoid detection by predators, many herbivorous insects have evolved an astonishing degree of visual fidelity to inanimate items in their surroundings that renders them cryptic to their enemies. In an evolutionary twist to crypsis, known as masquerade, a predator detects prey, but fails to perceiv...

  18. Reduction of Decoy Receptor 3 Enhances TRAIL-Mediated Apoptosis in Pancreatic Cancer

    PubMed Central

    Wang, Wei; Yang, Shanmin; Su, Ying; Zhang, Hengshan; Liu, Chaomei; Li, Xinfeng; Lin, Ling; Kim, Sunghee; Okunieff, Paul; Zhang, Zhenhuan; Zhang, Lurong

    2013-01-01

    Most human pancreatic cancer cells are resistant to tumor necrosis factor (TNF)-related apoptosis-inducing ligand (TRAIL)-mediated apoptosis. However, the mechanisms by which pancreatic cancer cells utilize their extracellular molecules to counteract the proapoptotic signaling mediated by the TNF family are largely unknown. In this study, we demonstrate for the first time that DcR3, a secreted decoy receptor that malignant pancreatic cancer cells express at a high level, acts as an extracellular antiapoptotic molecule by binding to TRAIL and counteracting its death-promoting function. The reduction of DcR3 with siRNA unmasked TRAIL and greatly enhanced TRAIL-induced apoptosis. Gemcitabine, a first-line drug for pancreatic cancer, also reduced the level of DcR3. The addition of DcR3 siRNA further enhanced gemcitabine-induced apoptosis. Notably, our in vivo study demonstrated that the therapeutic effect of gemcitabine could be enhanced via further reduction of DcR3, suggesting that downregulation of DcR3 in tumor cells could tip the balance of pancreatic cells towards apoptosis and potentially serve as a new strategy for pancreatic cancer therapy. PMID:24204567

  19. Automated Docking Screens: A Feasibility Study

    PubMed Central

    2009-01-01

    Molecular docking is the most practical approach to leverage protein structure for ligand discovery, but the technique retains important liabilities that make it challenging to deploy on a large scale. We have therefore created an expert system, DOCK Blaster, to investigate the feasibility of full automation. The method requires a PDB code, sometimes with a ligand structure, and from that alone can launch a full screen of large libraries. A critical feature is self-assessment, which estimates the anticipated reliability of the automated screening results using pose fidelity and enrichment. Against common benchmarks, DOCK Blaster recapitulates the crystal ligand pose within 2 Å rmsd 50−60% of the time; inferior to an expert, but respectrable. Half the time the ligand also ranked among the top 5% of 100 physically matched decoys chosen on the fly. Further tests were undertaken culminating in a study of 7755 eligible PDB structures. In 1398 cases, the redocked ligand ranked in the top 5% of 100 property-matched decoys while also posing within 2 Å rmsd, suggesting that unsupervised prospective docking is viable. DOCK Blaster is available at http://blaster.docking.org. PMID:19719084

  20. A Direction of Arrival Estimation Algorithm Based on Orthogonal Matching Pursuit

    NASA Astrophysics Data System (ADS)

    Tang, Junyao; Cao, Fei; Liu, Lipeng

    2018-02-01

    The results show that the modified DSM is able to predict local buckling capacity of hot-rolled RHS and SHS accurately. In order to solve the problem of the weak ability of anti-radiation missile against active decoy in modern electronic warfare, a direction of arrival estimation algorithm based on orthogonal matching pursuit is proposed in this paper. The algorithm adopts the compression sensing technology. This paper uses array antennas to receive signals, gets the sparse representation of signals, and then designs the corresponding perception matrix. The signal is reconstructed by orthogonal matching pursuit algorithm to estimate the optimal solution. At the same time, the error of the whole measurement system is analyzed and simulated, and the validity of this algorithm is verified. The algorithm greatly reduces the measurement time, the quantity of equipment and the total amount of the calculation, and accurately estimates the angle and strength of the incoming signal. This technology can effectively improve the angle resolution of the missile, which is of reference significance to the research of anti-active decoy.

  1. Automated docking screens: a feasibility study.

    PubMed

    Irwin, John J; Shoichet, Brian K; Mysinger, Michael M; Huang, Niu; Colizzi, Francesco; Wassam, Pascal; Cao, Yiqun

    2009-09-24

    Molecular docking is the most practical approach to leverage protein structure for ligand discovery, but the technique retains important liabilities that make it challenging to deploy on a large scale. We have therefore created an expert system, DOCK Blaster, to investigate the feasibility of full automation. The method requires a PDB code, sometimes with a ligand structure, and from that alone can launch a full screen of large libraries. A critical feature is self-assessment, which estimates the anticipated reliability of the automated screening results using pose fidelity and enrichment. Against common benchmarks, DOCK Blaster recapitulates the crystal ligand pose within 2 A rmsd 50-60% of the time; inferior to an expert, but respectrable. Half the time the ligand also ranked among the top 5% of 100 physically matched decoys chosen on the fly. Further tests were undertaken culminating in a study of 7755 eligible PDB structures. In 1398 cases, the redocked ligand ranked in the top 5% of 100 property-matched decoys while also posing within 2 A rmsd, suggesting that unsupervised prospective docking is viable. DOCK Blaster is available at http://blaster.docking.org .

  2. Autologous Bone Marrow Stromal Cells Genetically Engineered to Secrete an IGF-I Receptor Decoy Prevent the Growth of Liver Metastases

    PubMed Central

    Wang, Ni; Fallavollita, Lucia; Nguyen, Long; Burnier, Julia; Rafei, Moutih; Galipeau, Jacques; Yakar, Shoshana; Brodt, Pnina

    2009-01-01

    Liver metastases respond poorly to current therapy and remain a frequent cause of cancer-related mortality. We reported previously that tumor cells expressing a soluble form of the insulin-like growth factor-I receptor (sIGFIR) lost the ability to metastasize to the liver. Here, we sought to develop a novel therapeutic approach for prevention of hepatic metastasis based on sustained in vivo delivery of the soluble receptor by genetically engineered autologous bone marrow stromal cells. We found that when implanted into mice, these cells secreted high plasma levels of sIGFIR and inhibited experimental hepatic metastases of colon and lung carcinoma cells. In hepatic micrometastases, a reduction in intralesional angiogenesis and increased tumor cell apoptosis were observed. The results show that the soluble receptor acted as a decoy to abort insulin-like growth factor-I receptor (IGF-IR) functions during the early stages of metastasis and identify sustained sIGFIR delivery by cell-based vehicles as a potential approach for prevention of hepatic metastasis. PMID:19367255

  3. Effects of feral cats on the evolution of anti-predator behaviours in island reptiles: insights from an ancient introduction

    PubMed Central

    Li, Binbin; Belasen, Anat; Pafilis, Panayiotis; Bednekoff, Peter; Foufopoulos, Johannes

    2014-01-01

    Exotic predators have driven the extinction of many island species. We examined impacts of feral cats on the abundance and anti-predator behaviours of Aegean wall lizards in the Cyclades (Greece), where cats were introduced thousands of years ago. We compared populations with high and low cat density on Naxos Island and populations on surrounding islets with no cats. Cats reduced wall lizard populations by half. Lizards facing greater risk from cats stayed closer to refuges, were more likely to shed their tails in a standardized assay, and fled at greater distances when approached by either a person in the field or a mounted cat decoy in the laboratory. All populations showed phenotypic plasticity in flight initiation distance, suggesting that this feature is ancient and could have helped wall lizards survive the initial introduction of cats to the region. Lizards from islets sought shelter less frequently and often initially approached the cat decoy. These differences reflect changes since islet isolation and could render islet lizards strongly susceptible to cat predation. PMID:24943365

  4. Conserved Fever Pathways across Vertebrates: A Herpesvirus Expressed Decoy TNF-α Receptor Delays Behavioral Fever in Fish.

    PubMed

    Rakus, Krzysztof; Ronsmans, Maygane; Forlenza, Maria; Boutier, Maxime; Piazzon, M Carla; Jazowiecka-Rakus, Joanna; Gatherer, Derek; Athanasiadis, Alekos; Farnir, Frédéric; Davison, Andrew J; Boudinot, Pierre; Michiels, Thomas; Wiegertjes, Geert F; Vanderplasschen, Alain

    2017-02-08

    Both endotherms and ectotherms (e.g., fish) increase their body temperature to limit pathogen infection. Ectotherms do so by moving to warmer places, hence the term "behavioral fever." We studied the manifestation of behavioral fever in the common carp infected by cyprinid herpesvirus 3, a native carp pathogen. Carp maintained at 24°C died from the infection, whereas those housed in multi-chamber tanks encompassing a 24°C-32°C gradient migrated transiently to the warmest compartment and survived as a consequence. Behavioral fever manifested only at advanced stages of infection. Consistent with this, expression of CyHV-3 ORF12, encoding a soluble decoy receptor for TNF-α, delayed the manifestation of behavioral fever and promoted CyHV-3 replication in the context of a temperature gradient. Injection of anti-TNF-α neutralizing antibodies suppressed behavioral fever, and decreased fish survival in response to infection. This study provides a unique example of how viruses have evolved to alter host behavior to increase fitness. Copyright © 2017 The Author(s). Published by Elsevier Inc. All rights reserved.

  5. miR-328 Functions as an RNA Decoy to Modulate hnRNP E2 Regulation of mRNA Translation in Leukemic Blasts

    PubMed Central

    Eiring, Anna M.; Harb, Jason G.; Neviani, Paolo; Garton, Christopher; Oaks, Joshua J.; Spizzo, Riccardo; Liu, Shujun; Schwind, Sebastian; Santhanam, Ramasamy; Hickey, Christopher J.; Becker, Heiko; Chandler, Jason C.; Andino, Raul; Cortes, Jorge; Hokland, Peter; Huettner, Claudia S.; Bhatia, Ravi; Roy, Denis C.; Liebhaber, Stephen A.; Caligiuri, Michael A.; Marcucci, Guido; Garzon, Ramiro; Croce, Carlo M.; Calin, George A.; Perrotti, Danilo

    2010-01-01

    SUMMARY MicroRNAs and heterogeneous ribonucleoproteins (hnRNPs) are posttranscriptional gene regulators that bind mRNA in a sequence-specific manner. Here, we report that loss of miR-328 occurs in blast crisis chronic myelogenous leukemia (CML-BC) in a BCR/ABL dose- and kinase-dependent manner through the MAPK-hnRNP E2 pathway. Restoration of miR-328 expression rescues differentiation and impairs survival of leukemic blasts by simultaneously interacting with the translational regulator poly(rC)-binding protein hnRNP E2 and with the mRNA encoding the survival factor PIM1, respectively. The interaction with hnRNP E2 is independent of the microRNA’s seed sequence and it leads to release of CEBPA mRNA from hnRNP E2-mediated translational inhibition. Altogether, these data reveal the dual ability of a microRNA to control cell fate both through base pairing with mRNA targets and through a decoy activity that interferes with the function of regulatory proteins. PMID:20211135

  6. Reduction of decoy receptor 3 enhances TRAIL-mediated apoptosis in pancreatic cancer.

    PubMed

    Wang, Wei; Zhang, Mei; Sun, Weimin; Yang, Shanmin; Su, Ying; Zhang, Hengshan; Liu, Chaomei; Li, Xinfeng; Lin, Ling; Kim, Sunghee; Okunieff, Paul; Zhang, Zhenhuan; Zhang, Lurong

    2013-01-01

    Most human pancreatic cancer cells are resistant to tumor necrosis factor (TNF)-related apoptosis-inducing ligand (TRAIL)-mediated apoptosis. However, the mechanisms by which pancreatic cancer cells utilize their extracellular molecules to counteract the proapoptotic signaling mediated by the TNF family are largely unknown. In this study, we demonstrate for the first time that DcR3, a secreted decoy receptor that malignant pancreatic cancer cells express at a high level, acts as an extracellular antiapoptotic molecule by binding to TRAIL and counteracting its death-promoting function. The reduction of DcR3 with siRNA unmasked TRAIL and greatly enhanced TRAIL-induced apoptosis. Gemcitabine, a first-line drug for pancreatic cancer, also reduced the level of DcR3. The addition of DcR3 siRNA further enhanced gemcitabine-induced apoptosis. Notably, our in vivo study demonstrated that the therapeutic effect of gemcitabine could be enhanced via further reduction of DcR3, suggesting that downregulation of DcR3 in tumor cells could tip the balance of pancreatic cells towards apoptosis and potentially serve as a new strategy for pancreatic cancer therapy.

  7. Clinical significance of serum decoy receptor 3 levels in patients with systemic sclerosis.

    PubMed

    Yamada, Daisuke; Asano, Yoshihide; Takahashi, Takehiro; Masui, Yuri; Aozasa, Naohiko; Akamata, Kaname; Noda, Shinji; Tamaki, Zenshiro; Tada, Yayoi; Sugaya, Makoto; Sato, Shinichi; Kadono, Takafumi

    2012-01-01

    Decoy receptor 3 (DcR3) is associated with autoimmunity and altered angiogenesis in certain pathological conditions. We herein measured serum DcR3 levels in 51 patients with systemic sclerosis (SSc) and 19 healthy controls and evaluated their clinical significance in this disorder. Serum DcR3 levels were significantly higher in diffuse cutaneous SSc (dcSSc) patients than in limited cutaneous SSc patients and in healthy controls. In dcSSc, serum DcR3 levels were significantly elevated in patients with disease duration of ≤6 years compared with healthy controls, but not in those with disease duration of >6 years. Serum DcR3 levels correlated negatively with the percentage of predicted diffusion lung capacity for carbon monoxide and positively with right ventricular systolic pressure. Furthermore, serum DcR3 levels positively correlated with C-reactive protein, erythrocyte sedimentation rate and immunoglobulin G. Collectively, the elevation of serum DcR3 levels is associated with the development of pulmonary arterial hypertension and systemic inflammation in SSc.

  8. Widespread long noncoding RNAs as endogenous target mimics for microRNAs in plants.

    PubMed

    Wu, Hua-Jun; Wang, Zhi-Min; Wang, Meng; Wang, Xiu-Jie

    2013-04-01

    Target mimicry is a recently identified regulatory mechanism for microRNA (miRNA) functions in plants in which the decoy RNAs bind to miRNAs via complementary sequences and therefore block the interaction between miRNAs and their authentic targets. Both endogenous decoy RNAs (miRNA target mimics) and engineered artificial RNAs can induce target mimicry effects. Yet until now, only the Induced by Phosphate Starvation1 RNA has been proven to be a functional endogenous microRNA target mimic (eTM). In this work, we developed a computational method and systematically identified intergenic or noncoding gene-originated eTMs for 20 conserved miRNAs in Arabidopsis (Arabidopsis thaliana) and rice (Oryza sativa). The predicted miRNA binding sites were well conserved among eTMs of the same miRNA, whereas sequences outside of the binding sites varied a lot. We proved that the eTMs of miR160 and miR166 are functional target mimics and identified their roles in the regulation of plant development. The effectiveness of eTMs for three other miRNAs was also confirmed by transient agroinfiltration assay.

  9. Advanced glycation end products are elevated in cystic fibrosis-related diabetes and correlate with worse lung function.

    PubMed

    Hunt, William R; Helfman, Beth R; McCarty, Nael A; Hansen, Jason M

    2016-09-01

    The onset of cystic fibrosis-related diabetes (CFRD) exacerbates lung function decline and increases mortality. One pathway that may worsen the lung dysfunction associated with CFRD is that of the receptor for advanced glycation end products (RAGE) and its ligands. Human plasma was obtained from age-matched healthy, CF and CFRD patients. Plasma RAGE ligands (i.e. advanced glycation end products, S100A12, and high-mobility group protein B1) and soluble RAGE (sRAGE) levels were measured. CFRD patients had elevated plasma levels of AGEs and S100A12. Soluble RAGE, a RAGE ligand decoy receptor, was not significantly different between groups. Plasma AGE levels and S100A12 levels had significantly negative correlations with FEV1. AGEs are significantly elevated in CFRD and correlate negatively with FEV1. CFRD patients did not have significant increases in the decoy sRAGE, suggesting there may be heightened binding and activation of RAGE in CFRD exacerbating activation of proinflammatory pathways. Copyright © 2015 European Cystic Fibrosis Society. Published by Elsevier B.V. All rights reserved.

  10. Proof-of-principle that a decoy virus protects oncolytic measles virus against neutralizing antibodies.

    PubMed

    Xu, Chun; Goß, Annika Verena; Dorneburg, Carmen; Debatin, Klaus-Michael; Wei, Jiwu; Beltinger, Christian

    2018-01-01

    Attenuated oncolytic measles virus (OMV) is a promising antitumor agent in early-phase clinical trials. However, pre-existing immunity against measles might be a hurdle for OMV therapy. OMV was inactivated with short-wavelength ultraviolet light (UV-C). Loss of replication and oncolytic activity of UV-inactivated OMV were confirmed by tissue culture infective dose 50 (TCID 50 ) assay using Vero cells and by flow cytometry using Jurkat cells. An enzyme-linked immunosorbent assay was performed to verify that UV-inactivated OMV remained antigenic. Different doses of UV-inactivated OMV were pre-cultured in media supplemented with measles immune serum. The mixture was transferred to Jurkat cells and active OMV was added. Active OMV-induced death of Jurkat cells was monitored by flow cytometry. UV-inactivation abrogates OMV replication while maintaining its antigenicity. UV-inactivated OMV sequesters pre-existing anti-MV antibodies in Jurkat cell culture, thereby protecting active OMV from neutralization and preserving oncolytic activity. We prove the principle that a non-replicating OMV can serve as a "decoy" for neutralizing anti-MV antibodies, thereby allowing antitumor activity of OMV.

  11. Evaluation and optimization of virtual screening workflows with DEKOIS 2.0--a public library of challenging docking benchmark sets.

    PubMed

    Bauer, Matthias R; Ibrahim, Tamer M; Vogel, Simon M; Boeckler, Frank M

    2013-06-24

    The application of molecular benchmarking sets helps to assess the actual performance of virtual screening (VS) workflows. To improve the efficiency of structure-based VS approaches, the selection and optimization of various parameters can be guided by benchmarking. With the DEKOIS 2.0 library, we aim to further extend and complement the collection of publicly available decoy sets. Based on BindingDB bioactivity data, we provide 81 new and structurally diverse benchmark sets for a wide variety of different target classes. To ensure a meaningful selection of ligands, we address several issues that can be found in bioactivity data. We have improved our previously introduced DEKOIS methodology with enhanced physicochemical matching, now including the consideration of molecular charges, as well as a more sophisticated elimination of latent actives in the decoy set (LADS). We evaluate the docking performance of Glide, GOLD, and AutoDock Vina with our data sets and highlight existing challenges for VS tools. All DEKOIS 2.0 benchmark sets will be made accessible at http://www.dekois.com.

  12. Compositional mining of multiple object API protocols through state abstraction.

    PubMed

    Dai, Ziying; Mao, Xiaoguang; Lei, Yan; Qi, Yuhua; Wang, Rui; Gu, Bin

    2013-01-01

    API protocols specify correct sequences of method invocations. Despite their usefulness, API protocols are often unavailable in practice because writing them is cumbersome and error prone. Multiple object API protocols are more expressive than single object API protocols. However, the huge number of objects of typical object-oriented programs poses a major challenge to the automatic mining of multiple object API protocols: besides maintaining scalability, it is important to capture various object interactions. Current approaches utilize various heuristics to focus on small sets of methods. In this paper, we present a general, scalable, multiple object API protocols mining approach that can capture all object interactions. Our approach uses abstract field values to label object states during the mining process. We first mine single object typestates as finite state automata whose transitions are annotated with states of interacting objects before and after the execution of the corresponding method and then construct multiple object API protocols by composing these annotated single object typestates. We implement our approach for Java and evaluate it through a series of experiments.

  13. Compositional Mining of Multiple Object API Protocols through State Abstraction

    PubMed Central

    Mao, Xiaoguang; Qi, Yuhua; Wang, Rui; Gu, Bin

    2013-01-01

    API protocols specify correct sequences of method invocations. Despite their usefulness, API protocols are often unavailable in practice because writing them is cumbersome and error prone. Multiple object API protocols are more expressive than single object API protocols. However, the huge number of objects of typical object-oriented programs poses a major challenge to the automatic mining of multiple object API protocols: besides maintaining scalability, it is important to capture various object interactions. Current approaches utilize various heuristics to focus on small sets of methods. In this paper, we present a general, scalable, multiple object API protocols mining approach that can capture all object interactions. Our approach uses abstract field values to label object states during the mining process. We first mine single object typestates as finite state automata whose transitions are annotated with states of interacting objects before and after the execution of the corresponding method and then construct multiple object API protocols by composing these annotated single object typestates. We implement our approach for Java and evaluate it through a series of experiments. PMID:23844378

  14. Quantum private comparison protocol based on the entanglement swapping between χ ^+ state and W-Class state

    NASA Astrophysics Data System (ADS)

    Xu, Ling; Zhao, Zhiwen

    2017-12-01

    Quantum private comparison (QPC) protocol, including Alice, Bob and the third party Charlie, aims at comparing Alice and Bob's secret inputs correctly without leaking them. Firstly, χ ^+ state and W-Class state are used to conduct the entanglement swapping in this protocol. Either the basis {|φ ^± > ,|ψ ^± >} or the basis {|χ ^± > ,|ω ^± > } is chosen by Alice and Bob based on the predetermined value to measure the particle pairs. And three bits of secret inputs can be compared in this protocol in every comparison time, while most of previous QPC protocols can only compare one or two bits. The qubit efficiency of this protocol is 60% more than others, which are 50% at most. Secondly, if the eavesdropper intends to obtain the secret inputs, it is important and primary to get the measurement results of particle pairs. In this protocol, even if the eavesdropper gets the accurate particle pairs, he cannot get the right measurement results without the right basis. Finally, this protocol is analyzed to be able to defend the secret inputs against various kinds of attack.

  15. Multilayer quantum secret sharing based on GHZ state and generalized Bell basis measurement in multiparty agents

    NASA Astrophysics Data System (ADS)

    Wang, Xiao-Jun; An, Long-Xi; Yu, Xu-Tao; Zhang, Zai-Chen

    2017-10-01

    A multilayer quantum secret sharing protocol based on GHZ state is proposed. Alice has the secret carried by quantum state and wants to distribute this secret to multiple agent nodes in the network. In this protocol, the secret is transmitted and shared layer by layer from root Alice to layered agents. The number of agents in each layer is a geometric sequence with a specific common ratio. By sharing GHZ maximally entangled states and making generalized Bell basis measurement, one qubit state can be distributed to multiparty agents and the secret is shared. Only when all agents at the last layer cooperate together, the secret can be recovered. Compared with other protocols based on the entangled state, this protocol adopts layered construction so that secret can be distributed to more agents with fewer particles GHZ state. This quantum secret sharing protocol can be used in wireless network to ensure the security of information delivery.

  16. In quantum direct communication an undetectable eavesdropper can always tell Ψ from Φ Bell states in the message mode

    NASA Astrophysics Data System (ADS)

    Pavičić, Mladen

    2013-04-01

    We show that in any quantum direct communication protocol that is based on Ψ and Φ Bell states, an eavesdropper can always tell Ψ from Φ states without altering the transmission in any way in the message mode. This renders all protocols that make use of only one Ψ state and one Φ state completely insecure in the message mode. All four-Bell-state protocols require a revision and this might be of importance for new implementations of entanglement-based cryptographic protocols. The detection rate of an eavesdropper is 25% per control transmission, i.e., a half of the rate in the two-state (ping-pong) protocol. An eavesdropper can detect control probes with certainty in the standard control transmission without a photon in the Alice-to-Bob's travel mode and with near certainty in a transmission with a fake photon in the travel mode. Resending of measured control photons via the travel mode would make an eavesdropper completely invisible.

  17. Bronzed cowbird taken in Florida

    USGS Publications Warehouse

    Matteson, R.E.

    1970-01-01

    On 8 November 1968 in Gainesville, Florida, I removed a male Bronzed Cowbird (Tangavius a. aeneus) from a blackbird decoy trap containing a large number of Brown-headed Cowbirds (Malothrus ater). Oliver L. Austin, Jr., at the Florida State Museum, verified the species identification by noting the notched inner webs of the outer three primaries, a characteristic of the genus. The subspecific identification was made at the U. S. National Museum where the bird is now specimen number 531666. The subspecies normally ranges from southcentral Texas and the Yucatan Peninsula south through Central America to Panama (Check-list of North American birds, fifth ed., Baltimore, Amer. Ornithol. Union, 1957, p. 542). This Gainesville specimen apparently is the first Bronzed Cow- bird taken in Florida. Alexander Sprunt, Jr., (Florida bird life. In Addendum to Florida bird life, New York, Coward-McCann, 1963, p. 18) lists three photographed sightings at Sarasota, Florida, in April 196

  18. Kloss gibbon (Hylobates klossii) behavior facilitates the avoidance of human predation in the Peleonan forest, Siberut Island, Indonesia.

    PubMed

    Dooley, Helen M; Judge, Debra S

    2015-03-01

    Kloss gibbons (Hylobates klossii) are endemic to the Mentawai Islands in Indonesia and have been subject to human predation for more than 2000 years in the absence of any other significant predators. We investigate the behavior of Kloss gibbons that may be attributed to avoiding human predation. We observed Kloss gibbons in the Peleonan forest in the north of Siberut Island, the northernmost of the Mentawai island chain, over 18 months in 2007 and 2008, and collected data on their singing behavior, the number of individuals present during different conditions and their responses to humans. We examine behaviors that may reduce the risk of predation by humans during singing (the most conspicuous gibbon behavior), daily non-singing activities and encounters with humans. The individual risk of being stalked by hunters is reduced by singing in same-sex choruses and the risk of successful capture by hunters during singing is reduced by singing less often during daylight hours and by leaving the location of male pre-dawn singing before full light (reducing the visual signal to hunters). Groups in the Peleonan also fission during non-singing daily activity and rarely engage in play or grooming, enhancing the crypticity of their monochromatic black pelage in the canopy. We also observed a coordinated response to the presence of humans, wherein one adult individual acted as a "decoy" by approaching and distracting human observers, while other group members fled silently in multiple directions. "Decoy" behavior occurred on 31% of 96 encounters with unhabituated Kloss gibbons that detected our presence. "Decoy" individuals may put themselves at risk to increase the survival of related immatures (and adult females with infants) who have a greater risk of predation. We argue that, in combination, these behaviors are an evolved response to a long history of predation by humans. © 2014 Wiley Periodicals, Inc.

  19. Decoy Wnt receptor (sLRP6E1E2)-expressing adenovirus induces anti-fibrotic effect via inhibition of Wnt and TGF-β signaling.

    PubMed

    Lee, Won Jai; Lee, Jung-Sun; Ahn, Hyo Min; Na, Youjin; Yang, Chae Eun; Lee, Ju Hee; Hong, JinWoo; Yun, Chae-Ok

    2017-11-08

    Aberrant activation of the canonical Wingless type (Wnt) signaling pathway plays a key role in the development of hypertrophic scars and keloids, and this aberrant activation of Wnt pathway can be a potential target for the development of novel anti-fibrotic agents. In this study, we evaluated the anti-fibrotic potential of a soluble Wnt decoy receptor (sLRP6E1E2)-expressing non-replicating adenovirus (Ad; dE1-k35/sLRP6E1E2) on human dermal fibroblasts (HDFs), keloid fibroblasts (KFs), and keloid tissue explants. Higher Wnt3a and β-catenin expression was observed in the keloid region compared to the adjacent normal tissues. The activity of β-catenin and mRNA expression of type-I and -III collagen were significantly decreased following treatment with dE1-k35/sLRP6E1E2 in HDFs and KFs. The expression of LRP6, β-catenin, phosphorylated glycogen synthase kinase 3 beta, Smad 2/3 complex, and TGF-β1 were decreased in Wnt3a- or TGF-β1-activated HDFs, following administration of dE1-k35/sLRP6E1E2. Moreover, dE1-k35/sLRP6E1E2 markedly inhibited nuclear translocation of both β-catenin and Smad 2/3 complex. The expression levels of type-I and -III collagen, fibronectin, and elastin were also significantly reduced in keloid tissue explants after treatment with dE1-k35/sLRP6E1E2. These results indicate that Wnt decoy receptor-expressing Ad can degrade extracellular matrix in HDFs, KFs, and primary keloid tissue explants, and thus it may be beneficial for treatment of keloids.

  20. A myostatin and activin decoy receptor enhances bone formation in mice.

    PubMed

    Bialek, P; Parkington, J; Li, X; Gavin, D; Wallace, C; Zhang, J; Root, A; Yan, G; Warner, L; Seeherman, H J; Yaworsky, P J

    2014-03-01

    Myostatin is a member of the bone morphogenetic protein/transforming growth factor-β (BMP/TGFβ) super-family of secreted differentiation factors. Myostatin is a negative regulator of muscle mass as shown by increased muscle mass in myostatin deficient mice. Interestingly, these mice also exhibit increased bone mass suggesting that myostatin may also play a role in regulating bone mass. To investigate the role of myostatin in bone, young adult mice were administered with either a myostatin neutralizing antibody (Mstn-mAb), a soluble myostatin decoy receptor (ActRIIB-Fc) or vehicle. While both myostatin inhibitors increased muscle mass, only ActRIIB-Fc increased bone mass. Bone volume fraction (BV/TV), as determined by microCT, was increased by 132% and 27% in the distal femur and lumbar vertebrae, respectively. Histological evaluation demonstrated that increased BV/TV in both locations was attributed to increased trabecular thickness, trabecular number and bone formation rate. Increased BV/TV resulted in enhanced vertebral maximum compressive force compared to untreated animals. The fact that ActRIIB-Fc, but not Mstn-mAb, increased bone volume suggested that this soluble decoy receptor may be binding a ligand other than myostatin, that plays a role in regulating bone mass. This was confirmed by the significant increase in BV/TV in myostatin deficient mice treated with ActRIIB-Fc. Of the other known ActRIIB-Fc ligands, BMP3 has been identified as a negative regulator of bone mass. However, BMP3 deficient mice treated with ActRIIB-Fc showed similar increases in BV/TV as wild type (WT) littermates treated with ActRIIB-Fc. This result suggests that BMP3 neutralization is not the mechanism responsible for increased bone mass. The results of this study demonstrate that ActRIIB-Fc increases both muscle and bone mass in mice. Therefore, a therapeutic that has this dual activity represents a potential approach for the treatment of frailty. Copyright © 2013 The Authors. Published by Elsevier Inc. All rights reserved.

  1. Decoy receptor 3 enhances tumor progression via induction of tumor-associated macrophages.

    PubMed

    Tai, Shyh-Kuan; Chang, Hsin-Chuan; Lan, Keng-Li; Lee, Chun-Ting; Yang, Chih-Ya; Chen, Nien-Jung; Chou, Teh-Ying; Tarng, Der-Cherng; Hsieh, Shie-Liang

    2012-03-01

    Tumor-associated macrophages (TAMs) are the major component of tumor-infiltrating leukocytes. TAMs are heterogeneous, with distinct phenotypes influenced by the microenvironment surrounding tumor tissues. Decoy receptor 3 (DcR3), a member of the TNFR superfamily, is overexpressed in tumor cells and is capable of modulating host immunity as either a neutralizing decoy receptor or an effector molecule. Upregulation of DcR3 has been observed to correlate with a poor prognosis in various cancers. However, the mechanisms underlying the DcR3-mediated tumor-promoting effect remain unclear. We previously demonstrated that DcR3 modulates macrophage activation toward an M2-like phenotype in vitro and that DcR3 downregulates MHC class II expression in TAMs via epigenetic control. To investigate whether DcR3 promotes tumor growth, CT26-DcR3 stable transfectants were established. Compared with the vector control clone, DcR3-transfectants grew faster and resulted in TAM infiltration. We further generated CD68 promoter-driven DcR3 transgenic (Tg) mice to investigate tumor growth in vivo. Compared with wild-type mice, macrophages isolated from DcR3-Tg mice displayed higher levels of IL-10, IL-1ra, Ym1, and arginase activity, whereas the expression of IL-12, TNF-α, IL-6, NO, and MHC class II was downregulated. Significantly enhanced tumor growth and spreading were observed in DcR3-Tg mice, and the enhanced tumor growth was abolished by arginase inhibitor N-ω-hydroxy-l-norarginine and histone deacetylase inhibitor sodium valproate. These results indicated that induction of TAMs is an important mechanism for DcR3-mediated tumor progression. Our findings also suggest that targeting DcR3 might help in the development of novel treatment strategies for tumors with high DcR3 expression.

  2. Targeting Toll-like receptor (TLR) signaling by Toll/interleukin-1 receptor (TIR) domain-containing adapter protein/MyD88 adapter-like (TIRAP/Mal)-derived decoy peptides.

    PubMed

    Couture, Leah A; Piao, Wenji; Ru, Lisa W; Vogel, Stefanie N; Toshchakov, Vladimir Y

    2012-07-13

    Toll/interleukin-1 receptor (TIR) domain-containing adapter protein/MyD88 adapter-like (TIRAP/Mal) is an adapter protein that facilitates recruitment of MyD88 to TLR4 and TLR2 signaling complexes. We previously generated a library of cell-permeating TLR4 TIR-derived decoy peptides fused to the translocating segment of the Drosophila Antennapedia homeodomain and examined each peptide for the ability to inhibit TLR4 signaling (Toshchakov, V. Y., Szmacinski, H., Couture, L. A., Lakowicz, J. R., and Vogel, S. N. (2011) J. Immunol. 186, 4819-4827). We have now expanded this study to test TIRAP decoy peptides. Five TIRAP peptides, TR3 (for TIRAP region 3), TR5, TR6, TR9, and TR11, inhibited LPS-induced cytokine mRNA expression and MAPK activation. Inhibition was confirmed at the protein level; select peptides abolished the LPS-induced cytokine production measured in cell culture 24 h after a single treatment. Two of the TLR4 inhibitory peptides, TR3 and TR6, also inhibited cytokine production induced by a TLR2/TLR1 agonist, S-(2,3-bis(palmitoyloxy)-(2R,2S)-propyl)-N-palmitoyl-(R)-Cys-Ser-Lys(4)-OH; however, a higher peptide concentration was required to achieve comparable inhibition of TLR2 versus TLR4 signaling. Two TLR4 inhibitory peptides, TR5 and TR6, were examined for the ability to inhibit TLR4-driven cytokine induction in mice. Pretreatment with either peptide significantly reduced circulating TNF-α and IL-6 in mice following LPS injection. This study has identified novel TLR inhibitory peptides that block cellular signaling at low micromolar concentrations in vitro and in vivo. Comparison of TLR4 inhibition by TLR4 and TIRAP TIR-derived peptides supports the view that structurally diverse regions mediate functional interactions of TIR domains.

  3. Efficacy of a Cell-Cycle Decoying Killer Adenovirus on 3-D Gelfoam®-Histoculture and Tumor-Sphere Models of Chemo-Resistant Stomach Carcinomatosis Visualized by FUCCI Imaging

    PubMed Central

    Yano, Shuya; Takehara, Kiyoto; Tazawa, Hiroshi; Kishimoto, Hiroyuki; Urata, Yasuo; Kagawa, Shunsuke; Fujiwara, Toshiyoshi; Hoffman, Robert M.

    2016-01-01

    Stomach cancer carcinomatosis peritonitis (SCCP) is a recalcitrant disease. The goal of the present study was to establish an in vitro-in vivo-like imageable model of SCCP to develop cell-cycle-based therapeutics of SCCP. We established 3-D Gelfoam® histoculture and tumor-sphere models of SCCP. FUCCI-expressing MKN-45 stomach cancer cells were transferred to express the fluorescence ubiquinized cell-cycle indicator (FUCCI). FUCCI-expressing MKN-45 cells formed spheres on agarose or on Gelfoam® grew into tumor-like structures with G0/G1 cancer cells in the center and S/G2 cancer cells located in the surface as indicated by FUCCI imaging when the cells fluoresced red or green, respectively. We treated FUCCI-expressing cancer cells forming SCCP tumors in Gelfoam® histoculture with OBP-301, cisplatinum (CDDP), or paclitaxel. CDDP or paclitaxel killed only cycling cancer cells and were ineffective against G1/G2 MKN-45 cells in tumors growing on Gelfoam®. In contrast, the telomerase-dependent adenovirus OBP-301 decoyed the MKN-45 cells in tumors on Gelfoam® to cycle from G0/G1 phase to S/G2 phase and reduced their viability. CDDP- or paclitaxel-treated MKN-45 tumors remained quiescent and did not change in size. In contrast, OB-301 reduced the size of the MKN-45 tumors on Gelfoam®. We examined the cell cycle-related proteins using Western blotting. CDDP increased the expression of p53 and p21 indicating cell cycle arrest. In contrast, OBP-301 decreased the expression of p53 and p21 Furthermore, OBP-301 increased the expression of E2F and pAkt as further indication of cell cycle decoy. This 3-D Gelfoam® histoculture and FUCCI imaging are powerful tools to discover effective therapy of SCCP such as OBP-301. PMID:27673332

  4. Bidirectional Controlled Quantum Communication by Using a Seven-Qubit Entangled State

    NASA Astrophysics Data System (ADS)

    Sang, Ming-huang; Li, Cong

    2018-03-01

    We propose a protocol for bidirectional controlled quantum communication by using a seven-qubit entangled state. In our protocol, Alice can teleport an arbitrary unknown two-qubit state to Bob, at the same time Bob can help Alice remotely prepares an arbitrary known single-qubit state. It is shown that, with the help of the controller Charlie, the total success probability of our protocol can reach 100%.

  5. Experimentally superposing two pure states with partial prior knowledge

    NASA Astrophysics Data System (ADS)

    Li, Keren; Long, Guofei; Katiyar, Hemant; Xin, Tao; Feng, Guanru; Lu, Dawei; Laflamme, Raymond

    2017-02-01

    Superposition, arguably the most fundamental property of quantum mechanics, lies at the heart of quantum information science. However, how to create the superposition of any two unknown pure states remains as a daunting challenge. Recently, it was proved that such a quantum protocol does not exist if the two input states are completely unknown, whereas a probabilistic protocol is still available with some prior knowledge about the input states [M. Oszmaniec et al., Phys. Rev. Lett. 116, 110403 (2016), 10.1103/PhysRevLett.116.110403]. The knowledge is that both of the two input states have nonzero overlaps with some given referential state. In this work, we experimentally realize the probabilistic protocol of superposing two pure states in a three-qubit nuclear magnetic resonance system. We demonstrate the feasibility of the protocol by preparing a families of input states, and the average fidelity between the prepared state and expected superposition state is over 99%. Moreover, we experimentally illustrate the limitation of the protocol that it is likely to fail or yields very low fidelity, if the nonzero overlaps are approaching zero. Our experimental implementation can be extended to more complex situations and other quantum systems.

  6. Two-qubit correlations revisited: average mutual information, relevant (and useful) observables and an application to remote state preparation

    NASA Astrophysics Data System (ADS)

    Giorda, Paolo; Allegra, Michele

    2017-07-01

    Understanding how correlations can be used for quantum communication protocols is a central goal of quantum information science. While many authors have linked the global measures of correlations such as entanglement or discord to the performance of specific protocols, in general the latter may require only correlations between specific observables. In this work, we first introduce a general measure of correlations for two-qubit states, based on the classical mutual information between local observables. Our measure depends on the state’s purity and the symmetry in the correlation distribution, according to which we provide a classification of maximally mixed marginal states (MMMS). We discuss the complementarity relation between correlations and coherence. By focusing on a simple yet paradigmatic example, i.e. the remote state preparation protocol, we introduce a method to systematically define the proper protocol-tailored measures of the correlations. The method is based on the identification of those correlations that are relevant (useful) for the protocol. On the one hand, the approach allows the role of the symmetry of the correlation distribution to be discussed in determining the efficiency of the protocol, both for MMMS and general two-qubit quantum states, and on the other hand, it allows an optimized protocol for non-MMMS to be devised, which is more efficient with respect to the standard one. Overall, our findings clarify how the key resources in simple communication protocols are the purity of the state used and the symmetry of the correlation distribution.

  7. Efficient simultaneous dense coding and teleportation with two-photon four-qubit cluster states

    NASA Astrophysics Data System (ADS)

    Zhang, Cai; Situ, Haozhen; Li, Qin; He, Guang Ping

    2016-08-01

    We firstly propose a simultaneous dense coding protocol with two-photon four-qubit cluster states in which two receivers can simultaneously get their respective classical information sent by a sender. Because each photon has two degrees of freedom, the protocol will achieve a high transmittance. The security of the simultaneous dense coding protocol has also been analyzed. Secondly, we investigate how to simultaneously teleport two different quantum states with polarization and path degree of freedom using cluster states to two receivers, respectively, and discuss its security. The preparation and transmission of two-photon four-qubit cluster states is less difficult than that of four-photon entangled states, and it has been experimentally generated with nearly perfect fidelity and high generation rate. Thus, our protocols are feasible with current quantum techniques.

  8. Relativistic quantum cryptography

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Molotkov, S. N., E-mail: molotkov@issp.ac.ru

    2011-03-15

    A new protocol of quantum key distribution is proposed to transmit keys through free space. Along with quantum-mechanical restrictions on the discernibility of nonorthogonal quantum states, the protocol uses additional restrictions imposed by special relativity theory. Unlike all existing quantum key distribution protocols, this protocol ensures key secrecy for a not strictly one-photon source of quantum states and an arbitrary length of a quantum communication channel.

  9. Quantum fingerprinting with coherent states and a constant mean number of photons

    NASA Astrophysics Data System (ADS)

    Arrazola, Juan Miguel; Lütkenhaus, Norbert

    2014-06-01

    We present a protocol for quantum fingerprinting that is ready to be implemented with current technology and is robust to experimental errors. The basis of our scheme is an implementation of the signal states in terms of a coherent state in a superposition of time-bin modes. Experimentally, this requires only the ability to prepare coherent states of low amplitude and to interfere them in a balanced beam splitter. The states used in the protocol are arbitrarily close in trace distance to states of O (log2n) qubits, thus exhibiting an exponential separation in abstract communication complexity compared to the classical case. The protocol uses a number of optical modes that is proportional to the size n of the input bit strings but a total mean photon number that is constant and independent of n. Given the expended resources, our protocol achieves a task that is provably impossible using classical communication only. In fact, even in the presence of realistic experimental errors and loss, we show that there exist a large range of input sizes for which our quantum protocol transmits an amount of information that can be more than two orders of magnitude smaller than a classical fingerprinting protocol.

  10. Effect of host decoys on the ability of the parasitoids Muscidifurax raptor and Spalangia cameroni to parasitize house fly (Diptera: Muscidae) puparia

    USDA-ARS?s Scientific Manuscript database

    The pteromalid pupal parasitoids Muscidifurax raptor Girault and Sanders and Spalangia cameroni Perkins (Hymenoptera: Pteromalidae) are commonly released on livestock farms for management of house flies (Diptera: Muscidae). To be effective, parasitoids must be able to locate live host puparia in co...

  11. New York City Police Department Street Crime Unit: An Exemplary Project.

    ERIC Educational Resources Information Center

    Halper, Andrew; Ku, Richard

    The document presents a description of the policies and procedures of the New York City Street Crime Unit (SCU) which conducts street surveillance and decoy activities. The organization and administrative structure of the SCU is studied according to the size of a unit and the chain of command requirements. The SCU's methods for selecting and…

  12. Quality monitored distributed voting system

    DOEpatents

    Skogmo, David

    1997-01-01

    A quality monitoring system can detect certain system faults and fraud attempts in a distributed voting system. The system uses decoy voters to cast predetermined check ballots. Absent check ballots can indicate system faults. Altered check ballots can indicate attempts at counterfeiting votes. The system can also cast check ballots at predetermined times to provide another check on the distributed voting system.

  13. GOOSE CAM: The Development of a Practical Underwater Exploration Platform

    ERIC Educational Resources Information Center

    Miller, William R.; Mitchell, Colleen; Miller, Jeffrey D.

    2009-01-01

    We challenged an Aquatic Biology class to find a way to access, observe, and record aquatic habitats and organisms without causing disruption. Using off the shelf components the class was guided in the design and assembly of a remote controlled, video broadcasting, data collecting, floating vehicle based on a molded goose decoy. GOOSE-CAM or…

  14. Defense Industrial Base Capabilities Study: Protection

    DTIC Science & Technology

    2004-12-01

    Polyurethane Foam (RPF). 2) The Department should establish an Industrial Base Investment Fund to provide better on-ramps for production-ready...Sweep; − Rigid Polyurethane Foam (RPF). RECOMMENDATION 2 The Department should establish an Industrial Base Investment Fund (IBIF) to provide...Reactive RF Jamming 15. Expendable Programmable Acoustic Decoy 16. Rigid Polyurethane Foam 17. Towed Fabric Balloon Pressure Sweep 18. Chemical

  15. Unconditional security of a three state quantum key distribution protocol.

    PubMed

    Boileau, J-C; Tamaki, K; Batuwantudawe, J; Laflamme, R; Renes, J M

    2005-02-04

    Quantum key distribution (QKD) protocols are cryptographic techniques with security based only on the laws of quantum mechanics. Two prominent QKD schemes are the Bennett-Brassard 1984 and Bennett 1992 protocols that use four and two quantum states, respectively. In 2000, Phoenix et al. proposed a new family of three-state protocols that offers advantages over the previous schemes. Until now, an error rate threshold for security of the symmetric trine spherical code QKD protocol has been shown only for the trivial intercept-resend eavesdropping strategy. In this Letter, we prove the unconditional security of the trine spherical code QKD protocol, demonstrating its security up to a bit error rate of 9.81%. We also discuss how this proof applies to a version of the trine spherical code QKD protocol where the error rate is evaluated from the number of inconclusive events.

  16. Gaussian error correction of quantum states in a correlated noisy channel.

    PubMed

    Lassen, Mikael; Berni, Adriano; Madsen, Lars S; Filip, Radim; Andersen, Ulrik L

    2013-11-01

    Noise is the main obstacle for the realization of fault-tolerant quantum information processing and secure communication over long distances. In this work, we propose a communication protocol relying on simple linear optics that optimally protects quantum states from non-Markovian or correlated noise. We implement the protocol experimentally and demonstrate the near-ideal protection of coherent and entangled states in an extremely noisy channel. Since all real-life channels are exhibiting pronounced non-Markovian behavior, the proposed protocol will have immediate implications in improving the performance of various quantum information protocols.

  17. Six-State Quantum Key Distribution Using Photons with Orbital Angular Momentum

    NASA Astrophysics Data System (ADS)

    Li, Jun-Lin; Wang, Chuan

    2010-11-01

    A new implementation of high-dimensional quantum key distribution (QKD) protocol is discussed. Using three mutual unbiased bases, we present a d-level six-state QKD protocol that exploits the orbital angular momentum with the spatial mode of the light beam. The protocol shows that the feature of a high capacity since keys are encoded using photon modes in d-level Hilbert space. The devices for state preparation and measurement are also discussed. This protocol has high security and the alignment of shared reference frames is not needed between sender and receiver.

  18. Reestablishment of an Unknown State and Its Orthogonal Complement State with Assistance

    NASA Astrophysics Data System (ADS)

    Chen, Ai-Xi; Wu, Shu-Dong

    2003-12-01

    In this paper, we propose a protocol where one can realize reestablishment of an unknown state and its orthogonal complement state with a certain probability. In the first stage of the protocol, teleportation is performed between Alice (a sender) and Bob (a receiver) through a nonmaximally entangled quantum channel. In the process of teleportation, Alice performs nonmaximally entangled state measurement. In the second stage of the protocol, Victor (a state preparer) disentangles leftover nonmaximally entangled states by a single-particle measurement. With the assistance of Victor Alice can reestablish the original state or produce its orthogonal state. The project partially supported by National Natural Science Foundation of China under Grant Nos. 90103026 and 60078023

  19. Bidirectional teleportation of a pure EPR state by using GHZ states

    NASA Astrophysics Data System (ADS)

    Hassanpour, Shima; Houshmand, Monireh

    2016-02-01

    In the present paper, a novel bidirectional quantum teleportation protocol is proposed. By using entanglement swapping technique, two GHZ states are shared as a quantum channel between Alice and Bob as legitimate users. In this scheme, based on controlled-not operation, single-qubit measurement, and appropriate unitary operations, two users can simultaneously transmit a pure EPR state to each other, While, in the previous protocols, the users can just teleport a single-qubit state to each other via more than four-qubit state. Therefore, the proposed scheme is economical compared with previous protocols.

  20. Security of two-state and four-state practical quantum bit-commitment protocols

    NASA Astrophysics Data System (ADS)

    Loura, Ricardo; Arsenović, Dušan; Paunković, Nikola; Popović, Duška B.; Prvanović, Slobodan

    2016-12-01

    We study cheating strategies against a practical four-state quantum bit-commitment protocol [A. Danan and L. Vaidman, Quant. Info. Proc. 11, 769 (2012)], 10.1007/s11128-011-0284-4 and its two-state variant [R. Loura et al., Phys. Rev. A 89, 052336 (2014)], 10.1103/PhysRevA.89.052336 when the underlying quantum channels are noisy and the cheating party is constrained to using single-qubit measurements only. We show that simply inferring the transmitted photons' states by using the Breidbart basis, optimal for ambiguous (minimum-error) state discrimination, does not directly produce an optimal cheating strategy for this bit-commitment protocol. We introduce a strategy, based on certain postmeasurement processes and show it to have better chances at cheating than the direct approach. We also study to what extent sending forged geographical coordinates helps a dishonest party in breaking the binding security requirement. Finally, we investigate the impact of imperfect single-photon sources in the protocols. Our study shows that, in terms of the resources used, the four-state protocol is advantageous over the two-state version. The analysis performed can be straightforwardly generalized to any finite-qubit measurement, with the same qualitative results.

  1. Incorporation of aptamers in the terminal loop of shRNAs yields an effective and novel combinatorial targeting strategy.

    PubMed

    Pang, Ka Ming; Castanotto, Daniela; Li, Haitang; Scherer, Lisa; Rossi, John J

    2018-01-09

    Gene therapy by engineering patient's own blood cells to confer HIV resistance can potentially lead to a functional cure for AIDS. Toward this goal, we have previously developed an anti-HIV lentivirus vector that deploys a combination of shRNA, ribozyme and RNA decoy. To further improve this therapeutic vector against viral escape, we sought an additional reagent to target HIV integrase. Here, we report the development of a new strategy for selection and expression of aptamer for gene therapy. We developed a SELEX protocol (multi-tag SELEX) for selecting RNA aptamers against proteins with low solubility or stability, such as integrase. More importantly, we expressed these aptamers in vivo by incorporating them in the terminal loop of shRNAs. This novel strategy allowed efficient expression of the shRNA-aptamer fusions that targeted RNAs and proteins simultaneously. Expressed shRNA-aptamer fusions targeting HIV integrase or reverse transcriptase inhibited HIV replication in cell cultures. Viral inhibition was further enhanced by combining an anti-integrase aptamer with an anti-HIV Tat-Rev shRNA. This construct exhibited efficacy comparable to that of integrase inhibitor Raltegravir. Our strategy for the selection and expression of RNA aptamers can potentially extend to other gene therapy applications. © The Author(s) 2017. Published by Oxford University Press on behalf of Nucleic Acids Research.

  2. Enrichment assessment of multiple virtual screening strategies for Toll-like receptor 8 agonists based on a maximal unbiased benchmarking data set.

    PubMed

    Pei, Fen; Jin, Hongwei; Zhou, Xin; Xia, Jie; Sun, Lidan; Liu, Zhenming; Zhang, Liangren

    2015-11-01

    Toll-like receptor 8 agonists, which activate adaptive immune responses by inducing robust production of T-helper 1-polarizing cytokines, are promising candidates for vaccine adjuvants. As the binding site of toll-like receptor 8 is large and highly flexible, virtual screening by individual method has inevitable limitations; thus, a comprehensive comparison of different methods may provide insights into seeking effective strategy for the discovery of novel toll-like receptor 8 agonists. In this study, the performance of knowledge-based pharmacophore, shape-based 3D screening, and combined strategies was assessed against a maximum unbiased benchmarking data set containing 13 actives and 1302 decoys specialized for toll-like receptor 8 agonists. Prior structure-activity relationship knowledge was involved in knowledge-based pharmacophore generation, and a set of antagonists was innovatively used to verify the selectivity of the selected knowledge-based pharmacophore. The benchmarking data set was generated from our recently developed 'mubd-decoymaker' protocol. The enrichment assessment demonstrated a considerable performance through our selected three-layer virtual screening strategy: knowledge-based pharmacophore (Phar1) screening, shape-based 3D similarity search (Q4_combo), and then a Gold docking screening. This virtual screening strategy could be further employed to perform large-scale database screening and to discover novel toll-like receptor 8 agonists. © 2015 John Wiley & Sons A/S.

  3. Pharmacophore-Based Similarity Scoring for DOCK

    PubMed Central

    2015-01-01

    Pharmacophore modeling incorporates geometric and chemical features of known inhibitors and/or targeted binding sites to rationally identify and design new drug leads. In this study, we have encoded a three-dimensional pharmacophore matching similarity (FMS) scoring function into the structure-based design program DOCK. Validation and characterization of the method are presented through pose reproduction, crossdocking, and enrichment studies. When used alone, FMS scoring dramatically improves pose reproduction success to 93.5% (∼20% increase) and reduces sampling failures to 3.7% (∼6% drop) compared to the standard energy score (SGE) across 1043 protein–ligand complexes. The combined FMS+SGE function further improves success to 98.3%. Crossdocking experiments using FMS and FMS+SGE scoring, for six diverse protein families, similarly showed improvements in success, provided proper pharmacophore references are employed. For enrichment, incorporating pharmacophores during sampling and scoring, in most cases, also yield improved outcomes when docking and rank-ordering libraries of known actives and decoys to 15 systems. Retrospective analyses of virtual screenings to three clinical drug targets (EGFR, IGF-1R, and HIVgp41) using X-ray structures of known inhibitors as pharmacophore references are also reported, including a customized FMS scoring protocol to bias on selected regions in the reference. Overall, the results and fundamental insights gained from this study should benefit the docking community in general, particularly researchers using the new FMS method to guide computational drug discovery with DOCK. PMID:25229837

  4. Improvement of "Novel Multiparty Quantum Key Agreement Protocol with GHZ States"

    NASA Astrophysics Data System (ADS)

    Gu, Jun; Hwang, Tzonelih

    2017-10-01

    Quantum key agreement (QKA) protocol is a method for negotiating a fair and secure key among mutually untrusted participants. Recently, Xu et al. (Quantum Inf. Process. 13:2587-2594, 2014) proposed a multi-party QKA protocol based on Greenberger-Horne-Zeilinger (GHZ) states. However, this study points out that Xu et al.'s protocol cannot provide the fairness property. That is, the last involved participant in the protocol can manipulate the final shared secret key without being detected by the other participants. Moreover, according to Yu et al.'s research (2015), Xu et al.'s protocol cannot avoid the public discussion attack too. To avoid these weaknesses, an improved QKA protocol is proposed.

  5. State-dependent decisions cause apparent violations of rationality in animal choice.

    PubMed

    Schuck-Paim, Cynthia; Pompilio, Lorena; Kacelnik, Alex

    2004-12-01

    Normative models of choice in economics and biology usually expect preferences to be consistent across contexts, or "rational" in economic language. Following a large body of literature reporting economically irrational behaviour in humans, breaches of rationality by animals have also been recently described. If proven systematic, these findings would challenge long-standing biological approaches to behavioural theorising, and suggest that cognitive processes similar to those claimed to cause irrationality in humans can also hinder optimality approaches to modelling animal preferences. Critical differences between human and animal experiments have not, however, been sufficiently acknowledged. While humans can be instructed conceptually about the choice problem, animals need to be trained by repeated exposure to all contingencies. This exposure often leads to differences in state between treatments, hence changing choices while preserving rationality. We report experiments with European starlings demonstrating that apparent breaches of rationality can result from state-dependence. We show that adding an inferior alternative to a choice set (a "decoy") affects choices, an effect previously interpreted as indicating irrationality. However, these effects appear and disappear depending on whether state differences between choice contexts are present or not. These results open the possibility that some expressions of maladaptive behaviour are due to oversights in the migration of ideas between economics and biology, and suggest that key differences between human and nonhuman research must be recognised if ideas are to safely travel between these fields.

  6. Phase estimation of coherent states with a noiseless linear amplifier

    NASA Astrophysics Data System (ADS)

    Assad, Syed M.; Bradshaw, Mark; Lam, Ping Koy

    Amplification of quantum states is inevitably accompanied with the introduction of noise at the output. For protocols that are probabilistic with heralded success, noiseless linear amplification in theory may still be possible. When the protocol is successful, it can lead to an output that is a noiselessly amplified copy of the input. When the protocol is unsuccessful, the output state is degraded and is usually discarded. Probabilistic protocols may improve the performance of some quantum information protocols, but not for metrology if the whole statistics is taken into consideration. We calculate the precision limits on estimating the phase of coherent states using a noiseless linear amplifier by computing its quantum Fisher information and we show that on average, the noiseless linear amplifier does not improve the phase estimate. We also discuss the case where abstention from measurement can reduce the cost for estimation.

  7. Deception Using an SSH Honeypot

    DTIC Science & Technology

    2017-09-01

    the device itself but also the device’s cloud and mobile infrastructure. This increase in unsecured devices connected to the Internet presents...have SSH enabled on their systems without knowledge that this service is running. Computer -security professionals use several techniques to gain...early 2000s. Honeypots are decoy computer systems intended for no other purpose than to collect data on attackers. They gather information about

  8. Quality monitored distributed voting system

    DOEpatents

    Skogmo, D.

    1997-03-18

    A quality monitoring system can detect certain system faults and fraud attempts in a distributed voting system. The system uses decoy voters to cast predetermined check ballots. Absent check ballots can indicate system faults. Altered check ballots can indicate attempts at counterfeiting votes. The system can also cast check ballots at predetermined times to provide another check on the distributed voting system. 6 figs.

  9. Air Force Technical Objective Document, FY89.

    DTIC Science & Technology

    1988-04-01

    threat warning; multimegawatt stand-off jammers; a family of new, broadband , active decoy expendables; E4? subsystems and EW suites for Military...and monolithic integrated circuits. (3) Microwave TWTs Develop microwave tube technology and selected thermionic power sources and amplifiers for ECM...Improved design reliability and multiple application of tube technology are stressed. Improve Traveling Wave Tube ( TWT ) reliability by instrumenting a TWT

  10. How Intrusion Detection Can Improve Software Decoy Applications

    DTIC Science & Technology

    2003-03-01

    THIS PAGE INTENTIONALLY LEFT BLANK 41 V. DISCUSSION Military history suggests it is best to employ a layered, defense-in...database: alert, postgresql , user=snort dbname=snort # output database: log, unixodbc, user=snort dbname=snort # output database: log, mssql, dbname...Threat Monitoring and Surveillance, James P. Anderson Co., Fort Washington. PA, April 1980. URL http://csrc.nist.gov/publications/ history /ande80

  11. Practical single-photon-assisted remote state preparation with non-maximally entanglement

    NASA Astrophysics Data System (ADS)

    Wang, Dong; Huang, Ai-Jun; Sun, Wen-Yang; Shi, Jia-Dong; Ye, Liu

    2016-08-01

    Remote state preparation (RSP) and joint remote state preparation (JRSP) protocols for single-photon states are investigated via linear optical elements with partially entangled states. In our scheme, by choosing two-mode instances from a polarizing beam splitter, only the sender in the communication protocol needs to prepare an ancillary single-photon and operate the entanglement preparation process in order to retrieve an arbitrary single-photon state from a photon pair in partially entangled state. In the case of JRSP, i.e., a canonical model of RSP with multi-party, we consider that the information of the desired state is split into many subsets and in prior maintained by spatially separate parties. Specifically, with the assistance of a single-photon state and a three-photon entangled state, it turns out that an arbitrary single-photon state can be jointly and remotely prepared with certain probability, which is characterized by the coefficients of both the employed entangled state and the target state. Remarkably, our protocol is readily to extend to the case for RSP and JRSP of mixed states with the all optical means. Therefore, our protocol is promising for communicating among optics-based multi-node quantum networks.

  12. The TL1A/DR3/DcR3 pathway in autoimmune rheumatic diseases.

    PubMed

    Siakavellas, Spyros I; Sfikakis, Petros P; Bamias, Giorgos

    2015-08-01

    TNF-like cytokine 1A (TL1A) and its receptors, death receptor 3 (DR3) and decoy receptor 3 (DcR3) are members of the TNF and TNF receptor superfamilies of proteins, respectively. They constitute a cytokine system that actively interferes with the regulation of immune responses and may participate in the pathogenesis of autoimmune diseases. This review aims to present the current knowledge on the role of the TL1A/DR3/DcR3 system in the pathophysiology of autoimmune rheumatic diseases, with a focus on rheumatoid arthritis (RA). An extensive literature search was performed in the PubMed database using the following keywords: TL1A, death receptor 3, DR3, decoy receptor 3, DcR3, TNFSF15, TNFRSF25, and TNFSF6B. Studies were assessed and selected in view of their relevance to autoimmune rheumatic diseases. The TL1A/DR3/DcR3 axis is a novel immune pathway that participates in the pathogenesis of a variety of autoimmune rheumatic diseases. These molecules may be promising therapeutic targets for inflammatory arthritis. Copyright © 2015 Elsevier Inc. All rights reserved.

  13. Effects of feral cats on the evolution of anti-predator behaviours in island reptiles: insights from an ancient introduction.

    PubMed

    Li, Binbin; Belasen, Anat; Pafilis, Panayiotis; Bednekoff, Peter; Foufopoulos, Johannes

    2014-08-07

    Exotic predators have driven the extinction of many island species. We examined impacts of feral cats on the abundance and anti-predator behaviours of Aegean wall lizards in the Cyclades (Greece), where cats were introduced thousands of years ago. We compared populations with high and low cat density on Naxos Island and populations on surrounding islets with no cats. Cats reduced wall lizard populations by half. Lizards facing greater risk from cats stayed closer to refuges, were more likely to shed their tails in a standardized assay, and fled at greater distances when approached by either a person in the field or a mounted cat decoy in the laboratory. All populations showed phenotypic plasticity in flight initiation distance, suggesting that this feature is ancient and could have helped wall lizards survive the initial introduction of cats to the region. Lizards from islets sought shelter less frequently and often initially approached the cat decoy. These differences reflect changes since islet isolation and could render islet lizards strongly susceptible to cat predation. © 2014 The Author(s) Published by the Royal Society. All rights reserved.

  14. Decoy receptors block TRAIL sensitivity at a supracellular level: the role of stromal cells in controlling tumour TRAIL sensitivity.

    PubMed

    O'Leary, L; van der Sloot, A M; Reis, C R; Deegan, S; Ryan, A E; Dhami, S P S; Murillo, L S; Cool, R H; Correa de Sampaio, P; Thompson, K; Murphy, G; Quax, W J; Serrano, L; Samali, A; Szegezdi, E

    2016-03-10

    Tumour necrosis factor-related apoptosis-inducing ligand (TRAIL) is a death ligand cytokine known for its cytotoxic activity against malignantly transformed cells. TRAIL induces cell death through binding to death receptors DR4 and DR5. The inhibitory decoy receptors (DcR1 and DcR2) co-expressed with death receptor 4 (DR4)/DR5 on the same cell can block the transmission of the apoptotic signal. Here, we show that DcRs also regulate TRAIL sensitivity at a supracellular level and thus represent a mechanism by which the microenvironment can diminish tumour TRAIL sensitivity. Mathematical modelling and layered or spheroid stroma-extracellular matrix-tumour cultures were used to model the tumour microenvironment. By engineering TRAIL to escape binding by DcRs, we found that DcRs do not only act in a cell-autonomous or cis-regulatory manner, but also exert trans-cellular regulation originating from stromal cells and affect tumour cells, highlighting the potent inhibitory effect of DcRs in the tumour tissue and the necessity of selective targeting of the two death-inducing TRAIL receptors to maximise efficacy.

  15. Modeling the suppression of sea lamprey populations by use of the male sex pheromone

    USGS Publications Warehouse

    Klassen, Waldemar; Adams, Jean V.; Twohey, Michael B.

    2005-01-01

    The suppression of sea lamprey populations, Petromyzon marinus (Linnaeus), was modeled using four different applications of the male sex pheromone: (1) pheromone-baited traps that remove females from the spawning population, (2) pheromone-baited decoys that exhaust females before they are able to spawn, (3) pheromone-enhanced sterile males that increase the proportion of non-fertile matings, and (4) camouflaging of the pheromone emitted by calling males to make it difficult for females to find a mate. The models indicated that thousands of traps or hundreds of thousands of decoys would be required to suppress a population of 100,000 animals. The potential efficacy of pheromone camouflages is largely unknown, and additional research is required to estimate how much pheromone is needed to camouflage the pheromone plumes of calling males. Pheromone-enhanced sterile males appear to be a promising application in the Great Lakes. Using this technique for three generations each of ca. 7 years duration could reduce sea lamprey populations by 90% for Lakes Huron and Ontario and by 98% for Lake Michigan, based on current trapping operations that capture 20 to 30% of the population each year.

  16. VEGF-Trap: a VEGF blocker with potent antitumor effects.

    PubMed

    Holash, Jocelyn; Davis, Sam; Papadopoulos, Nick; Croll, Susan D; Ho, Lillian; Russell, Michelle; Boland, Patricia; Leidich, Ray; Hylton, Donna; Burova, Elena; Ioffe, Ella; Huang, Tammy; Radziejewski, Czeslaw; Bailey, Kevin; Fandl, James P; Daly, Tom; Wiegand, Stanley J; Yancopoulos, George D; Rudge, John S

    2002-08-20

    Vascular endothelial growth factor (VEGF) plays a critical role during normal embryonic angiogenesis and also in the pathological angiogenesis that occurs in a number of diseases, including cancer. Initial attempts to block VEGF by using a humanized monoclonal antibody are beginning to show promise in human cancer patients, underscoring the importance of optimizing VEGF blockade. Previous studies have found that one of the most effective ways to block the VEGF-signaling pathway is to prevent VEGF from binding to its normal receptors by administering decoy-soluble receptors. The highest-affinity VEGF blocker described to date is a soluble decoy receptor created by fusing the first three Ig domains of VEGF receptor 1 to an Ig constant region; however, this fusion protein has very poor in vivo pharmacokinetic properties. By determining the requirements to maintain high affinity while extending in vivo half life, we were able to engineer a very potent high-affinity VEGF blocker that has markedly enhanced pharmacokinetic properties. This VEGF-Trap effectively suppresses tumor growth and vascularization in vivo, resulting in stunted and almost completely avascular tumors. VEGF-Trap-mediated blockade may be superior to that achieved by other agents, such as monoclonal antibodies targeted against the VEGF receptor.

  17. Improvements to the ShipIR/NTCS adaptive track gate algorithm and 3D flare particle model

    NASA Astrophysics Data System (ADS)

    Ramaswamy, Srinivasan; Vaitekunas, David A.; Gunter, Willem H.; February, Faith J.

    2017-05-01

    A key component in any image-based tracking system is the adaptive tracking algorithm used to segment the image into potential targets, rank-and-select the best candidate target, and gate the selected target to further improve tracker performance. Similarly, a key component in any soft-kill response to an incoming guided missile is the flare/chaff decoy used to distract or seduce the seeker homing system away from the naval platform. This paper describes the recent improvements to the naval threat countermeasure simulator (NTCS) of the NATO-standard ship signature model (ShipIR). Efforts to analyse and match the 3D flare particle model against actual IR measurements of the Chemring TALOS IR round resulted in further refinement of the 3D flare particle distribution. The changes in the flare model characteristics were significant enough to require an overhaul to the adaptive track gate (ATG) algorithm in the way it detects the presence of flare decoys and reacquires the target after flare separation. A series of test scenarios are used to demonstrate the impact of the new flare and ATG on IR tactics simulation.

  18. Significance of decoy receptor 3 (Dcr3) and external-signal regulated kinase 1/2 (Erk1/2) in gastric cancer.

    PubMed

    Yang, Donghai; Fan, Xin; Yin, Ping; Wen, Qiang; Yan, Feng; Yuan, Sibo; Liu, Bin; Zhuang, Guohong; Liu, Zhongchen

    2012-06-06

    Decoy receptor 3 (DcR3), a member of the tumor necrosis factor receptor (TNFR) superfamily, is associated with anti-tumor immunity suppression. It is highly expressed in many tumors, and its expression can be regulated by the MAPK/MEK/ERK signaling pathway. The MAPK/MEK/ERK pathway has been reported to be a regulator in tumor occurrence, development and clonal expansion. External-signal regulated kinase (ERK) is a vital member of this pathway. The expression of DcR3 and ERK1/2 in tumor tissues of gastric cancer patients was significantly higher than the non-cancerous group (P < 0.05). There was no statistical difference among tumor tissues from patients with different ages or gender, and even of different differentiation (P > 0.05). However, in patients with stage I gastric cancer, the DcR3 and ERK1/2 levels were significantly lower than patients with more advanced stages. DcR3 and ERK1/2 play a vital role in the development of gastric cancer, and they may be new markers for indicating the efficiency of gastric cancer treatment in the future.

  19. The combination of decoy receptor 3 and soluble triggering receptor expressed on myeloid cells-1 for the diagnosis of nosocomial bacterial meningitis.

    PubMed

    Liu, Yong-Juan; Shao, Li-Hua; Zhang, Jian; Fu, Shan-Ji; Wang, Gang; Chen, Feng-Zhe; Zheng, Feng; Ma, Rui-Ping; Liu, Hai-Hong; Dong, Xiao-Meng; Ma, Li-Xian

    2015-03-23

    Early diagnosis and appropriate antibiotic treatment can significantly reduce mortality of nosocomial bacterial meningitis. However, it is a challenge for clinicians to make an accurate and rapid diagnosis of bacterial meningitis. This study aimed at determining whether combined biomarkers can provide a useful tool for the diagnosis of bacterial meningitis. A retrospective study was carried out. Cerebrospinal fluid (CSF) levels of decoy receptor 3 (DcR3) and soluble triggering receptor expressed on myeloid cells-1 (sTREM-1) were detected by enzyme-linked immunosorbent assay (ELISA). The patients with bacterial meningitis had significantly elevated levels of the above mentioned biomarkers. The two biomarkers were all risk factors with bacterial meningitis. The biomarkers were constructed into a "bioscore". The discriminative performance of the bioscore was better than that of each biomarker, with an area under the receiver operating characteristic (ROC) curve (AUC) of 0.842 (95% confidence intervals (CI) 0.770-0.914; p< 0.001). Combined measurement of CSF DcR3 and sTREM-1 concentrations improved the prediction of nosocomial bacterial meningitis. The combined strategy is of interest and the validation of that improvement needs further studies.

  20. Widespread Long Noncoding RNAs as Endogenous Target Mimics for MicroRNAs in Plants1[W

    PubMed Central

    Wu, Hua-Jun; Wang, Zhi-Min; Wang, Meng; Wang, Xiu-Jie

    2013-01-01

    Target mimicry is a recently identified regulatory mechanism for microRNA (miRNA) functions in plants in which the decoy RNAs bind to miRNAs via complementary sequences and therefore block the interaction between miRNAs and their authentic targets. Both endogenous decoy RNAs (miRNA target mimics) and engineered artificial RNAs can induce target mimicry effects. Yet until now, only the Induced by Phosphate Starvation1 RNA has been proven to be a functional endogenous microRNA target mimic (eTM). In this work, we developed a computational method and systematically identified intergenic or noncoding gene-originated eTMs for 20 conserved miRNAs in Arabidopsis (Arabidopsis thaliana) and rice (Oryza sativa). The predicted miRNA binding sites were well conserved among eTMs of the same miRNA, whereas sequences outside of the binding sites varied a lot. We proved that the eTMs of miR160 and miR166 are functional target mimics and identified their roles in the regulation of plant development. The effectiveness of eTMs for three other miRNAs was also confirmed by transient agroinfiltration assay. PMID:23429259

  1. Practical quantum appointment scheduling

    NASA Astrophysics Data System (ADS)

    Touchette, Dave; Lovitz, Benjamin; Lütkenhaus, Norbert

    2018-04-01

    We propose a protocol based on coherent states and linear optics operations for solving the appointment-scheduling problem. Our main protocol leaks strictly less information about each party's input than the optimal classical protocol, even when considering experimental errors. Along with the ability to generate constant-amplitude coherent states over two modes, this protocol requires the ability to transfer these modes back-and-forth between the two parties multiple times with very low losses. The implementation requirements are thus still challenging. Along the way, we develop tools to study quantum information cost of interactive protocols in the finite regime.

  2. Fault-tolerant quantum blind signature protocols against collective noise

    NASA Astrophysics Data System (ADS)

    Zhang, Ming-Hui; Li, Hui-Fang

    2016-10-01

    This work proposes two fault-tolerant quantum blind signature protocols based on the entanglement swapping of logical Bell states, which are robust against two kinds of collective noises: the collective-dephasing noise and the collective-rotation noise, respectively. Both of the quantum blind signature protocols are constructed from four-qubit decoherence-free (DF) states, i.e., logical Bell qubits. The initial message is encoded on the logical Bell qubits with logical unitary operations, which will not destroy the anti-noise trait of the logical Bell qubits. Based on the fundamental property of quantum entanglement swapping, the receiver simply performs two Bell-state measurements (rather than four-qubit joint measurements) on the logical Bell qubits to verify the signature, which makes the protocols more convenient in a practical application. Different from the existing quantum signature protocols, our protocols can offer the high fidelity of quantum communication with the employment of logical qubits. Moreover, we hereinafter prove the security of the protocols against some individual eavesdropping attacks, and we show that our protocols have the characteristics of unforgeability, undeniability and blindness.

  3. Quantum-key-distribution protocol with pseudorandom bases

    NASA Astrophysics Data System (ADS)

    Trushechkin, A. S.; Tregubov, P. A.; Kiktenko, E. O.; Kurochkin, Y. V.; Fedorov, A. K.

    2018-01-01

    Quantum key distribution (QKD) offers a way for establishing information-theoretical secure communications. An important part of QKD technology is a high-quality random number generator for the quantum-state preparation and for post-processing procedures. In this work, we consider a class of prepare-and-measure QKD protocols, utilizing additional pseudorandomness in the preparation of quantum states. We study one of such protocols and analyze its security against the intercept-resend attack. We demonstrate that, for single-photon sources, the considered protocol gives better secret key rates than the BB84 and the asymmetric BB84 protocols. However, the protocol strongly requires single-photon sources.

  4. Squeezed-state quantum key distribution with a Rindler observer

    NASA Astrophysics Data System (ADS)

    Zhou, Jian; Shi, Ronghua; Guo, Ying

    2018-03-01

    Lengthening the maximum transmission distance of quantum key distribution plays a vital role in quantum information processing. In this paper, we propose a directional squeezed-state protocol with signals detected by a Rindler observer in the relativistic quantum field framework. We derive an analytical solution to the transmission problem of squeezed states from the inertial sender to the accelerated receiver. The variance of the involved signal mode is closer to optimality than that of the coherent-state-based protocol. Simulation results show that the proposed protocol has better performance than the coherent-state counterpart especially in terms of the maximal transmission distance.

  5. Benchmarking a quantum teleportation protocol in superconducting circuits using tomography and an entanglement witness.

    PubMed

    Baur, M; Fedorov, A; Steffen, L; Filipp, S; da Silva, M P; Wallraff, A

    2012-01-27

    Teleportation of a quantum state may be used for distributing entanglement between distant qubits in quantum communication and for quantum computation. Here we demonstrate the implementation of a teleportation protocol, up to the single-shot measurement step, with superconducting qubits coupled to a microwave resonator. Using full quantum state tomography and evaluating an entanglement witness, we show that the protocol generates a genuine tripartite entangled state of all three qubits. Calculating the projection of the measured density matrix onto the basis states of two qubits allows us to reconstruct the teleported state. Repeating this procedure for a complete set of input states we find an average output state fidelity of 86%.

  6. The Quantum Steganography Protocol via Quantum Noisy Channels

    NASA Astrophysics Data System (ADS)

    Wei, Zhan-Hong; Chen, Xiu-Bo; Niu, Xin-Xin; Yang, Yi-Xian

    2015-08-01

    As a promising branch of quantum information hiding, Quantum steganography aims to transmit secret messages covertly in public quantum channels. But due to environment noise and decoherence, quantum states easily decay and change. Therefore, it is very meaningful to make a quantum information hiding protocol apply to quantum noisy channels. In this paper, we make the further research on a quantum steganography protocol for quantum noisy channels. The paper proved that the protocol can apply to transmit secret message covertly in quantum noisy channels, and explicity showed quantum steganography protocol. In the protocol, without publishing the cover data, legal receivers can extract the secret message with a certain probability, which make the protocol have a good secrecy. Moreover, our protocol owns the independent security, and can be used in general quantum communications. The communication, which happen in our protocol, do not need entangled states, so our protocol can be used without the limitation of entanglement resource. More importantly, the protocol apply to quantum noisy channels, and can be used widely in the future quantum communication.

  7. Quantum error correction of continuous-variable states against Gaussian noise

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ralph, T. C.

    2011-08-15

    We describe a continuous-variable error correction protocol that can correct the Gaussian noise induced by linear loss on Gaussian states. The protocol can be implemented using linear optics and photon counting. We explore the theoretical bounds of the protocol as well as the expected performance given current knowledge and technology.

  8. Entanglement-secured single-qubit quantum secret sharing

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Scherpelz, P.; Resch, R.; Berryrieser, D.

    In single-qubit quantum secret sharing, a secret is shared between N parties via manipulation and measurement of one qubit at a time. Each qubit is sent to all N parties in sequence; the secret is encoded in the first participant's preparation of the qubit state and the subsequent participants' choices of state rotation or measurement basis. We present a protocol for single-qubit quantum secret sharing using polarization entanglement of photon pairs produced in type-I spontaneous parametric downconversion. We investigate the protocol's security against eavesdropping attack under common experimental conditions: a lossy channel for photon transmission, and imperfect preparation of themore » initial qubit state. A protocol which exploits entanglement between photons, rather than simply polarization correlation, is more robustly secure. We implement the entanglement-based secret-sharing protocol with 87% secret-sharing fidelity, limited by the purity of the entangled state produced by our present apparatus. We demonstrate a photon-number splitting eavesdropping attack, which achieves no success against the entanglement-based protocol while showing the predicted rate of success against a correlation-based protocol.« less

  9. Two-Step Deterministic Remote Preparation of an Arbitrary Quantum State

    NASA Astrophysics Data System (ADS)

    Wang, Mei-Yu; Yan, Feng-Li

    2010-11-01

    We present a two-step deterministic remote state preparation protocol for an arbitrary quhit with the aid of a three-particle Greenberger—Horne—Zeilinger state. Generalization of this protocol for higher-dimensional Hilbert space systems among three parties is also given. We show that only single-particle von Neumann measurements, local operations, and classical communication are necessary. Moreover, since the overall information of the quantum state can be divided into two different pieces, which may be at different locations, this protocol may be useful in the quantum information field.

  10. Unification of quantum information theory

    NASA Astrophysics Data System (ADS)

    Abeyesinghe, Anura

    We present the unification of many previously disparate results in noisy quantum Shannon theory and the unification of all of noiseless quantum Shannon theory. More specifically we deal here with bipartite, unidirectional, and memoryless quantum Shannon theory. We find all the optimal protocols and quantify the relationship between the resources used, both for the one-shot and for the ensemble case, for what is arguably the most fundamental task in quantum information theory: sharing entangled states between a sender and a receiver. We find that all of these protocols are derived from our one-shot superdense coding protocol and relate nicely to each other. We then move on to noisy quantum information theory and give a simple, direct proof of the "mother" protocol, or rather her generalization to the Fully Quantum Slepian-Wolf protocol (FQSW). FQSW simultaneously accomplishes two goals: quantum communication-assisted entanglement distillation, and state transfer from the sender to the receiver. As a result, in addition to her other "children," the mother protocol generates the state merging primitive of Horodecki, Oppenheim, and Winter as well as a new class of distributed compression protocols for correlated quantum sources, which are optimal for sources described by separable density operators. Moreover, the mother protocol described here is easily transformed into the so-called "father" protocol, demonstrating that the division of single-sender/single-receiver protocols into two families was unnecessary: all protocols in the family are children of the mother.

  11. Magic state distillation protocols with noisy Clifford gates

    NASA Astrophysics Data System (ADS)

    Brooks, Peter

    2013-03-01

    A promising approach to universal fault-tolerant quantum computation is to implement the non-universal group of Clifford gates, and to achieve universality by adding the ability to prepare high-fidelity copies of certain ``magic states''. By applying state distillation protocols, many noisy copies of a magic state ancilla can be purified into a smaller number of clean copies which are arbitrarily close to the perfect state, using only Clifford operations. In practice, the Clifford gates themselves will be noisy, which can limit the efficiency of state distillation and put a floor on the achievable fidelity with the desired state. Recently, a number of new state distillation protocols have been proposed that have the potential to reduce the required resource overhead. I analyze these protocols and explore the tradeoffs between these different approaches to magic state distillation when noisy Clifford gates are taken into account. Supported in part by IARPA under contract D11PC20165, by NSF under Grant No. PHY-0803371, by DOE under Grant No. DE-FG03-92-ER40701, and by NSA/ARO under Grant No. W911NF-09-1-0442.

  12. SU-E-P-03: Implementing a Low Dose Lung Screening CT Program Meeting Regulatory Requirements

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    LaFrance, M; Marsh, S; O'Donnell, G

    Purpose: To provide information pertaining to IROC Houston QA Center's (RPC) credentialing process for institutions participating in NCI-sponsored clinical trials. Purpose: Provide guidance to the Radiology Departments with the intent of implementing a Low Dose CT Screening Program using different CT Scanners with multiple techniques within the framework of the required state regulations. Method: State Requirements for the purpose of implementing a Low Dose CT Lung Protocol required working with the Radiology and Pulmonary Department in setting up a Low Dose Screening Protocol designed to reduce the radiation burden to the patients enrolled. Radiation dose measurements (CTDIvol) for various CTmore » manufacturers (Siemens16, Siemens 64, Philips 64, and Neusoft128) for three different weight based protocols. All scans were reviewed by the Radiologist. Prior to starting a low dose lung screening protocol, information had to be submitted to the state for approval. Performing a Healing Arts protocol requires extensive information. This not only includes name and address of the applicant but a detailed description of the disease, the x-ray examination and the population to be examined. The unit had to be tested by a qualified expert using the technique charts. The credentials of all the operators, the supervisors and the Radiologists had to be submitted to the state. Results: All the appropriate documentation was sent to the state for review. The measured results between the Low Dose Protocol versus the default Adult Chest Protocol showed that there was a dose reduction of 65% for small (100-150 lb.) patient, 75% for the Medium patient (151-250 lbs.), and a 55% reduction for the Large patient ( over 250 lbs.). Conclusion: Measured results indicated that the Low Dose Protocol indeed lowered the screening patient's radiation dose and the institution was able to submit the protocol to the State's regulators.« less

  13. Broken symmetry in a two-qubit quantum control landscape

    NASA Astrophysics Data System (ADS)

    Bukov, Marin; Day, Alexandre G. R.; Weinberg, Phillip; Polkovnikov, Anatoli; Mehta, Pankaj; Sels, Dries

    2018-05-01

    We analyze the physics of optimal protocols to prepare a target state with high fidelity in a symmetrically coupled two-qubit system. By varying the protocol duration, we find a discontinuous phase transition, which is characterized by a spontaneous breaking of a Z2 symmetry in the functional form of the optimal protocol, and occurs below the quantum speed limit. We study in detail this phase and demonstrate that even though high-fidelity protocols come degenerate with respect to their fidelity, they lead to final states of different entanglement entropy shared between the qubits. Consequently, while globally both optimal protocols are equally far away from the target state, one is locally closer than the other. An approximate variational mean-field theory which captures the physics of the different phases is developed.

  14. Wastewater GHG Accounting Protocols as Compared to the State of GHG Science.

    PubMed

    Willis, John L; Yuan, Zhiguo; Murthy, Sudhir

    2016-08-01

    Greenhouse gas (GHG) accounting protocols have addressed emissions from wastewater conveyance and treatment using a variety of simplifying methodologies. While these methodologies vary to some degree by protocol, within each protocol they provide consistent tools for organizational entities of varying size and scope to report and verify GHG emissions. Much of the science supporting these methodologies is either limited or the protocols have failed to keep abreast of developing GHG research. This state-of-the-art review summarizes the sources of direct GHG emissions (both those covered and not covered in current protocols) from wastewater handling; provides a review of the wastewater-related methodologies in a select group of popular protocols; and discusses where research has out-paced protocol methodologies and other areas where the supporting science is relatively weak and warrants further exploration.

  15. Variability in Criteria for Emergency Medical Services Routing of Acute Stroke Patients to Designated Stroke Center Hospitals.

    PubMed

    Dimitrov, Nikolay; Koenig, William; Bosson, Nichole; Song, Sarah; Saver, Jeffrey L; Mack, William J; Sanossian, Nerses

    2015-09-01

    Comprehensive stroke systems of care include routing to the nearest designated stroke center hospital, bypassing non-designated hospitals. Routing protocols are implemented at the state or county level and vary in qualification criteria and determination of destination hospital. We surveyed all counties in the state of California for presence and characteristics of their prehospital stroke routing protocols. Each county's local emergency medical services agency (LEMSA) was queried for the presence of a stroke routing protocol. We reviewed these protocols for method of stroke identification and criteria for patient transport to a stroke center. Thirty-three LEMSAs serve 58 counties in California with populations ranging from 1,175 to nearly 10 million. Fifteen LEMSAs (45%) had stroke routing protocols, covering 23 counties (40%) and 68% of the state population. Counties with protocols had higher population density (1,500 vs. 140 persons per square mile). In the six counties without designated stroke centers, patients meeting criteria were transported out of county. Stroke identification in the field was achieved using the Cincinnati Prehospital Stroke Screen in 72%, Los Angeles Prehospital Stroke Screen in 7% and a county-specific protocol in 22%. California EMS prehospital acute stroke routing protocols cover 68% of the state population and vary in characteristics including activation by symptom onset time and destination facility features, reflecting matching of system design to local geographic resources.

  16. Multi-party semi-quantum key distribution-convertible multi-party semi-quantum secret sharing

    NASA Astrophysics Data System (ADS)

    Yu, Kun-Fei; Gu, Jun; Hwang, Tzonelih; Gope, Prosanta

    2017-08-01

    This paper proposes a multi-party semi-quantum secret sharing (MSQSS) protocol which allows a quantum party (manager) to share a secret among several classical parties (agents) based on GHZ-like states. By utilizing the special properties of GHZ-like states, the proposed scheme can easily detect outside eavesdropping attacks and has the highest qubit efficiency among the existing MSQSS protocols. Then, we illustrate an efficient way to convert the proposed MSQSS protocol into a multi-party semi-quantum key distribution (MSQKD) protocol. The proposed approach is even useful to convert all the existing measure-resend type of semi-quantum secret sharing protocols into semi-quantum key distribution protocols.

  17. 40 CFR 82.4 - Prohibitions for class I controlled substances.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... not listed as a Party to the 1987 Montreal Protocol unless that foreign state is complying with the 1987 Montreal Protocol (See appendix C, annex 2 of this subpart); (2) Import or export any quantity of... to this subpart, from any foreign state not Party to the 1987 Montreal Protocol (as noted in appendix...

  18. 40 CFR 82.4 - Prohibitions for class I controlled substances.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... not listed as a Party to the 1987 Montreal Protocol unless that foreign state is complying with the 1987 Montreal Protocol (See appendix C, annex 2 of this subpart); (2) Import or export any quantity of... to this subpart, from any foreign state not Party to the 1987 Montreal Protocol (as noted in appendix...

  19. Ground-Based High-Power Microwave Decoy Discrimination System.

    DTIC Science & Technology

    1987-12-23

    understanding of plasma instabilities, self-induced magnetic effects , space - charge considerations, production of ion currents, etc. 3.3.4 Cross-Field...breakdown, due to small potential differences. Interaction volumes can therefore be large, avoiding breakdown and space - charge effects (at the price...the interference of the incident and reflected wave, and by the electrostatic forces of the surface (positive) and space charge (negative) trapped in

  20. Elimination of Perchlorate Oxidizers from Pyrotechnic Flare Compositions

    DTIC Science & Technology

    2007-03-09

    in candelas ( cd ), where the candela is defined as, 1 cd = 1 lumen /steradian-1. DSC A thermal analysis technique known as Differential...Shorter Wavelength Infrared band routinely monitored in decoy flare performance tests. TGA A thermal analysis technique known as Thermogravimetric ...Scanning Calorimetry DTA A thermal analysis technique known as Differential Thermal Analysis GAP Glycidyl Azide Polymer used as a curable binder in some

  1. Large Scale Mass Spectrometry-based Identifications of Enzyme-mediated Protein Methylation Are Subject to High False Discovery Rates*

    PubMed Central

    Hart-Smith, Gene; Yagoub, Daniel; Tay, Aidan P.; Pickford, Russell; Wilkins, Marc R.

    2016-01-01

    All large scale LC-MS/MS post-translational methylation site discovery experiments require methylpeptide spectrum matches (methyl-PSMs) to be identified at acceptably low false discovery rates (FDRs). To meet estimated methyl-PSM FDRs, methyl-PSM filtering criteria are often determined using the target-decoy approach. The efficacy of this methyl-PSM filtering approach has, however, yet to be thoroughly evaluated. Here, we conduct a systematic analysis of methyl-PSM FDRs across a range of sample preparation workflows (each differing in their exposure to the alcohols methanol and isopropyl alcohol) and mass spectrometric instrument platforms (each employing a different mode of MS/MS dissociation). Through 13CD3-methionine labeling (heavy-methyl SILAC) of Saccharomyces cerevisiae cells and in-depth manual data inspection, accurate lists of true positive methyl-PSMs were determined, allowing methyl-PSM FDRs to be compared with target-decoy approach-derived methyl-PSM FDR estimates. These results show that global FDR estimates produce extremely unreliable methyl-PSM filtering criteria; we demonstrate that this is an unavoidable consequence of the high number of amino acid combinations capable of producing peptide sequences that are isobaric to methylated peptides of a different sequence. Separate methyl-PSM FDR estimates were also found to be unreliable due to prevalent sources of false positive methyl-PSMs that produce high peptide identity score distributions. Incorrect methylation site localizations, peptides containing cysteinyl-S-β-propionamide, and methylated glutamic or aspartic acid residues can partially, but not wholly, account for these false positive methyl-PSMs. Together, these results indicate that the target-decoy approach is an unreliable means of estimating methyl-PSM FDRs and methyl-PSM filtering criteria. We suggest that orthogonal methylpeptide validation (e.g. heavy-methyl SILAC or its offshoots) should be considered a prerequisite for obtaining high confidence methyl-PSMs in large scale LC-MS/MS methylation site discovery experiments and make recommendations on how to reduce methyl-PSM FDRs in samples not amenable to heavy isotope labeling. Data are available via ProteomeXchange with the data identifier PXD002857. PMID:26699799

  2. Decoy Plasminogen Receptor Containing a Selective Kunitz-Inhibitory Domain

    PubMed Central

    2015-01-01

    Kunitz domain 1 (KD1) of tissue factor pathway inhibitor-2 in which P2′ residue Leu17 (bovine pancreatic trypsin inhibitor numbering) is mutated to Arg selectively inhibits the active site of plasmin with ∼5-fold improved affinity. Thrombin cleavage (24 h extended incubation at a 1:50 enzyme-to-substrate ratio) of the KD1 mutant (Leu17Arg) yielded a smaller molecule containing the intact Kunitz domain with no detectable change in the active-site inhibitory function. The N-terminal sequencing and MALDI-TOF/ESI data revealed that the starting molecule has a C-terminal valine (KD1L17R-VT), whereas the smaller molecule has a C-terminal lysine (KD1L17R-KT). Because KD1L17R-KT has C-terminal lysine, we examined whether it could serve as a decoy receptor for plasminogen/plasmin. Such a molecule might inhibit plasminogen activation as well as the active site of generated plasmin. In surface plasmon resonance experiments, tissue plasminogen activator (tPA) and Glu-plasminogen bound to KD1L17R-KT (Kd ∼ 0.2 to 0.3 μM) but not to KD1L17R-VT. Furthermore, KD1L17R-KT inhibited tPA-induced plasma clot fibrinolysis more efficiently than KD1L17R-VT. Additionally, compared to ε-aminocaproic acid KD1L17R-KT was more effective in reducing blood loss in a mouse liver-laceration injury model, where the fibrinolytic system is activated. In further experiments, the micro(μ)-plasmin–KD1L17R-KT complex inhibited urokinase-induced plasminogen activation on phorbol-12-myristate-13-acetate-stimulated U937 monocyte-like cells, whereas the μ-plasmin–KD1L17R-VT complex failed to inhibit this process. In conclusion, KD1L17R-KT inhibits the active site of plasmin as well as acts as a decoy receptor for the kringle domain(s) of plasminogen/plasmin; hence, it limits both plasmin generation and activity. With its dual function, KD1L17R-KT could serve as a preferred agent for controlling plasminogen activation in pathological processes. PMID:24383758

  3. Tumor-targeting Salmonella typhimurium A1-R combined with recombinant methioninase and cisplatinum eradicates an osteosarcoma cisplatinum-resistant lung metastasis in a patient-derived orthotopic xenograft (PDOX) mouse model: decoy, trap and kill chemotherapy moves toward the clinic.

    PubMed

    Igarashi, Kentaro; Kawaguchi, Kei; Kiyuna, Tasuku; Miyake, Kentaro; Miyake, Masuyo; Li, Shukuan; Han, Qinghong; Tan, Yuying; Zhao, Ming; Li, Yunfeng; Nelson, Scott D; Dry, Sarah M; Singh, Arun S; Elliott, Irmina A; Russell, Tara A; Eckardt, Mark A; Yamamoto, Norio; Hayashi, Katsuhiro; Kimura, Hiroaki; Miwa, Shinji; Tsuchiya, Hiroyuki; Eilber, Fritz C; Hoffman, Robert M

    2018-01-01

    In the present study, a patient-derived orthotopic xenograft (PDOX) model of recurrent cisplatinum (CDDP)-resistant metastatic osteosarcoma was treated with Salmonella typhimurium A1-R (S. typhimurium A1-R), which decoys chemoresistant quiescent cancer cells to cycle, and recombinant methioninase (rMETase), which selectively traps cancer cells in late S/G 2 , and chemotherapy. The PDOX models were randomized into the following groups 14 days after implantation: G1, control without treatment; G2, CDDP (6 mg/kg, intraperitoneal (i.p.) injection, weekly, for 2 weeks); G3, rMETase (100 unit/mouse, i.p., daily, for 2 weeks). G4, S. typhimurium A1-R (5 × 10 7 CFU/100 μl, i.v., weekly, for 2 weeks); G5, S. typhimurium A1-R (5 × 10 7 CFU/100 μl, i.v., weekly, for 2 weeks) combined with rMETase (100 unit/mouse, i.p., daily, for 2 weeks); G6, S. typhimurium A1-R (5 × 10 7 CFU/100 μl, i.v., weekly, for 2 weeks) combined with rMETase (100 unit/mouse, i.p., daily, for 2 weeks) and CDDP (6 mg/kg, i.p. injection, weekly, for 2 weeks). On day 14 after initiation, all treatments except CDDP alone, significantly inhibited tumor growth compared to untreated control: (CDDP: p = 0.586; rMETase: p = 0.002; S. typhimurium A1-R: p = 0.002; S. typhimurium A1-R combined with rMETase: p = 0.0004; rMETase combined with both S. typhimurium A1-R and CDDP: p = 0.0001). The decoy, trap and kill combination of S. typhimurium A1-R, rMETase and CDDP was the most effective of all therapies and was able to eradicate the metastatic osteosarcoma PDOX.

  4. Decoy plasminogen receptor containing a selective Kunitz-inhibitory domain.

    PubMed

    Kumar, Yogesh; Vadivel, Kanagasabai; Schmidt, Amy E; Ogueli, Godwin I; Ponnuraj, Sathya M; Rannulu, Nalaka; Loo, Joseph A; Bajaj, Madhu S; Bajaj, S Paul

    2014-01-28

    Kunitz domain 1 (KD1) of tissue factor pathway inhibitor-2 in which P2' residue Leu17 (bovine pancreatic trypsin inhibitor numbering) is mutated to Arg selectively inhibits the active site of plasmin with ∼5-fold improved affinity. Thrombin cleavage (24 h extended incubation at a 1:50 enzyme-to-substrate ratio) of the KD1 mutant (Leu17Arg) yielded a smaller molecule containing the intact Kunitz domain with no detectable change in the active-site inhibitory function. The N-terminal sequencing and MALDI-TOF/ESI data revealed that the starting molecule has a C-terminal valine (KD1L17R-VT), whereas the smaller molecule has a C-terminal lysine (KD1L17R-KT). Because KD1L17R-KT has C-terminal lysine, we examined whether it could serve as a decoy receptor for plasminogen/plasmin. Such a molecule might inhibit plasminogen activation as well as the active site of generated plasmin. In surface plasmon resonance experiments, tissue plasminogen activator (tPA) and Glu-plasminogen bound to KD1L17R-KT (Kd ∼ 0.2 to 0.3 μM) but not to KD1L17R-VT. Furthermore, KD1L17R-KT inhibited tPA-induced plasma clot fibrinolysis more efficiently than KD1L17R-VT. Additionally, compared to ε-aminocaproic acid KD1L17R-KT was more effective in reducing blood loss in a mouse liver-laceration injury model, where the fibrinolytic system is activated. In further experiments, the micro(μ)-plasmin-KD1L17R-KT complex inhibited urokinase-induced plasminogen activation on phorbol-12-myristate-13-acetate-stimulated U937 monocyte-like cells, whereas the μ-plasmin-KD1L17R-VT complex failed to inhibit this process. In conclusion, KD1L17R-KT inhibits the active site of plasmin as well as acts as a decoy receptor for the kringle domain(s) of plasminogen/plasmin; hence, it limits both plasmin generation and activity. With its dual function, KD1L17R-KT could serve as a preferred agent for controlling plasminogen activation in pathological processes.

  5. Comment on 'Two-way protocols for quantum cryptography with a nonmaximally entangled qubit pair'

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Qin Sujuan; Gao Fei; Wen Qiaoyan

    2010-09-15

    Three protocols of quantum cryptography with a nonmaximally entangled qubit pair [Phys. Rev. A 80, 022323 (2009)] were recently proposed by Shimizu, Tamaki, and Fukasaka. The security of these protocols is based on the quantum-mechanical constraint for a state transformation between nonmaximally entangled states. However, we find that the second protocol is vulnerable under the correlation-elicitation attack. An eavesdropper can obtain the encoded bit M although she has no knowledge about the random bit R.

  6. A Robust and Efficient Quantum Private Comparison of Equality Based on the Entangled Swapping of GHZ-like State and χ + State

    NASA Astrophysics Data System (ADS)

    Xu, Ling; Zhao, Zhiwen

    2017-08-01

    A new quantum protocol with the assistance of a semi-honest third party (TP) is proposed, which allows the participants comparing the equality of their private information without disclosing them. Different from previous protocols, this protocol utilizes quantum key distribution against the collective-dephasing noise and the collective-rotation noise, which is more robust and abandons few samples, to transmit the classical information. In addition, this protocol utilizes the GHZ-like state and the χ + state to produce the entanglement swapping. And the Bell basis and the dual basis are used to measure the particle pair so that 3 bits of each participant's private information can be compared in each comparison time, which is more efficient and consumes fewer comparison times. Meanwhile, there is no need of unitary operation and hash function in this protocol. At the end, various kinds of outside attack and participant attack are discussed and analyzed to be invalid, so it can complete the comparison in security.

  7. Model Checking a Byzantine-Fault-Tolerant Self-Stabilizing Protocol for Distributed Clock Synchronization Systems

    NASA Technical Reports Server (NTRS)

    Malekpour, Mahyar R.

    2007-01-01

    This report presents the mechanical verification of a simplified model of a rapid Byzantine-fault-tolerant self-stabilizing protocol for distributed clock synchronization systems. This protocol does not rely on any assumptions about the initial state of the system. This protocol tolerates bursts of transient failures, and deterministically converges within a time bound that is a linear function of the self-stabilization period. A simplified model of the protocol is verified using the Symbolic Model Verifier (SMV) [SMV]. The system under study consists of 4 nodes, where at most one of the nodes is assumed to be Byzantine faulty. The model checking effort is focused on verifying correctness of the simplified model of the protocol in the presence of a permanent Byzantine fault as well as confirmation of claims of determinism and linear convergence with respect to the self-stabilization period. Although model checking results of the simplified model of the protocol confirm the theoretical predictions, these results do not necessarily confirm that the protocol solves the general case of this problem. Modeling challenges of the protocol and the system are addressed. A number of abstractions are utilized in order to reduce the state space. Also, additional innovative state space reduction techniques are introduced that can be used in future verification efforts applied to this and other protocols.

  8. High-Dimensional Multi-particle Cat-Like State Teleportation

    NASA Astrophysics Data System (ADS)

    Zeng, Bei; Liu, Xiao-Shu; Li, Yan-Song; Long, Gui-Lu

    2002-11-01

    Two kinds of M-particle d-dimensional Schmidt-form entangled state teleportation protocols are presented. In the first protocol, the teleportation is achieved by d-dimensional Bell-basis measurements, while in the second protocol it is realized by d-dimensional GHZ-basis measurement. The project supported by the Major State Basic Research Development Program under Grant No. G200077400, National Natural Science Foundation of China under Grant No. 60073009, the Fok Ying Tung Education Foundation, and the Excellent Young University Teachers' Fund of Education Ministry of China

  9. Stationary average consensus protocol for a class of heterogeneous high-order multi-agent systems with application for aircraft

    NASA Astrophysics Data System (ADS)

    Rezaei, Mohammad Hadi; Menhaj, Mohammad Bagher

    2018-01-01

    This paper investigates the stationary average consensus problem for a class of heterogeneous-order multi-agent systems. The goal is to bring the positions of agents to the average of their initial positions while letting the other states converge to zero. To this end, three different consensus protocols are proposed. First, based on the auxiliary variables information among the agents under switching directed networks and state-feedback control, a protocol is proposed whereby all the agents achieve stationary average consensus. In the second and third protocols, by resorting to only measurements of relative positions of neighbouring agents under fixed balanced directed networks, two control frameworks are presented with two strategies based on state-feedback and output-feedback control. Finally, simulation results are given to illustrate the effectiveness of the proposed protocols.

  10. Decoy-state quantum key distribution with a leaky source

    NASA Astrophysics Data System (ADS)

    Tamaki, Kiyoshi; Curty, Marcos; Lucamarini, Marco

    2016-06-01

    In recent years, there has been a great effort to prove the security of quantum key distribution (QKD) with a minimum number of assumptions. Besides its intrinsic theoretical interest, this would allow for larger tolerance against device imperfections in the actual implementations. However, even in this device-independent scenario, one assumption seems unavoidable, that is, the presence of a protected space devoid of any unwanted information leakage in which the legitimate parties can privately generate, process and store their classical data. In this paper we relax this unrealistic and hardly feasible assumption and introduce a general formalism to tackle the information leakage problem in most of existing QKD systems. More specifically, we prove the security of optical QKD systems using phase and intensity modulators in their transmitters, which leak the setting information in an arbitrary manner. We apply our security proof to cases of practical interest and show key rates similar to those obtained in a perfectly shielded environment. Our work constitutes a fundamental step forward in guaranteeing implementation security of quantum communication systems.

  11. Direct and full-scale experimental verifications towards ground-satellite quantum key distribution

    NASA Astrophysics Data System (ADS)

    Wang, Jian-Yu; Yang, Bin; Liao, Sheng-Kai; Zhang, Liang; Shen, Qi; Hu, Xiao-Fang; Wu, Jin-Cai; Yang, Shi-Ji; Jiang, Hao; Tang, Yan-Lin; Zhong, Bo; Liang, Hao; Liu, Wei-Yue; Hu, Yi-Hua; Huang, Yong-Mei; Qi, Bo; Ren, Ji-Gang; Pan, Ge-Sheng; Yin, Juan; Jia, Jian-Jun; Chen, Yu-Ao; Chen, Kai; Peng, Cheng-Zhi; Pan, Jian-Wei

    2013-05-01

    Quantum key distribution (QKD) provides the only intrinsically unconditional secure method for communication based on the principle of quantum mechanics. Compared with fibre-based demonstrations, free-space links could provide the most appealing solution for communication over much larger distances. Despite significant efforts, all realizations to date rely on stationary sites. Experimental verifications are therefore extremely crucial for applications to a typical low Earth orbit satellite. To achieve direct and full-scale verifications of our set-up, we have carried out three independent experiments with a decoy-state QKD system, and overcome all conditions. The system is operated on a moving platform (using a turntable), on a floating platform (using a hot-air balloon), and with a high-loss channel to demonstrate performances under conditions of rapid motion, attitude change, vibration, random movement of satellites, and a high-loss regime. The experiments address wide ranges of all leading parameters relevant to low Earth orbit satellites. Our results pave the way towards ground-satellite QKD and a global quantum communication network.

  12. Protein Frustratometer 2: a tool to localize energetic frustration in protein molecules, now with electrostatics.

    PubMed

    Parra, R Gonzalo; Schafer, Nicholas P; Radusky, Leandro G; Tsai, Min-Yeh; Guzovsky, A Brenda; Wolynes, Peter G; Ferreiro, Diego U

    2016-07-08

    The protein frustratometer is an energy landscape theory-inspired algorithm that aims at localizing and quantifying the energetic frustration present in protein molecules. Frustration is a useful concept for analyzing proteins' biological behavior. It compares the energy distributions of the native state with respect to structural decoys. The network of minimally frustrated interactions encompasses the folding core of the molecule. Sites of high local frustration often correlate with functional regions such as binding sites and regions involved in allosteric transitions. We present here an upgraded version of a webserver that measures local frustration. The new implementation that allows the inclusion of electrostatic energy terms, important to the interactions with nucleic acids, is significantly faster than the previous version enabling the analysis of large macromolecular complexes within a user-friendly interface. The webserver is freely available at URL: http://frustratometer.qb.fcen.uba.ar. © The Author(s) 2016. Published by Oxford University Press on behalf of Nucleic Acids Research.

  13. Real-time imaging of Huntingtin aggregates diverting target search and gene transcription

    PubMed Central

    Li, Li; Liu, Hui; Dong, Peng; Li, Dong; Legant, Wesley R; Grimm, Jonathan B; Lavis, Luke D; Betzig, Eric; Tjian, Robert; Liu, Zhe

    2016-01-01

    The presumptive altered dynamics of transient molecular interactions in vivo contributing to neurodegenerative diseases have remained elusive. Here, using single-molecule localization microscopy, we show that disease-inducing Huntingtin (mHtt) protein fragments display three distinct dynamic states in living cells – 1) fast diffusion, 2) dynamic clustering and 3) stable aggregation. Large, stable aggregates of mHtt exclude chromatin and form 'sticky' decoy traps that impede target search processes of key regulators involved in neurological disorders. Functional domain mapping based on super-resolution imaging reveals an unexpected role of aromatic amino acids in promoting protein-mHtt aggregate interactions. Genome-wide expression analysis and numerical simulation experiments suggest mHtt aggregates reduce transcription factor target site sampling frequency and impair critical gene expression programs in striatal neurons. Together, our results provide insights into how mHtt dynamically forms aggregates and disrupts the finely-balanced gene control mechanisms in neuronal cells. DOI: http://dx.doi.org/10.7554/eLife.17056.001 PMID:27484239

  14. Design considerations of high-performance InGaAs/InP single-photon avalanche diodes for quantum key distribution.

    PubMed

    Ma, Jian; Bai, Bing; Wang, Liu-Jun; Tong, Cun-Zhu; Jin, Ge; Zhang, Jun; Pan, Jian-Wei

    2016-09-20

    InGaAs/InP single-photon avalanche diodes (SPADs) are widely used in practical applications requiring near-infrared photon counting such as quantum key distribution (QKD). Photon detection efficiency and dark count rate are the intrinsic parameters of InGaAs/InP SPADs, due to the fact that their performances cannot be improved using different quenching electronics given the same operation conditions. After modeling these parameters and developing a simulation platform for InGaAs/InP SPADs, we investigate the semiconductor structure design and optimization. The parameters of photon detection efficiency and dark count rate highly depend on the variables of absorption layer thickness, multiplication layer thickness, excess bias voltage, and temperature. By evaluating the decoy-state QKD performance, the variables for SPAD design and operation can be globally optimized. Such optimization from the perspective of specific applications can provide an effective approach to design high-performance InGaAs/InP SPADs.

  15. Proof-of-principle experimental realization of a qubit-like qudit-based quantum key distribution scheme

    NASA Astrophysics Data System (ADS)

    Wang, Shuang; Yin, Zhen-Qiang; Chau, H. F.; Chen, Wei; Wang, Chao; Guo, Guang-Can; Han, Zheng-Fu

    2018-04-01

    In comparison to qubit-based protocols, qudit-based quantum key distribution ones generally allow two cooperative parties to share unconditionally secure keys under a higher channel noise. However, it is very hard to prepare and measure the required quantum states in qudit-based protocols in general. One exception is the recently proposed highly error tolerant qudit-based protocol known as the Chau15 (Chau 2015 Phys. Rev. A 92 062324). Remarkably, the state preparation and measurement in this protocol can be done relatively easily since the required states are phase encoded almost like the diagonal basis states of a qubit. Here we report the first proof-of-principle demonstration of the Chau15 protocol. One highlight of our experiment is that its post-processing is based on practical one-way manner, while the original proposal in Chau (2015 Phys. Rev. A 92 062324) relies on complicated two-way post-processing, which is a great challenge in experiment. In addition, by manipulating time-bin qudit and measurement with a variable delay interferometer, our realization is extensible to qudit with high-dimensionality and confirms the experimental feasibility of the Chau15 protocol.

  16. 15 CFR 781.1 - Definitions of terms used in the Additional Protocol Regulations (APR).

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... United States of America and the International Atomic Energy Agency for the Application of Safeguards in... Additional Protocol. Agreement State. Any State of the United States with which the U.S. Nuclear Regulatory Commission (NRC) has entered into an effective agreement under Subsection 274b of the Atomic Energy Act of...

  17. 15 CFR 781.1 - Definitions of terms used in the Additional Protocol Regulations (APR).

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... United States of America and the International Atomic Energy Agency for the Application of Safeguards in... Additional Protocol. Agreement State. Any State of the United States with which the U.S. Nuclear Regulatory Commission (NRC) has entered into an effective agreement under Subsection 274b of the Atomic Energy Act of...

  18. 15 CFR 781.1 - Definitions of terms used in the Additional Protocol Regulations (APR).

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... United States of America and the International Atomic Energy Agency for the Application of Safeguards in... Additional Protocol. Agreement State. Any State of the United States with which the U.S. Nuclear Regulatory Commission (NRC) has entered into an effective agreement under Subsection 274b of the Atomic Energy Act of...

  19. 15 CFR 781.1 - Definitions of terms used in the Additional Protocol Regulations (APR).

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... United States of America and the International Atomic Energy Agency for the Application of Safeguards in... Additional Protocol. Agreement State. Any State of the United States with which the U.S. Nuclear Regulatory Commission (NRC) has entered into an effective agreement under Subsection 274b of the Atomic Energy Act of...

  20. 15 CFR 781.1 - Definitions of terms used in the Additional Protocol Regulations (APR).

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... United States of America and the International Atomic Energy Agency for the Application of Safeguards in... Additional Protocol. Agreement State. Any State of the United States with which the U.S. Nuclear Regulatory Commission (NRC) has entered into an effective agreement under Subsection 274b of the Atomic Energy Act of...

  1. Teleportation of atomic and photonic states in low-Q cavity QED

    NASA Astrophysics Data System (ADS)

    Peng, Zhao-Hui; Zou, Jian; Liu, Xiao-Juan; Kuang, Le-Man

    2012-11-01

    We propose two alternative teleportation protocols in low-Q cavity QED. Through the input-output process of photons, we can generate atom-photon entangled states as the quantum channel. Then we propose to teleport single-atom (two-atom entangled) state using coherent photonic states, and to teleport single photonic state with the assistance of three-level atom. The distinct feature of our protocols is that we can teleport both atomic and photonic states via the input-output process of photons in the low-Q cavity. Furthermore, as our protocols work in low-Q cavities and only involve virtual excitation of atoms, they are insensitive to both cavity decay and atomic spontaneous emission, and may be feasible with current technology.

  2. Verification of hypergraph states

    NASA Astrophysics Data System (ADS)

    Morimae, Tomoyuki; Takeuchi, Yuki; Hayashi, Masahito

    2017-12-01

    Hypergraph states are generalizations of graph states where controlled-Z gates on edges are replaced with generalized controlled-Z gates on hyperedges. Hypergraph states have several advantages over graph states. For example, certain hypergraph states, such as the Union Jack states, are universal resource states for measurement-based quantum computing with only Pauli measurements, while graph state measurement-based quantum computing needs non-Clifford basis measurements. Furthermore, it is impossible to classically efficiently sample measurement results on hypergraph states unless the polynomial hierarchy collapses to the third level. Although several protocols have been proposed to verify graph states with only sequential single-qubit Pauli measurements, there was no verification method for hypergraph states. In this paper, we propose a method for verifying a certain class of hypergraph states with only sequential single-qubit Pauli measurements. Importantly, no i.i.d. property of samples is assumed in our protocol: any artificial entanglement among samples cannot fool the verifier. As applications of our protocol, we consider verified blind quantum computing with hypergraph states, and quantum computational supremacy demonstrations with hypergraph states.

  3. Improvements of Quantum Private Comparison Protocol Based on Cluster States

    NASA Astrophysics Data System (ADS)

    Zhou, Ming-Kuai

    2018-01-01

    Quantum private comparison aims to determine whether the secrets from two different users are equal or not by utilizing the laws of quantum mechanics. Recently, Sun and Long put forward a quantum private comparison (QPC) protocol by using four-particle cluster states (Int. J. Theor. Phys. 52, 212-218, 2013). In this paper, we investigate this protocol in depth, and suggest the corresponding improvements. Compared with the original protocol, the improved protocol has the following advantages: 1) it can release the requirements of authenticated classical channels and unitary operations; 2) it can prevent the malicious attack from the genuine semi-honest TP; 3) it can enhance the qubit efficiency.

  4. Variability in donation after cardiac death protocols: a national survey.

    PubMed

    Fugate, Jennifer E; Stadtler, Maria; Rabinstein, Alejandro A; Wijdicks, Eelco F M

    2011-02-27

    As donation after cardiac death practices expand, the number of institutional policies is increasing. We contacted organ procurement organizations throughout the United States and requested protocols in hospitals in their donor service areas. Sixty-four protocols were obtained with representation from 16 different states. The terminology and recommended practices varied substantially. The methods for death determination were not specified in 28 (44%) protocols. Most adhered to a 2- to 5-min observation time between circulatory arrest and organ procurement, but 10 (16%) provided no information. This variability reveals a need to define a uniform standard in donation after cardiac death protocols and death determination practices.

  5. General A Scheme to Share Information via Employing Discrete Algorithm to Quantum States

    NASA Astrophysics Data System (ADS)

    Kang, Guo-Dong; Fang, Mao-Fa

    2011-02-01

    We propose a protocol for information sharing between two legitimate parties (Bob and Alice) via public-key cryptography. In particular, we specialize the protocol by employing discrete algorithm under mod that maps integers to quantum states via photon rotations. Based on this algorithm, we find that the protocol is secure under various classes of attacks. Specially, owe to the algorithm, the security of the classical privacy contained in the quantum public-key and the corresponding ciphertext is guaranteed. And the protocol is robust against the impersonation attack and the active wiretapping attack by designing particular checking processing, thus the protocol is valid.

  6. Secure quantum communication using classical correlated channel

    NASA Astrophysics Data System (ADS)

    Costa, D.; de Almeida, N. G.; Villas-Boas, C. J.

    2016-10-01

    We propose a secure protocol to send quantum information from one part to another without a quantum channel. In our protocol, which resembles quantum teleportation, a sender (Alice) and a receiver (Bob) share classical correlated states instead of EPR ones, with Alice performing measurements in two different bases and then communicating her results to Bob through a classical channel. Our secure quantum communication protocol requires the same amount of classical bits as the standard quantum teleportation protocol. In our scheme, as in the usual quantum teleportation protocol, once the classical channel is established in a secure way, a spy (Eve) will never be able to recover the information of the unknown quantum state, even if she is aware of Alice's measurement results. Security, advantages, and limitations of our protocol are discussed and compared with the standard quantum teleportation protocol.

  7. A nonlinear merging protocol for consensus in multi-agent systems on signed and weighted graphs

    NASA Astrophysics Data System (ADS)

    Feng, Shasha; Wang, Li; Li, Yijia; Sun, Shiwen; Xia, Chengyi

    2018-01-01

    In this paper, we investigate the multi-agent consensus for networks with undirected graphs which are not connected, especially for the signed graph in which some edge weights are positive and some edges have negative weights, and the negative-weight graph whose edge weights are negative. We propose a novel nonlinear merging consensus protocol to drive the states of all agents to converge to the same state zero which is not dependent upon the initial states of agents. If the undirected graph whose edge weights are positive is connected, then the states of all agents converge to the same state more quickly when compared to most other protocols. While the undirected graph whose edge weights might be positive or negative is unconnected, the states of all agents can still converge to the same state zero under the premise that the undirected graph can be divided into several connected subgraphs with more than one node. Furthermore, we also discuss the impact of parameter r presented in our protocol. Current results can further deepen the understanding of consensus processes for multi-agent systems.

  8. Asymmetric Bidirectional Controlled Teleportation via Seven-Photon Entangled State

    NASA Astrophysics Data System (ADS)

    Nie, Yi-you; Sang, Ming-huang

    2017-11-01

    We propose a protocol of asymmetric bidirectional controlled teleportation by using a seven-photon entangled state. In our protocol, Alice can teleport an arbitrary single-photon state to Bob and at the same time Bob can teleport an arbitrary two-photon state to Alice via the control of the supervisor Charlie. In addition, ones only carry out the Bell-state measurements and single-photon measurement.

  9. Protocols and Hospital Mortality in Critically ill Patients: The United States Critical Illness and Injury Trials Group Critical Illness Outcomes Study

    PubMed Central

    Sevransky, Jonathan E.; Checkley, William; Herrera, Phabiola; Pickering, Brian W.; Barr, Juliana; Brown, Samuel M; Chang, Steven Y; Chong, David; Kaufman, David; Fremont, Richard D; Girard, Timothy D; Hoag, Jeffrey; Johnson, Steven B; Kerlin, Mehta P; Liebler, Janice; O'Brien, James; O'Keefe, Terence; Park, Pauline K; Pastores, Stephen M; Patil, Namrata; Pietropaoli, Anthony P; Putman, Maryann; Rice, Todd W.; Rotello, Leo; Siner, Jonathan; Sajid, Sahul; Murphy, David J; Martin, Greg S

    2015-01-01

    Objective Clinical protocols may decrease unnecessary variation in care and improve compliance with desirable therapies. We evaluated whether highly protocolized intensive care units have superior patient outcomes compared with less highly protocolized intensive care units. Design Observational study in which participating intensive care units completed a general assessment and enrolled new patients one day each week. Setting and Patients 6179 critically ill patients across 59 intensive care units in the United States Critical Illness and Injury Trials Group Critical Illness Outcomes Study Interventions: None Measurements and Main Results The primary exposure was the number of intensive care unit protocols; the primary outcome was hospital mortality. 5809 participants were followed prospectively and 5454 patients in 57 intensive care units had complete outcome data. The median number of protocols per intensive care unit was 19 (IQR 15 to 21.5). In single variable analyses, there were no differences in intensive care unit and hospital mortality, length of stay, use of mechanical ventilation, vasopressors, or continuous sedation among individuals in intensive care units with a high vs. low number of protocols. The lack of association was confirmed in adjusted multivariable analysis (p=0.70). Protocol compliance with two ventilator management protocols was moderate and did not differ between intensive care units with high vs. low numbers of protocols for lung protective ventilation in ARDS (47% vs. 52%; p=0.28) and for spontaneous breathing trials (55% vs. 51%; p=0.27). Conclusions Clinical protocols are highly prevalent in United States intensive care units. The presence of a greater number of protocols was not associated with protocol compliance or patient mortality. PMID:26110488

  10. Faithful teleportation with partially entangled states

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gour, Gilad

    2004-10-01

    We write explicitly a general protocol for faithful teleportation of a d-state particle (qudit) via a partially entangled pair of (pure) n-state particles. The classical communication cost (CCC) of the protocol is log{sub 2}(nd) bits, and it is implemented by a projective measurement performed by Alice, and a unitary operator performed by Bob (after receiving from Alice the measurement result). We prove the optimality of our protocol by a comparison with the concentrate and teleport strategy. We also show that if d>n/2, or if there is no residual entanglement left after the faithful teleportation, the CCC of any protocol ismore » at least log{sub 2}(nd) bits. Furthermore, we find a lower bound on the CCC in the process transforming one bipartite state to another by means of local operation and classical communication.« less

  11. Bidirectional and Asymmetric Controlled Quantum Information Transmission via Five-qubit Brown State

    NASA Astrophysics Data System (ADS)

    Fang, Sheng-hui; Jiang, Min

    2017-05-01

    We put forward a new protocol of deterministic controlled bidirectional quantum information transmission, using a five-qubit Brown state. That is to say Alice wants to teleport an arbitrary single-qubit state to Bob and Bob wants to remotely prepare a known state for Alice via the control of the supervisor Charlie. In terms of physical implementations, only a CNOT gate, one Bell-state measurement and one qubit measurement are used in our protocol. Compared with previous study for solely bidirectional quantum teleportation and solely bidirectional remote state preparation schemes, our protocol is a kind of hybrid approach of information communication which makes the quantum channel multipurpose, i.e., no matter whether the transmitted state is known or unknown, the state information can be transmitted with each other via a five-qubit Brown state under the control of the third party as a supervisor.

  12. An Improved Protocol for Controlled Deterministic Secure Quantum Communication Using Five-Qubit Entangled State

    NASA Astrophysics Data System (ADS)

    Kao, Shih-Hung; Lin, Jason; Tsai, Chia-Wei; Hwang, Tzonelih

    2018-03-01

    In early 2009, Xiu et al. (Opt. Commun. 282(2) 333-337 2009) presented a controlled deterministic secure quantum communication (CDSQC) protocol via a newly constructed five-qubit entangled quantum state. Later, Qin et al. (Opt. Commun. 282(13), 2656-2658 2009) pointed out two security loopholes in Xiu et al.'s protocol: (1) A correlation-elicitation (CE) attack can reveal the entire secret message; (2) A leakage of partial information for the receiver is noticed. Then, Xiu et al. (Opt. Commun. 283(2), 344-347 2010) presented a revised CDSQC protocol to remedy the CE attack problem. However, the information leakage problem still remains open. This work proposes a new CDSQC protocol using the same five-qubit entangled state which can work without the above mentioned security problems. Moreover, the Trojan Horse attacks can be automatically avoided without using detecting devices in the new CDSQC.

  13. An Improved Protocol for Controlled Deterministic Secure Quantum Communication Using Five-Qubit Entangled State

    NASA Astrophysics Data System (ADS)

    Kao, Shih-Hung; Lin, Jason; Tsai, Chia-Wei; Hwang, Tzonelih

    2018-06-01

    In early 2009, Xiu et al. (Opt. Commun. 282(2) 333-337 2009) presented a controlled deterministic secure quantum communication (CDSQC) protocol via a newly constructed five-qubit entangled quantum state. Later, Qin et al. (Opt. Commun. 282(13), 2656-2658 2009) pointed out two security loopholes in Xiu et al.'s protocol: (1) A correlation-elicitation (CE) attack can reveal the entire secret message; (2) A leakage of partial information for the receiver is noticed. Then, Xiu et al. (Opt. Commun. 283(2), 344-347 2010) presented a revised CDSQC protocol to remedy the CE attack problem. However, the information leakage problem still remains open. This work proposes a new CDSQC protocol using the same five-qubit entangled state which can work without the above mentioned security problems. Moreover, the Trojan Horse attacks can be automatically avoided without using detecting devices in the new CDSQC.

  14. Reliable multicast protocol specifications protocol operations

    NASA Technical Reports Server (NTRS)

    Callahan, John R.; Montgomery, Todd; Whetten, Brian

    1995-01-01

    This appendix contains the complete state tables for Reliable Multicast Protocol (RMP) Normal Operation, Multi-RPC Extensions, Membership Change Extensions, and Reformation Extensions. First the event types are presented. Afterwards, each RMP operation state, normal and extended, is presented individually and its events shown. Events in the RMP specification are one of several things: (1) arriving packets, (2) expired alarms, (3) user events, (4) exceptional conditions.

  15. Self-Defense Distributed Engagement Coordinator

    DTIC Science & Technology

    2016-02-01

    its countermeasures. Whether a missile is defeated with an interceptor, undermined by a signal jammer, or diverted by a decoy, there is Self - Defense ...anti-ship threats and recommends actions to the personnel coordinating ship self - defense . This tool was recognized with a 2015 R&D 100 Award. a cost...reloading process, and may not be possible at all. The Self - Defense Distributed Engagement Coordinator (SDDEC) is designed to provide automated battle

  16. Pyrophoric Nanoparticles and Nanoporous Foils for Defense Applications

    DTIC Science & Technology

    2008-12-01

    bombs, low-flying aircrafts , and unmanned aerial vehicles are some of these threats that soldiers are often subjected to in a war zone. Nanotechnology...for making flares to distract the enemy or signal fellow soldiers in combat zone, infrared countermeasure decoy flares for low flying aircrafts , and...Pierre, A.C., Baret, G., 2005: Preparation and characterization of transperent Eu doped Y2O3 aerogel monoliths, for application in luminescence, J

  17. Research on Network Defense Strategy Based on Honey Pot Technology

    NASA Astrophysics Data System (ADS)

    Hong, Jianchao; Hua, Ying

    2018-03-01

    As a new network security technology of active defense, The honeypot technology has become a very effective and practical method of decoy attackers. The thesis discusses the theory, structure, characteristic, design and implementation of Honeypot in detail. Aiming at the development of means of attack, put forward a kind of network defense technology based on honeypot technology, constructing a virtual Honeypot demonstrate the honeypot’s functions.

  18. Camouflage, Concealment, and Decoys

    DTIC Science & Technology

    2010-11-26

    connections. Such positions are usually constructed of earth and logs but may also be composed of man- made building materials such as concrete ...paint sticks are unavailable, use field expedients such as burnt cork, bark, charcoal, lampblack, or mud. Mud contains bacteria, some of which is harmful...Camo enamel, sand 8010-00-111-8336 NA 5 gal Camo enamel, sand 8010-00-111-7988 NA 1 gal Camo screen, ultralite, asphalt/ concrete 1080-01-338

  19. Design Goals for Future Camouflage Systems

    DTIC Science & Technology

    1981-01-01

    rthur D tittle Inc TABLE OF CONTENTS (continued) Page 7. Build Up the Energy Level of the Background (Clutter Enhancement, etc.) V-13 8. Decoys V-14 9...of electronic warfare, and is excluded from this project. Within each class, the following issues are addressed: * the energy field and the physics...recognized image (unlike the range/reflectivity/ motion signatures offered by most radars) and this makes camouflage even more difficult. Techniques for

  20. Laser agile illumination for object tracking and classification - Feasibility study

    NASA Technical Reports Server (NTRS)

    Scholl, Marija S.; Vanzyl, Jakob J.; Meinel, Aden B.; Meinel, Marjorie P.; Scholl, James W.

    1988-01-01

    The 'agile illumination' concept for discrimination between ICBM warheads and decoys involves a two-aperture illumination with coherent light, diffraction of light by propagation, and a resulting interference pattern on the object surface. A scanning two-beam interference pattern illuminates one object at a time; depending on the shape, momentum, spinning, and tumbling characteristics of the interrogated object, different temporal signals will be obtained for different classes of objects.

Top