Matroids and quantum-secret-sharing schemes
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sarvepalli, Pradeep; Raussendorf, Robert
A secret-sharing scheme is a cryptographic protocol to distribute a secret state in an encoded form among a group of players such that only authorized subsets of the players can reconstruct the secret. Classically, efficient secret-sharing schemes have been shown to be induced by matroids. Furthermore, access structures of such schemes can be characterized by an excluded minor relation. No such relations are known for quantum secret-sharing schemes. In this paper we take the first steps toward a matroidal characterization of quantum-secret-sharing schemes. In addition to providing a new perspective on quantum-secret-sharing schemes, this characterization has important benefits. While previousmore » work has shown how to construct quantum-secret-sharing schemes for general access structures, these schemes are not claimed to be efficient. In this context the present results prove to be useful; they enable us to construct efficient quantum-secret-sharing schemes for many general access structures. More precisely, we show that an identically self-dual matroid that is representable over a finite field induces a pure-state quantum-secret-sharing scheme with information rate 1.« less
Efficient multiparty quantum-secret-sharing schemes
DOE Office of Scientific and Technical Information (OSTI.GOV)
Xiao Li; Deng Fuguo; Key Laboratory for Quantum Information and Measurements, MOE, Beijing 100084
In this work, we generalize the quantum-secret-sharing scheme of Hillery, Buzek, and Berthiaume [Phys. Rev. A 59, 1829 (1999)] into arbitrary multiparties. Explicit expressions for the shared secret bit is given. It is shown that in the Hillery-Buzek-Berthiaume quantum-secret-sharing scheme the secret information is shared in the parity of binary strings formed by the measured outcomes of the participants. In addition, we have increased the efficiency of the quantum-secret-sharing scheme by generalizing two techniques from quantum key distribution. The favored-measuring-basis quantum-secret-sharing scheme is developed from the Lo-Chau-Ardehali technique [H. K. Lo, H. F. Chau, and M. Ardehali, e-print quant-ph/0011056] wheremore » all the participants choose their measuring-basis asymmetrically, and the measuring-basis-encrypted quantum-secret-sharing scheme is developed from the Hwang-Koh-Han technique [W. Y. Hwang, I. G. Koh, and Y. D. Han, Phys. Lett. A 244, 489 (1998)] where all participants choose their measuring basis according to a control key. Both schemes are asymptotically 100% in efficiency, hence nearly all the Greenberger-Horne-Zeilinger states in a quantum-secret-sharing process are used to generate shared secret information.« less
Quantum secret sharing with identity authentication based on Bell states
NASA Astrophysics Data System (ADS)
Abulkasim, Hussein; Hamad, Safwat; Khalifa, Amal; El Bahnasy, Khalid
Quantum secret sharing techniques allow two parties or more to securely share a key, while the same number of parties or less can efficiently deduce the secret key. In this paper, we propose an authenticated quantum secret sharing protocol, where a quantum dialogue protocol is adopted to authenticate the identity of the parties. The participants simultaneously authenticate the identity of each other based on parts of a prior shared key. Moreover, the whole prior shared key can be reused for deducing the secret data. Although the proposed scheme does not significantly improve the efficiency performance, it is more secure compared to some existing quantum secret sharing scheme due to the identity authentication process. In addition, the proposed scheme can stand against participant attack, man-in-the-middle attack, impersonation attack, Trojan-horse attack as well as information leaks.
An efficient (t,n) threshold quantum secret sharing without entanglement
NASA Astrophysics Data System (ADS)
Qin, Huawang; Dai, Yuewei
2016-04-01
An efficient (t,n) threshold quantum secret sharing (QSS) scheme is proposed. In our scheme, the Hash function is used to check the eavesdropping, and no particles need to be published. So the utilization efficiency of the particles is real 100%. No entanglement is used in our scheme. The dealer uses the single particles to encode the secret information, and the participants get the secret through measuring the single particles. Compared to the existing schemes, our scheme is simpler and more efficient.
Nonlinear secret image sharing scheme.
Shin, Sang-Ho; Lee, Gil-Je; Yoo, Kee-Young
2014-01-01
Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic. Although Shamir's technique based secret image sharing schemes are efficient and scalable for various environments, there exists a security threat such as Tompa-Woll attack. Renvall and Ding proposed a new secret sharing technique based on nonlinear combination polynomial arithmetic in order to solve this threat. It is hard to apply to the secret image sharing. In this paper, we propose a (t, n)-threshold nonlinear secret image sharing scheme with steganography concept. In order to achieve a suitable and secure secret image sharing scheme, we adapt a modified LSB embedding technique with XOR Boolean algebra operation, define a new variable m, and change a range of prime p in sharing procedure. In order to evaluate efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB) and 1.74t⌈log2 m⌉ bit-per-pixel (bpp), respectively.
Nonlinear Secret Image Sharing Scheme
Shin, Sang-Ho; Yoo, Kee-Young
2014-01-01
Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic. Although Shamir's technique based secret image sharing schemes are efficient and scalable for various environments, there exists a security threat such as Tompa-Woll attack. Renvall and Ding proposed a new secret sharing technique based on nonlinear combination polynomial arithmetic in order to solve this threat. It is hard to apply to the secret image sharing. In this paper, we propose a (t, n)-threshold nonlinear secret image sharing scheme with steganography concept. In order to achieve a suitable and secure secret image sharing scheme, we adapt a modified LSB embedding technique with XOR Boolean algebra operation, define a new variable m, and change a range of prime p in sharing procedure. In order to evaluate efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB) and 1.74t⌈log2m⌉ bit-per-pixel (bpp), respectively. PMID:25140334
Multi-party semi-quantum key distribution-convertible multi-party semi-quantum secret sharing
NASA Astrophysics Data System (ADS)
Yu, Kun-Fei; Gu, Jun; Hwang, Tzonelih; Gope, Prosanta
2017-08-01
This paper proposes a multi-party semi-quantum secret sharing (MSQSS) protocol which allows a quantum party (manager) to share a secret among several classical parties (agents) based on GHZ-like states. By utilizing the special properties of GHZ-like states, the proposed scheme can easily detect outside eavesdropping attacks and has the highest qubit efficiency among the existing MSQSS protocols. Then, we illustrate an efficient way to convert the proposed MSQSS protocol into a multi-party semi-quantum key distribution (MSQKD) protocol. The proposed approach is even useful to convert all the existing measure-resend type of semi-quantum secret sharing protocols into semi-quantum key distribution protocols.
NASA Astrophysics Data System (ADS)
Gao, Gan; Wang, Li-Ping
2010-11-01
We propose a quantum secret sharing protocol, in which Bell states in the high dimension Hilbert space are employed. The biggest advantage of our protocol is the high source capacity. Compared with the previous secret sharing protocol, ours has the higher controlling efficiency. In addition, as decoy states in the high dimension Hilbert space are used, we needn’t destroy quantum entanglement for achieving the goal to check the channel security.
Dynamic quantum secret sharing by using d-dimensional GHZ state
NASA Astrophysics Data System (ADS)
Qin, Huawang; Dai, Yuewei
2017-03-01
Through generating the d-dimensional GHZ state in the Z-basis and measuring it in the X-basis, a dynamic quantum secret sharing scheme is proposed. In the proposed scheme, multiple participants can be added or deleted in one update period, and the shared secret does not need to be changed. The participants can be added or deleted by themselves, and the dealer does not need to be online. Compared to the existing schemes, the proposed scheme is more efficient and more practical.
Two new Controlled not Gate Based Quantum Secret Sharing Protocols without Entanglement Attenuation
NASA Astrophysics Data System (ADS)
Zhu, Zhen-Chao; Hu, Ai-Qun; Fu, An-Min
2016-05-01
In this paper, we propose two new controlled not gate based quantum secret sharing protocols. In these two protocols, each photon only travels once, which guarantees the agents located in long distance can be able to derive the dealer's secret without suffering entanglement attenuation problem. The protocols are secure against trojan horse attack, intercept-resend attack, entangle-measure attack and entanglement-swapping attack. The theoretical efficiency for qubits of these two protocols can approach 100 %, except those used for eavesdropping checking, all entangled states can be used for final secret sharing.
NASA Astrophysics Data System (ADS)
Song, Yun; Li, Yongming; Wang, Wenhua
2018-02-01
This paper proposed a new and efficient multiparty quantum direct secret sharing (QDSS) by using swapping quantum entanglement of Bell states. In the proposed scheme, the quantum correlation between the possible measurement results of the members (except dealer) and the original local unitary operation encoded by the dealer was presented. All agents only need to perform Bell measurements to share dealer's secret by recovering dealer's operation without performing any unitary operation. Our scheme has several advantages. The dealer is not required to retain any photons, and can further share a predetermined key instead of a random key to the agents. It has high capacity as two bits of secret messages can be transmitted by an EPR pair and the intrinsic efficiency approaches 100%, because no classical bit needs to be transmitted except those for detection. Without inserting any checking sets for detecting the eavesdropping, the scheme can resist not only the existing attacks, but also the cheating attack from the dishonest agent.
Quantum secret sharing for a general quantum access structure
NASA Astrophysics Data System (ADS)
Bai, Chen-Ming; Li, Zhi-Hui; Si, Meng-Meng; Li, Yong-Ming
2017-10-01
Quantum secret sharing is a procedure for sharing a secret among a number of participants such that only certain subsets of participants can collaboratively reconstruct it, which are called authorized sets. The quantum access structure of a secret sharing is a family of all authorized sets. Firstly, in this paper, we propose the concept of decomposition of quantum access structure to design a quantum secret sharing scheme. Secondly, based on a maximal quantum access structure (MQAS) [D. Gottesman, Phys. Rev. A 61, 042311 (2000)], we propose an algorithm to improve a MQAS and obtain an improved maximal quantum access structure (IMQAS). Then, we present a sufficient and necessary condition about IMQAS, which shows the relationship between the minimal authorized sets and the players. In accordance with properties, we construct an efficient quantum secret sharing scheme with a decomposition and IMQAS. A major advantage of these techniques is that it allows us to construct a method to realize a general quantum access structure. Finally, we present two kinds of quantum secret sharing schemes via the thought of concatenation or a decomposition of quantum access structure. As a consequence, we find that the application of these techniques allows us to save more quantum shares and reduces more cost than the existing scheme.
Secret Sharing of a Quantum State.
Lu, He; Zhang, Zhen; Chen, Luo-Kan; Li, Zheng-Da; Liu, Chang; Li, Li; Liu, Nai-Le; Ma, Xiongfeng; Chen, Yu-Ao; Pan, Jian-Wei
2016-07-15
Secret sharing of a quantum state, or quantum secret sharing, in which a dealer wants to share a certain amount of quantum information with a few players, has wide applications in quantum information. The critical criterion in a threshold secret sharing scheme is confidentiality: with less than the designated number of players, no information can be recovered. Furthermore, in a quantum scenario, one additional critical criterion exists: the capability of sharing entangled and unknown quantum information. Here, by employing a six-photon entangled state, we demonstrate a quantum threshold scheme, where the shared quantum secrecy can be efficiently reconstructed with a state fidelity as high as 93%. By observing that any one or two parties cannot recover the secrecy, we show that our scheme meets the confidentiality criterion. Meanwhile, we also demonstrate that entangled quantum information can be shared and recovered via our setting, which shows that our implemented scheme is fully quantum. Moreover, our experimental setup can be treated as a decoding circuit of the five-qubit quantum error-correcting code with two erasure errors.
Cryptanalysis and Improvement of the Semi-quantum Secret Sharing Protocol
NASA Astrophysics Data System (ADS)
Gao, Xiang; Zhang, Shibin; Chang, Yan
2017-08-01
Recently, Xie et al. Int. J. Theor. Phys. 54, 3819-3824, (2015) proposed a Semi-quantum secret sharing protocol (SQSS). Yin et al. Int. J. Theor. Phys. 55: 4027-4035, (2016) pointed out that this protocol suffers from the intercept-resend attack. Yin et al. also proposed an improved protocol. However, we find out that Yin et al.'s paper has some problems, we analyze Yin et al.'s paper, then proposed the improved semi-quantum secret sharing protocol. Our protocol is more secure and efficient, most importantly, our protocol satisfies the condition of semi-quantum.
Revisiting Deng et al.'s Multiparty Quantum Secret Sharing Protocol
NASA Astrophysics Data System (ADS)
Hwang, Tzonelih; Hwang, Cheng-Chieh; Yang, Chun-Wei; Li, Chuan-Ming
2011-09-01
The multiparty quantum secret sharing protocol [Deng et al. in Chin. Phys. Lett. 23: 1084-1087, 2006] is revisited in this study. It is found that the performance of Deng et al.'s protocol can be much improved by using the techniques of block-transmission and decoy single photons. As a result, the qubit efficiency is improved 2.4 times and only one classical communication, a public discussion, and two quantum communications between each agent and the secret holder are needed rather than n classical communications, n public discussions, and 3n/2 quantum communications required in the original scheme.
A novel semi-quantum secret sharing scheme based on Bell states
NASA Astrophysics Data System (ADS)
Yin, Aihan; Wang, Zefan; Fu, Fangbo
2017-05-01
A semi-quantum secret sharing (SQSS) scheme based on Bell states is proposed in this paper. The sender who can perform any relevant quantum operations uses Bell states to share the secret keys with her participants that are limited to perform classical operations on the transmitted qubits. It is found that our scheme is easy to generalize from three parties to multiparty and more efficient than the previous schemes [Q. Li, W. H. Chan and D. Y. Long, Phys. Rev. A 82 (2010) 022303; L. Z. Li, D. W. Qiu and P. Mateus, J. Phys. A: Math. Theor. 26 (2013) 045304; C. Xie, L. Z. Li and D. W. Qiu, Int. J. Theor. Phys. 54 (2015) 3819].
The physical boundaries of public goods cooperation between surface-attached bacterial cells
Weigert, Michael; Kümmerli, Rolf
2017-01-01
Bacteria secrete a variety of compounds important for nutrient scavenging, competition mediation and infection establishment. While there is a general consensus that secreted compounds can be shared and therefore have social consequences for the bacterial collective, we know little about the physical limits of such bacterial social interactions. Here, we address this issue by studying the sharing of iron-scavenging siderophores between surface-attached microcolonies of the bacterium Pseudomonas aeruginosa. Using single-cell fluorescent microscopy, we show that siderophores, secreted by producers, quickly reach non-producers within a range of 100 µm, and significantly boost their fitness. Producers in turn respond to variation in sharing efficiency by adjusting their pyoverdine investment levels. These social effects wane with larger cell-to-cell distances and on hard surfaces. Thus, our findings reveal the boundaries of compound sharing, and show that sharing is particularly relevant between nearby yet physically separated bacteria on soft surfaces, matching realistic natural conditions such as those encountered in soft tissue infections. PMID:28701557
Computing on quantum shared secrets
NASA Astrophysics Data System (ADS)
Ouyang, Yingkai; Tan, Si-Hui; Zhao, Liming; Fitzsimons, Joseph F.
2017-11-01
A (k ,n )-threshold secret-sharing scheme allows for a string to be split into n shares in such a way that any subset of at least k shares suffices to recover the secret string, but such that any subset of at most k -1 shares contains no information about the secret. Quantum secret-sharing schemes extend this idea to the sharing of quantum states. Here we propose a method of performing computation securely on quantum shared secrets. We introduce a (n ,n )-quantum secret sharing scheme together with a set of algorithms that allow quantum circuits to be evaluated securely on the shared secret without the need to decode the secret. We consider a multipartite setting, with each participant holding a share of the secret. We show that if there exists at least one honest participant, no group of dishonest participants can recover any information about the shared secret, independent of their deviations from the algorithm.
Sequential Quantum Secret Sharing Using a Single Qudit
NASA Astrophysics Data System (ADS)
Bai, Chen-Ming; Li, Zhi-Hui; Li, Yong-Ming
2018-05-01
In this paper we propose a novel and efficient quantum secret sharing protocol using d-level single particle, which it can realize a general access structure via the thought of concatenation. In addition, Our scheme includes all advantages of Tavakoli’s scheme [Phys. Rev. A 92 (2015) 030302(R)]. In contrast to Tavakoli’s scheme, the efficiency of our scheme is 1 for the same situation, and the access structure is more general and has advantages in practical significance. Furthermore, we also analyze the security of our scheme in the primary quantum attacks. Sponsored by the National Natural Science Foundation of China under Grant Nos. 61373150 and 61602291, and Industrial Research and Development Project of Science and Technology of Shaanxi Province under Grant No. 2013k0611
Simulating cloud environment for HIS backup using secret sharing.
Kuroda, Tomohiro; Kimura, Eizen; Matsumura, Yasushi; Yamashita, Yoshinori; Hiramatsu, Haruhiko; Kume, Naoto
2013-01-01
In the face of a disaster hospitals are expected to be able to continue providing efficient and high-quality care to patients. It is therefore crucial for hospitals to develop business continuity plans (BCPs) that identify their vulnerabilities, and prepare procedures to overcome them. A key aspect of most hospitals' BCPs is creating the backup of the hospital information system (HIS) data at multiple remote sites. However, the need to keep the data confidential dramatically increases the costs of making such backups. Secret sharing is a method to split an original secret message so that individual pieces are meaningless, but putting sufficient number of pieces together reveals the original message. It allows creation of pseudo-redundant arrays of independent disks for privacy-sensitive data over the Internet. We developed a secret sharing environment for StarBED, a large-scale network experiment environment, and evaluated its potential and performance during disaster recovery. Simulation results showed that the entire main HIS database of Kyoto University Hospital could be retrieved within three days even if one of the distributed storage systems crashed during a disaster.
Unitary reconstruction of secret for stabilizer-based quantum secret sharing
NASA Astrophysics Data System (ADS)
Matsumoto, Ryutaroh
2017-08-01
We propose a unitary procedure to reconstruct quantum secret for a quantum secret sharing scheme constructed from stabilizer quantum error-correcting codes. Erasure correcting procedures for stabilizer codes need to add missing shares for reconstruction of quantum secret, while unitary reconstruction procedures for certain class of quantum secret sharing are known to work without adding missing shares. The proposed procedure also works without adding missing shares.
A secure data outsourcing scheme based on Asmuth-Bloom secret sharing
NASA Astrophysics Data System (ADS)
Idris Muhammad, Yusuf; Kaiiali, Mustafa; Habbal, Adib; Wazan, A. S.; Sani Ilyasu, Auwal
2016-11-01
Data outsourcing is an emerging paradigm for data management in which a database is provided as a service by third-party service providers. One of the major benefits of offering database as a service is to provide organisations, which are unable to purchase expensive hardware and software to host their databases, with efficient data storage accessible online at a cheap rate. Despite that, several issues of data confidentiality, integrity, availability and efficient indexing of users' queries at the server side have to be addressed in the data outsourcing paradigm. Service providers have to guarantee that their clients' data are secured against internal (insider) and external attacks. This paper briefly analyses the existing indexing schemes in data outsourcing and highlights their advantages and disadvantages. Then, this paper proposes a secure data outsourcing scheme based on Asmuth-Bloom secret sharing which tries to address the issues in data outsourcing such as data confidentiality, availability and order preservation for efficient indexing.
Semiquantum secret sharing using entangled states
DOE Office of Scientific and Technical Information (OSTI.GOV)
Li Qin; Department of Computer Science, Sun Yat-sen University, Guangzhou 510006; Department of Mathematics, Hong Kong Baptist University, Kowloon
Secret sharing is a procedure for sharing a secret among a number of participants such that only the qualified subsets of participants have the ability to reconstruct the secret. Even in the presence of eavesdropping, secret sharing can be achieved when all the members are quantum. So what happens if not all the members are quantum? In this paper, we propose two semiquantum secret sharing protocols by using maximally entangled Greenberger-Horne-Zeilinger-type states in which quantum Alice shares a secret with two classical parties, Bob and Charlie, in a way that both parties are sufficient to obtain the secret, but onemore » of them cannot. The presented protocols are also shown to be secure against eavesdropping.« less
Maclaren, Oliver J.; Sneyd, James; Crampin, Edmund J.
2012-01-01
Secretion from the salivary glands is driven by osmosis following the establishment of osmotic gradients between the lumen, the cell and the interstitium by active ion transport. We consider a dynamic model of osmotically-driven primary saliva secretion, and use singular perturbation approaches and scaling assumptions to reduce the model. Our analysis shows that isosmotic secretion is the most efficient secretion regime, and that this holds for single isolated cells and for multiple cells assembled into an acinus. For typical parameter variations, we rule out any significant synergistic effect on total water secretion of an acinar arrangement of cells about a single shared lumen. Conditions for the attainment of isosmotic secretion are considered, and we derive an expression for how the concentration gradient between the interstitium and the lumen scales with water and chloride transport parameters. Aquaporin knockout studies are interpreted in the context of our analysis and further investigated using simulations of transport efficiency with different membrane water permeabilities. We conclude that recent claims that aquaporin knockout studies can be interpreted as evidence against a simple osmotic mechanism are not supported by our work. Many of the results that we obtain are independent of specific transporter details, and our analysis can be easily extended to apply to models that use other proposed ionic mechanisms of saliva secretion. PMID:22258315
Quantum secret sharing with qudit graph states
DOE Office of Scientific and Technical Information (OSTI.GOV)
Keet, Adrian; Fortescue, Ben; Sanders, Barry C.
We present a unified formalism for threshold quantum secret sharing using graph states of systems with prime dimension. We construct protocols for three varieties of secret sharing: with classical and quantum secrets shared between parties over both classical and quantum channels.
Security of a kind of quantum secret sharing with entangled states.
Wang, Tian-Yin; Liu, Ying-Zhao; Wei, Chun-Yan; Cai, Xiao-Qiu; Ma, Jian-Feng
2017-05-30
We present a new collusion attack to a kind of quantum secret sharing schemes with entangled states. Using this attack, an unauthorized set of agents can gain access to the shared secret without the others' cooperation. Furthermore, we establish a general model for this kind of quantum secret sharing schemes and then give some necessary conditions to design a secure quantum secret sharing scheme under this model.
An Image Secret Sharing Method
2006-07-01
the secret image in lossless manner and (2) any or fewer image shares cannot get sufficient information to reveal the ... secret image. It is an effective, reliable and secure method to prevent the secret image from being lost, stolen or corrupted. In comparison with...other image secret sharing methods, this approach’s advantages are its large compression rate on the size of the image shares, its strong protection of the secret image and its ability for real-time
Hepp, Christof; Maier, Berenike
2017-10-01
Secretion systems enable bacteria to import and secrete large macromolecules including DNA and proteins. While most components of these systems have been identified, the molecular mechanisms of macromolecular transport remain poorly understood. Recent findings suggest that various bacterial secretion systems make use of the translocation ratchet mechanism for transporting polymers across the cell envelope. Translocation ratchets are powered by chemical potential differences generated by concentration gradients of ions or molecules that are specific to the respective secretion systems. Bacteria employ these potential differences for biasing Brownian motion of the macromolecules within the conduits of the secretion systems. Candidates for this mechanism include DNA import by the type II secretion/type IV pilus system, DNA export by the type IV secretion system, and protein export by the type I secretion system. Here, we propose that these three secretion systems employ different molecular implementations of the translocation ratchet mechanism. © 2017 The Authors. BioEssays Published by WILEY Periodicals, Inc.
NASA Astrophysics Data System (ADS)
Wang, Xiao-Jun; An, Long-Xi; Yu, Xu-Tao; Zhang, Zai-Chen
2017-10-01
A multilayer quantum secret sharing protocol based on GHZ state is proposed. Alice has the secret carried by quantum state and wants to distribute this secret to multiple agent nodes in the network. In this protocol, the secret is transmitted and shared layer by layer from root Alice to layered agents. The number of agents in each layer is a geometric sequence with a specific common ratio. By sharing GHZ maximally entangled states and making generalized Bell basis measurement, one qubit state can be distributed to multiparty agents and the secret is shared. Only when all agents at the last layer cooperate together, the secret can be recovered. Compared with other protocols based on the entangled state, this protocol adopts layered construction so that secret can be distributed to more agents with fewer particles GHZ state. This quantum secret sharing protocol can be used in wireless network to ensure the security of information delivery.
Relativistic (2,3)-threshold quantum secret sharing
NASA Astrophysics Data System (ADS)
Ahmadi, Mehdi; Wu, Ya-Dong; Sanders, Barry C.
2017-09-01
In quantum secret sharing protocols, the usual presumption is that the distribution of quantum shares and players' collaboration are both performed inertially. Here we develop a quantum secret sharing protocol that relaxes these assumptions wherein we consider the effects due to the accelerating motion of the shares. Specifically, we solve the (2,3)-threshold continuous-variable quantum secret sharing in noninertial frames. To this aim, we formulate the effect of relativistic motion on the quantum field inside a cavity as a bosonic quantum Gaussian channel. We investigate how the fidelity of quantum secret sharing is affected by nonuniform motion of the quantum shares. Furthermore, we fully characterize the canonical form of the Gaussian channel, which can be utilized in quantum-information-processing protocols to include relativistic effects.
Steganography on multiple MP3 files using spread spectrum and Shamir's secret sharing
NASA Astrophysics Data System (ADS)
Yoeseph, N. M.; Purnomo, F. A.; Riasti, B. K.; Safiie, M. A.; Hidayat, T. N.
2016-11-01
The purpose of steganography is how to hide data into another media. In order to increase security of data, steganography technique is often combined with cryptography. The weakness of this combination technique is the data was centralized. Therefore, a steganography technique is develop by using combination of spread spectrum and secret sharing technique. In steganography with secret sharing, shares of data is created and hidden in several medium. Medium used to concealed shares were MP3 files. Hiding technique used was Spread Spectrum. Secret sharing scheme used was Shamir's Secret Sharing. The result showed that steganography with spread spectrum combined with Shamir's Secret Share using MP3 files as medium produce a technique that could hid data into several cover. To extract and reconstruct the data hidden in stego object, it is needed the amount of stego object which more or equal to its threshold. Furthermore, stego objects were imperceptible and robust.
Shared Secrets versus Secrets Kept Private Are Linked to Better Adolescent Adjustment
ERIC Educational Resources Information Center
Frijns, Tom; Finkenauer, Catrin; Keijsers, Loes
2013-01-01
It is a household notion that secrecy is bad while sharing is good. But what about shared secrets? The present research adopts a functional analysis of sharing secrets, arguing that it should negate harmful consequences generally associated with secrecy and serves important interpersonal functions in adolescence. A survey study among 790 Dutch…
A Secret 3D Model Sharing Scheme with Reversible Data Hiding Based on Space Subdivision
NASA Astrophysics Data System (ADS)
Tsai, Yuan-Yu
2016-03-01
Secret sharing is a highly relevant research field, and its application to 2D images has been thoroughly studied. However, secret sharing schemes have not kept pace with the advances of 3D models. With the rapid development of 3D multimedia techniques, extending the application of secret sharing schemes to 3D models has become necessary. In this study, an innovative secret 3D model sharing scheme for point geometries based on space subdivision is proposed. Each point in the secret point geometry is first encoded into a series of integer values that fall within [0, p - 1], where p is a predefined prime number. The share values are derived by substituting the specified integer values for all coefficients of the sharing polynomial. The surface reconstruction and the sampling concepts are then integrated to derive a cover model with sufficient model complexity for each participant. Finally, each participant has a separate 3D stego model with embedded share values. Experimental results show that the proposed technique supports reversible data hiding and the share values have higher levels of privacy and improved robustness. This technique is simple and has proven to be a feasible secret 3D model sharing scheme.
Hybrid threshold adaptable quantum secret sharing scheme with reverse Huffman-Fibonacci-tree coding.
Lai, Hong; Zhang, Jun; Luo, Ming-Xing; Pan, Lei; Pieprzyk, Josef; Xiao, Fuyuan; Orgun, Mehmet A
2016-08-12
With prevalent attacks in communication, sharing a secret between communicating parties is an ongoing challenge. Moreover, it is important to integrate quantum solutions with classical secret sharing schemes with low computational cost for the real world use. This paper proposes a novel hybrid threshold adaptable quantum secret sharing scheme, using an m-bonacci orbital angular momentum (OAM) pump, Lagrange interpolation polynomials, and reverse Huffman-Fibonacci-tree coding. To be exact, we employ entangled states prepared by m-bonacci sequences to detect eavesdropping. Meanwhile, we encode m-bonacci sequences in Lagrange interpolation polynomials to generate the shares of a secret with reverse Huffman-Fibonacci-tree coding. The advantages of the proposed scheme is that it can detect eavesdropping without joint quantum operations, and permits secret sharing for an arbitrary but no less than threshold-value number of classical participants with much lower bandwidth. Also, in comparison with existing quantum secret sharing schemes, it still works when there are dynamic changes, such as the unavailability of some quantum channel, the arrival of new participants and the departure of participants. Finally, we provide security analysis of the new hybrid quantum secret sharing scheme and discuss its useful features for modern applications.
Hybrid threshold adaptable quantum secret sharing scheme with reverse Huffman-Fibonacci-tree coding
Lai, Hong; Zhang, Jun; Luo, Ming-Xing; Pan, Lei; Pieprzyk, Josef; Xiao, Fuyuan; Orgun, Mehmet A.
2016-01-01
With prevalent attacks in communication, sharing a secret between communicating parties is an ongoing challenge. Moreover, it is important to integrate quantum solutions with classical secret sharing schemes with low computational cost for the real world use. This paper proposes a novel hybrid threshold adaptable quantum secret sharing scheme, using an m-bonacci orbital angular momentum (OAM) pump, Lagrange interpolation polynomials, and reverse Huffman-Fibonacci-tree coding. To be exact, we employ entangled states prepared by m-bonacci sequences to detect eavesdropping. Meanwhile, we encode m-bonacci sequences in Lagrange interpolation polynomials to generate the shares of a secret with reverse Huffman-Fibonacci-tree coding. The advantages of the proposed scheme is that it can detect eavesdropping without joint quantum operations, and permits secret sharing for an arbitrary but no less than threshold-value number of classical participants with much lower bandwidth. Also, in comparison with existing quantum secret sharing schemes, it still works when there are dynamic changes, such as the unavailability of some quantum channel, the arrival of new participants and the departure of participants. Finally, we provide security analysis of the new hybrid quantum secret sharing scheme and discuss its useful features for modern applications. PMID:27515908
Threshold multi-secret sharing scheme based on phase-shifting interferometry
NASA Astrophysics Data System (ADS)
Deng, Xiaopeng; Wen, Wei; Shi, Zhengang
2017-03-01
A threshold multi-secret sharing scheme is proposed based on phase-shifting interferometry. The K secret images to be shared are firstly encoded by using Fourier transformation, respectively. Then, these encoded images are shared into many shadow images based on recording principle of the phase-shifting interferometry. In the recovering stage, the secret images can be restored by combining any 2 K + 1 or more shadow images, while any 2 K or fewer shadow images cannot obtain any information about the secret images. As a result, a (2 K + 1 , N) threshold multi-secret sharing scheme can be implemented. Simulation results are presented to demonstrate the feasibility of the proposed method.
Eavesdropping on the improved three-party quantum secret sharing protocol
NASA Astrophysics Data System (ADS)
Gao, Gan
2011-02-01
Lin et al. [Song Lin, Fei Gao, Qiao-yan Wen, Fu-chen Zhu, Opt. Commun. 281 (2008) 4553] pointed out that the multiparty quantum secret sharing protocol [Zhan-jun Zhang, Gan Gao, Xin Wang, Lian-fang Han, Shou-hua Shi, Opt. Commun. 269 (2007) 418] is not secure and proposed an improved three-party quantum secret sharing protocol. In this paper, we study the security of the improved three-party quantum secret sharing protocol and find that it is still not secure. Finally, a further improved three-party quantum secret sharing protocol is proposed.
A Note on Threshold Schemes with Disenrollment
2003-01-01
such a way that t or more participants can construct the secret by pooling their shares, but the secret remains undetermined to (t − 1) or fewer par...the threshold size t by 1, because (t− 1) shares plus the disclosed share can decrypt the secret . To keep the same level of secrecy in terms of...t. (2) In a (t, n) threshold scheme, the secret K is recoverable from t or more shares based on condition (1), but the secret remains uncertain even
Secret sharing based on quantum Fourier transform
NASA Astrophysics Data System (ADS)
Yang, Wei; Huang, Liusheng; Shi, Runhua; He, Libao
2013-07-01
Secret sharing plays a fundamental role in both secure multi-party computation and modern cryptography. We present a new quantum secret sharing scheme based on quantum Fourier transform. This scheme enjoys the property that each share of a secret is disguised with true randomness, rather than classical pseudorandomness. Moreover, under the only assumption that a top priority for all participants (secret sharers and recovers) is to obtain the right result, our scheme is able to achieve provable security against a computationally unbounded attacker.
Sequential quantum secret sharing in a noisy environment aided with weak measurements
NASA Astrophysics Data System (ADS)
Ray, Maharshi; Chatterjee, Sourav; Chakrabarty, Indranil
2016-05-01
In this work we give a (n,n)-threshold protocol for sequential secret sharing of quantum information for the first time. By sequential secret sharing we refer to a situation where the dealer is not having all the secrets at the same time, at the beginning of the protocol; however if the dealer wishes to share secrets at subsequent phases she/he can realize it with the help of our protocol. First of all we present our protocol for three parties and later we generalize it for the situation where we have more (n> 3) parties. Interestingly, we show that our protocol of sequential secret sharing requires less amount of quantum as well as classical resource as compared to the situation wherein existing protocols are repeatedly used. Further in a much more realistic situation, we consider the sharing of qubits through two kinds of noisy channels, namely the phase damping channel (PDC) and the amplitude damping channel (ADC). When we carry out the sequential secret sharing in the presence of noise we observe that the fidelity of secret sharing at the kth iteration is independent of the effect of noise at the (k - 1)th iteration. In case of ADC we have seen that the average fidelity of secret sharing drops down to ½ which is equivalent to a random guess of the quantum secret. Interestingly, we find that by applying weak measurements one can enhance the average fidelity. This increase of the average fidelity can be achieved with certain trade off with the success probability of the weak measurements.
Quantum Optimal Multiple Assignment Scheme for Realizing General Access Structure of Secret Sharing
NASA Astrophysics Data System (ADS)
Matsumoto, Ryutaroh
The multiple assignment scheme is to assign one or more shares to single participant so that any kind of access structure can be realized by classical secret sharing schemes. We propose its quantum version including ramp secret sharing schemes. Then we propose an integer optimization approach to minimize the average share size.
Quantum Stabilizer Codes Can Realize Access Structures Impossible by Classical Secret Sharing
NASA Astrophysics Data System (ADS)
Matsumoto, Ryutaroh
We show a simple example of a secret sharing scheme encoding classical secret to quantum shares that can realize an access structure impossible by classical information processing with limitation on the size of each share. The example is based on quantum stabilizer codes.
Deterministic secure quantum communication using a single d-level system.
Jiang, Dong; Chen, Yuanyuan; Gu, Xuemei; Xie, Ling; Chen, Lijun
2017-03-22
Deterministic secure quantum communication (DSQC) can transmit secret messages between two parties without first generating a shared secret key. Compared with quantum key distribution (QKD), DSQC avoids the waste of qubits arising from basis reconciliation and thus reaches higher efficiency. In this paper, based on data block transmission and order rearrangement technologies, we propose a DSQC protocol. It utilizes a set of single d-level systems as message carriers, which are used to directly encode the secret message in one communication process. Theoretical analysis shows that these employed technologies guarantee the security, and the use of a higher dimensional quantum system makes our protocol achieve higher security and efficiency. Since only quantum memory is required for implementation, our protocol is feasible with current technologies. Furthermore, Trojan horse attack (THA) is taken into account in our protocol. We give a THA model and show that THA significantly increases the multi-photon rate and can thus be detected.
A Secure and Efficient Scalable Secret Image Sharing Scheme with Flexible Shadow Sizes.
Xie, Dong; Li, Lixiang; Peng, Haipeng; Yang, Yixian
2017-01-01
In a general (k, n) scalable secret image sharing (SSIS) scheme, the secret image is shared by n participants and any k or more than k participants have the ability to reconstruct it. The scalability means that the amount of information in the reconstructed image scales in proportion to the number of the participants. In most existing SSIS schemes, the size of each image shadow is relatively large and the dealer does not has a flexible control strategy to adjust it to meet the demand of differen applications. Besides, almost all existing SSIS schemes are not applicable under noise circumstances. To address these deficiencies, in this paper we present a novel SSIS scheme based on a brand-new technique, called compressed sensing, which has been widely used in many fields such as image processing, wireless communication and medical imaging. Our scheme has the property of flexibility, which means that the dealer can achieve a compromise between the size of each shadow and the quality of the reconstructed image. In addition, our scheme has many other advantages, including smooth scalability, noise-resilient capability, and high security. The experimental results and the comparison with similar works demonstrate the feasibility and superiority of our scheme.
Threshold quantum secret sharing based on single qubit
NASA Astrophysics Data System (ADS)
Lu, Changbin; Miao, Fuyou; Meng, Keju; Yu, Yue
2018-03-01
Based on unitary phase shift operation on single qubit in association with Shamir's ( t, n) secret sharing, a ( t, n) threshold quantum secret sharing scheme (or ( t, n)-QSS) is proposed to share both classical information and quantum states. The scheme uses decoy photons to prevent eavesdropping and employs the secret in Shamir's scheme as the private value to guarantee the correctness of secret reconstruction. Analyses show it is resistant to typical intercept-and-resend attack, entangle-and-measure attack and participant attacks such as entanglement swapping attack. Moreover, it is easier to realize in physic and more practical in applications when compared with related ones. By the method in our scheme, new ( t, n)-QSS schemes can be easily constructed using other classical ( t, n) secret sharing.
Novel Threshold Changeable Secret Sharing Schemes Based on Polynomial Interpolation
Li, Mingchu; Guo, Cheng; Choo, Kim-Kwang Raymond; Ren, Yizhi
2016-01-01
After any distribution of secret sharing shadows in a threshold changeable secret sharing scheme, the threshold may need to be adjusted to deal with changes in the security policy and adversary structure. For example, when employees leave the organization, it is not realistic to expect departing employees to ensure the security of their secret shadows. Therefore, in 2012, Zhang et al. proposed (t → t′, n) and ({t1, t2,⋯, tN}, n) threshold changeable secret sharing schemes. However, their schemes suffer from a number of limitations such as strict limit on the threshold values, large storage space requirement for secret shadows, and significant computation for constructing and recovering polynomials. To address these limitations, we propose two improved dealer-free threshold changeable secret sharing schemes. In our schemes, we construct polynomials to update secret shadows, and use two-variable one-way function to resist collusion attacks and secure the information stored by the combiner. We then demonstrate our schemes can adjust the threshold safely. PMID:27792784
Novel Threshold Changeable Secret Sharing Schemes Based on Polynomial Interpolation.
Yuan, Lifeng; Li, Mingchu; Guo, Cheng; Choo, Kim-Kwang Raymond; Ren, Yizhi
2016-01-01
After any distribution of secret sharing shadows in a threshold changeable secret sharing scheme, the threshold may need to be adjusted to deal with changes in the security policy and adversary structure. For example, when employees leave the organization, it is not realistic to expect departing employees to ensure the security of their secret shadows. Therefore, in 2012, Zhang et al. proposed (t → t', n) and ({t1, t2,⋯, tN}, n) threshold changeable secret sharing schemes. However, their schemes suffer from a number of limitations such as strict limit on the threshold values, large storage space requirement for secret shadows, and significant computation for constructing and recovering polynomials. To address these limitations, we propose two improved dealer-free threshold changeable secret sharing schemes. In our schemes, we construct polynomials to update secret shadows, and use two-variable one-way function to resist collusion attacks and secure the information stored by the combiner. We then demonstrate our schemes can adjust the threshold safely.
Serial interpolation for secure membership testing and matching in a secret-split archive
Kroeger, Thomas M.; Benson, Thomas R.
2016-12-06
The various technologies presented herein relate to analyzing a plurality of shares stored at a plurality of repositories to determine whether a secret from which the shares were formed matches a term in a query. A threshold number of shares are formed with a generating polynomial operating on the secret. A process of serially interpolating the threshold number of shares can be conducted whereby a contribution of a first share is determined, a contribution of a second share is determined while seeded with the contribution of the first share, etc. A value of a final share in the threshold number of shares can be determined and compared with the search term. In the event of the value of the final share and the search term matching, the search term matches the secret in the file from which the shares are formed.
Entanglement-secured single-qubit quantum secret sharing
DOE Office of Scientific and Technical Information (OSTI.GOV)
Scherpelz, P.; Resch, R.; Berryrieser, D.
In single-qubit quantum secret sharing, a secret is shared between N parties via manipulation and measurement of one qubit at a time. Each qubit is sent to all N parties in sequence; the secret is encoded in the first participant's preparation of the qubit state and the subsequent participants' choices of state rotation or measurement basis. We present a protocol for single-qubit quantum secret sharing using polarization entanglement of photon pairs produced in type-I spontaneous parametric downconversion. We investigate the protocol's security against eavesdropping attack under common experimental conditions: a lossy channel for photon transmission, and imperfect preparation of themore » initial qubit state. A protocol which exploits entanglement between photons, rather than simply polarization correlation, is more robustly secure. We implement the entanglement-based secret-sharing protocol with 87% secret-sharing fidelity, limited by the purity of the entangled state produced by our present apparatus. We demonstrate a photon-number splitting eavesdropping attack, which achieves no success against the entanglement-based protocol while showing the predicted rate of success against a correlation-based protocol.« less
A Generalized Information Theoretical Model for Quantum Secret Sharing
NASA Astrophysics Data System (ADS)
Bai, Chen-Ming; Li, Zhi-Hui; Xu, Ting-Ting; Li, Yong-Ming
2016-11-01
An information theoretical model for quantum secret sharing was introduced by H. Imai et al. (Quantum Inf. Comput. 5(1), 69-80 2005), which was analyzed by quantum information theory. In this paper, we analyze this information theoretical model using the properties of the quantum access structure. By the analysis we propose a generalized model definition for the quantum secret sharing schemes. In our model, there are more quantum access structures which can be realized by our generalized quantum secret sharing schemes than those of the previous one. In addition, we also analyse two kinds of important quantum access structures to illustrate the existence and rationality for the generalized quantum secret sharing schemes and consider the security of the scheme by simple examples.
Bounds on the information rate of quantum-secret-sharing schemes
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sarvepalli, Pradeep
An important metric of the performance of a quantum-secret-sharing scheme is its information rate. Beyond the fact that the information rate is upper-bounded by one, very little is known in terms of bounds on the information rate of quantum-secret-sharing schemes. Furthermore, not every scheme can be realized with rate one. In this paper we derive upper bounds for the information rates of quantum-secret-sharing schemes. We show that there exist quantum access structures on n players for which the information rate cannot be better than O((log{sub 2}n)/n). These results are the quantum analogues of the bounds for classical-secret-sharing schemes proved bymore » Csirmaz.« less
Sagnac secret sharing over telecom fiber networks.
Bogdanski, Jan; Ahrens, Johan; Bourennane, Mohamed
2009-01-19
We report the first Sagnac quantum secret sharing (in three-and four-party implementations) over 1550 nm single mode fiber (SMF) networks, using a single qubit protocol with phase encoding. Our secret sharing experiment has been based on a single qubit protocol, which has opened the door to practical secret sharing implementation over fiber telecom channels and in free-space. The previous quantum secret sharing proposals were based on multiparticle entangled states, difficult in the practical implementation and not scalable. Our experimental data in the three-party implementation show stable (in regards to birefringence drift) quantum secret sharing transmissions at the total Sagnac transmission loop distances of 55-75 km with the quantum bit error rates (QBER) of 2.3-2.4% for the mean photon number micro?= 0.1 and 1.7-2.1% for micro= 0.3. In the four-party case we have achieved quantum secret sharing transmissions at the total Sagnac transmission loop distances of 45-55 km with the quantum bit error rates (QBER) of 3.0-3.7% for the mean photon number micro= 0.1 and 1.8-3.0% for micro?= 0.3. The stability of quantum transmission has been achieved thanks to our new concept for compensation of SMF birefringence effects in Sagnac, based on a polarization control system and a polarization insensitive phase modulator. The measurement results have showed feasibility of quantum secret sharing over telecom fiber networks in Sagnac configuration, using standard fiber telecom components.
Optical threshold secret sharing scheme based on basic vector operations and coherence superposition
NASA Astrophysics Data System (ADS)
Deng, Xiaopeng; Wen, Wei; Mi, Xianwu; Long, Xuewen
2015-04-01
We propose, to our knowledge for the first time, a simple optical algorithm for secret image sharing with the (2,n) threshold scheme based on basic vector operations and coherence superposition. The secret image to be shared is firstly divided into n shadow images by use of basic vector operations. In the reconstruction stage, the secret image can be retrieved by recording the intensity of the coherence superposition of any two shadow images. Compared with the published encryption techniques which focus narrowly on information encryption, the proposed method can realize information encryption as well as secret sharing, which further ensures the safety and integrality of the secret information and prevents power from being kept centralized and abused. The feasibility and effectiveness of the proposed method are demonstrated by numerical results.
A Secure and Efficient Scalable Secret Image Sharing Scheme with Flexible Shadow Sizes
Xie, Dong; Li, Lixiang; Peng, Haipeng; Yang, Yixian
2017-01-01
In a general (k, n) scalable secret image sharing (SSIS) scheme, the secret image is shared by n participants and any k or more than k participants have the ability to reconstruct it. The scalability means that the amount of information in the reconstructed image scales in proportion to the number of the participants. In most existing SSIS schemes, the size of each image shadow is relatively large and the dealer does not has a flexible control strategy to adjust it to meet the demand of differen applications. Besides, almost all existing SSIS schemes are not applicable under noise circumstances. To address these deficiencies, in this paper we present a novel SSIS scheme based on a brand-new technique, called compressed sensing, which has been widely used in many fields such as image processing, wireless communication and medical imaging. Our scheme has the property of flexibility, which means that the dealer can achieve a compromise between the size of each shadow and the quality of the reconstructed image. In addition, our scheme has many other advantages, including smooth scalability, noise-resilient capability, and high security. The experimental results and the comparison with similar works demonstrate the feasibility and superiority of our scheme. PMID:28072851
Verifiable Secret Redistribution
2001-10-01
but they are not trusted with secret. Thus, we require a protocol for redistribution without reconstruction of the secret . We also require...verification that the new shareholders have valid shares (ones that can be used to reconstruct the secret ). We present a new protocol to perform non...secret to shareholders in Shamir’s (m,n) threshold scheme (one in which we require m of n shares to reconstruct the secret ), and wish to redistribute the
Unconditional security of entanglement-based continuous-variable quantum secret sharing
NASA Astrophysics Data System (ADS)
Kogias, Ioannis; Xiang, Yu; He, Qiongyi; Adesso, Gerardo
2017-01-01
The need for secrecy and security is essential in communication. Secret sharing is a conventional protocol to distribute a secret message to a group of parties, who cannot access it individually but need to cooperate in order to decode it. While several variants of this protocol have been investigated, including realizations using quantum systems, the security of quantum secret sharing schemes still remains unproven almost two decades after their original conception. Here we establish an unconditional security proof for entanglement-based continuous-variable quantum secret sharing schemes, in the limit of asymptotic keys and for an arbitrary number of players. We tackle the problem by resorting to the recently developed one-sided device-independent approach to quantum key distribution. We demonstrate theoretically the feasibility of our scheme, which can be implemented by Gaussian states and homodyne measurements, with no need for ideal single-photon sources or quantum memories. Our results contribute to validating quantum secret sharing as a viable primitive for quantum technologies.
Secret Sharing and Shared Information
NASA Astrophysics Data System (ADS)
Rauh, Johannes
2017-11-01
Secret sharing is a cryptographic discipline in which the goal is to distribute information about a secret over a set of participants in such a way that only specific authorized combinations of participants together can reconstruct the secret. Thus, secret sharing schemes are systems of variables in which it is very clearly specified which subsets have information about the secret. As such, they provide perfect model systems for information decompositions. However, following this intuition too far leads to an information decomposition with negative partial information terms, which are difficult to interpret. One possible explanation is that the partial information lattice proposed by Williams and Beer is incomplete and has to be extended to incorporate terms corresponding to higher order redundancy. These results put bounds on information decompositions that follow the partial information framework, and they hint at where the partial information lattice needs to be improved.
Deterministic secure quantum communication using a single d-level system
Jiang, Dong; Chen, Yuanyuan; Gu, Xuemei; Xie, Ling; Chen, Lijun
2017-01-01
Deterministic secure quantum communication (DSQC) can transmit secret messages between two parties without first generating a shared secret key. Compared with quantum key distribution (QKD), DSQC avoids the waste of qubits arising from basis reconciliation and thus reaches higher efficiency. In this paper, based on data block transmission and order rearrangement technologies, we propose a DSQC protocol. It utilizes a set of single d-level systems as message carriers, which are used to directly encode the secret message in one communication process. Theoretical analysis shows that these employed technologies guarantee the security, and the use of a higher dimensional quantum system makes our protocol achieve higher security and efficiency. Since only quantum memory is required for implementation, our protocol is feasible with current technologies. Furthermore, Trojan horse attack (THA) is taken into account in our protocol. We give a THA model and show that THA significantly increases the multi-photon rate and can thus be detected. PMID:28327557
Combination of Sharing Matrix and Image Encryption for Lossless $(k,n)$ -Secret Image Sharing.
Bao, Long; Yi, Shuang; Zhou, Yicong
2017-12-01
This paper first introduces a (k,n) -sharing matrix S (k, n) and its generation algorithm. Mathematical analysis is provided to show its potential for secret image sharing. Combining sharing matrix with image encryption, we further propose a lossless (k,n) -secret image sharing scheme (SMIE-SIS). Only with no less than k shares, all the ciphertext information and security key can be reconstructed, which results in a lossless recovery of original information. This can be proved by the correctness and security analysis. Performance evaluation and security analysis demonstrate that the proposed SMIE-SIS with arbitrary settings of k and n has at least five advantages: 1) it is able to fully recover the original image without any distortion; 2) it has much lower pixel expansion than many existing methods; 3) its computation cost is much lower than the polynomial-based secret image sharing methods; 4) it is able to verify and detect a fake share; and 5) even using the same original image with the same initial settings of parameters, every execution of SMIE-SIS is able to generate completely different secret shares that are unpredictable and non-repetitive. This property offers SMIE-SIS a high level of security to withstand many different attacks.
He, S Y; Lindeberg, M; Chatterjee, A K; Collmer, A
1991-02-01
The out genes of the enterobacterial plant pathogen Erwinia chrysanthemi are responsible for the efficient extracellular secretion of multiple plant cell wall-degrading enzymes, including four isozymes of pectate lyase, exo-poly-alpha-D-galacturonosidase, pectin methylesterase, and cellulase. Out- mutants of Er. chrysanthemi are unable to export any of these proteins beyond the periplasm and are severely reduced in virulence. We have cloned out genes from Er. chrysanthemi in the stable, low-copy-number cosmid pCPP19 by complementing several transposon-induced mutations. The cloned out genes were clustered in a 12-kilobase chromosomal DNA region, complemented all existing out mutations in Er. chrysanthemi EC16, and enabled Escherichia coli strains to efficiently secrete the extracellular pectic enzymes produced from cloned Er. chrysanthemi genes, while retaining the periplasmic marker protein beta-lactamase. DNA sequencing of a 2.4-kilobase EcoRI fragment within the out cluster revealed four genes arranged colinearly and sharing substantial similarity with the Klebsiella pneumoniae genes pulH, pulI, pulJ, and pulK, which are necessary for pullulanase secretion. However, K. pneumoniae cells harboring the cloned Er. chrysanthemi pelE gene were unable to secrete the Erwinia pectate lyase. Furthermore, the Er. chrysanthemi Out system was unable to secrete an extracellular pectate lyase encoded by a gene from a closely related plant pathogen. Erwinia carotovora ssp. carotovora. The results suggest that these enterobacteria secrete polysaccharidases by a conserved mechanism whose protein-recognition capacities have diverged.
High-Dimensional Circular Quantum Secret Sharing Using Orbital Angular Momentum
NASA Astrophysics Data System (ADS)
Tang, Dawei; Wang, Tie-jun; Mi, Sichen; Geng, Xiao-Meng; Wang, Chuan
2016-11-01
Quantum secret sharing is to distribute secret message securely between multi-parties. Here exploiting orbital angular momentum (OAM) state of single photons as the information carrier, we propose a high-dimensional circular quantum secret sharing protocol which increases the channel capacity largely. In the proposed protocol, the secret message is split into two parts, and each encoded on the OAM state of single photons. The security of the protocol is guaranteed by the laws of non-cloning theorem. And the secret messages could not be recovered except that the two receivers collaborated with each other. Moreover, the proposed protocol could be extended into high-level quantum systems, and the enhanced security could be achieved.
Threshold secret sharing scheme based on phase-shifting interferometry.
Deng, Xiaopeng; Shi, Zhengang; Wen, Wei
2016-11-01
We propose a new method for secret image sharing with the (3,N) threshold scheme based on phase-shifting interferometry. The secret image, which is multiplied with an encryption key in advance, is first encrypted by using Fourier transformation. Then, the encoded image is shared into N shadow images based on the recording principle of phase-shifting interferometry. Based on the reconstruction principle of phase-shifting interferometry, any three or more shadow images can retrieve the secret image, while any two or fewer shadow images cannot obtain any information of the secret image. Thus, a (3,N) threshold secret sharing scheme can be implemented. Compared with our previously reported method, the algorithm of this paper is suited for not only a binary image but also a gray-scale image. Moreover, the proposed algorithm can obtain a larger threshold value t. Simulation results are presented to demonstrate the feasibility of the proposed method.
Quantum dense key distribution
DOE Office of Scientific and Technical Information (OSTI.GOV)
Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.
2004-03-01
This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility.
Applying secret sharing for HIS backup exchange.
Kuroda, Tomohiro; Kimura, Eizen; Matsumura, Yasushi; Yamashita, Yoshinori; Hiramatsu, Haruhiko; Kume, Naoto; Sato, Atsushi
2013-01-01
To secure business continuity is indispensable for hospitals to fulfill its social responsibility under disasters. Although to back up the data of the hospital information system (HIS) at multiple remote sites is a key strategy of business continuity plan (BCP), the requirements to treat privacy sensitive data jack up the cost for the backup. The secret sharing is a method to split an original secret message up so that each individual piece is meaningless, but putting sufficient number of pieces together to reveal the original message. The secret sharing method eases us to exchange HIS backups between multiple hospitals. This paper evaluated the feasibility of the commercial secret sharing solution for HIS backup through several simulations. The result shows that the commercial solution is feasible to realize reasonable HIS backup exchange platform when template of contract between participating hospitals is ready.
He, S Y; Lindeberg, M; Chatterjee, A K; Collmer, A
1991-01-01
The out genes of the enterobacterial plant pathogen Erwinia chrysanthemi are responsible for the efficient extracellular secretion of multiple plant cell wall-degrading enzymes, including four isozymes of pectate lyase, exo-poly-alpha-D-galacturonosidase, pectin methylesterase, and cellulase. Out- mutants of Er. chrysanthemi are unable to export any of these proteins beyond the periplasm and are severely reduced in virulence. We have cloned out genes from Er. chrysanthemi in the stable, low-copy-number cosmid pCPP19 by complementing several transposon-induced mutations. The cloned out genes were clustered in a 12-kilobase chromosomal DNA region, complemented all existing out mutations in Er. chrysanthemi EC16, and enabled Escherichia coli strains to efficiently secrete the extracellular pectic enzymes produced from cloned Er. chrysanthemi genes, while retaining the periplasmic marker protein beta-lactamase. DNA sequencing of a 2.4-kilobase EcoRI fragment within the out cluster revealed four genes arranged colinearly and sharing substantial similarity with the Klebsiella pneumoniae genes pulH, pulI, pulJ, and pulK, which are necessary for pullulanase secretion. However, K. pneumoniae cells harboring the cloned Er. chrysanthemi pelE gene were unable to secrete the Erwinia pectate lyase. Furthermore, the Er. chrysanthemi Out system was unable to secrete an extracellular pectate lyase encoded by a gene from a closely related plant pathogen. Erwinia carotovora ssp. carotovora. The results suggest that these enterobacteria secrete polysaccharidases by a conserved mechanism whose protein-recognition capacities have diverged. Images PMID:1992458
Cryptanalysis of a semi-quantum secret sharing scheme based on Bell states
NASA Astrophysics Data System (ADS)
Gao, Gan; Wang, Yue; Wang, Dong
2018-03-01
In the paper [Mod. Phys. Lett. B 31 (2017) 1750150], Yin et al. proposed a semi-quantum secret sharing scheme by using Bell states. We find that the proposed scheme cannot finish the quantum secret sharing task. In addition, we also find that the proposed scheme has a security loophole, that is, it will not be detected that the dishonest participant, Charlie attacks on the quantum channel.
A New Improving Quantum Secret Sharing Scheme
NASA Astrophysics Data System (ADS)
Xu, Ting-Ting; Li, Zhi-Hui; Bai, Chen-Ming; Ma, Min
2017-04-01
An improving quantum secret sharing scheme (IQSS scheme) was introduced by Nascimento et al. (Phys. Rev. A 64, 042311 (2001)), which was analyzed by the improved quantum access structure. In this paper, we propose a new improving quantum secret sharing scheme, and more quantum access structures can be realized by this scheme than the previous one. For example, we prove that any threshold and hypercycle quantum access structures can be realized by the new scheme.
Zhou, Zhi; Arce, Gonzalo R; Di Crescenzo, Giovanni
2006-08-01
Visual cryptography encodes a secret binary image (SI) into n shares of random binary patterns. If the shares are xeroxed onto transparencies, the secret image can be visually decoded by superimposing a qualified subset of transparencies, but no secret information can be obtained from the superposition of a forbidden subset. The binary patterns of the n shares, however, have no visual meaning and hinder the objectives of visual cryptography. Extended visual cryptography [1] was proposed recently to construct meaningful binary images as shares using hypergraph colourings, but the visual quality is poor. In this paper, a novel technique named halftone visual cryptography is proposed to achieve visual cryptography via halftoning. Based on the blue-noise dithering principles, the proposed method utilizes the void and cluster algorithm [2] to encode a secret binary image into n halftone shares (images) carrying significant visual information. The simulation shows that the visual quality of the obtained halftone shares are observably better than that attained by any available visual cryptography method known to date.
Threshold quantum cryptography
NASA Astrophysics Data System (ADS)
Tokunaga, Yuuki; Okamoto, Tatsuaki; Imoto, Nobuyuki
2005-01-01
We present the concept of threshold collaborative unitary transformation or threshold quantum cryptography, which is a kind of quantum version of threshold cryptography. Threshold quantum cryptography states that classical shared secrets are distributed to several parties and a subset of them, whose number is greater than a threshold, collaborates to compute a quantum cryptographic function, while keeping each share secretly inside each party. The shared secrets are reusable if no cheating is detected. As a concrete example of this concept, we show a distributed protocol (with threshold) of conjugate coding.
High-efficiency reconciliation for continuous variable quantum key distribution
NASA Astrophysics Data System (ADS)
Bai, Zengliang; Yang, Shenshen; Li, Yongmin
2017-04-01
Quantum key distribution (QKD) is the most mature application of quantum information technology. Information reconciliation is a crucial step in QKD and significantly affects the final secret key rates shared between two legitimate parties. We analyze and compare various construction methods of low-density parity-check (LDPC) codes and design high-performance irregular LDPC codes with a block length of 106. Starting from these good codes and exploiting the slice reconciliation technique based on multilevel coding and multistage decoding, we realize high-efficiency Gaussian key reconciliation with efficiency higher than 95% for signal-to-noise ratios above 1. Our demonstrated method can be readily applied in continuous variable QKD.
Verifiable Secret Redistribution for Threshold Sharing Schemes
2002-02-01
complete verification in our protocol, old shareholders broadcast a commitment to the secret to the new shareholders. We prove that the new...of an m − 1 degree polynomial from m of n points yields a constant term in 1 the polynomial that corresponds to the secret . In Blakley’s scheme [Bla79...the intersection of m of n vector spaces yields a one-dimensional vector that corresponds to the secret . Desmedt surveys other sharing schemes
Smart Grid Privacy through Distributed Trust
NASA Astrophysics Data System (ADS)
Lipton, Benjamin
Though the smart electrical grid promises many advantages in efficiency and reliability, the risks to consumer privacy have impeded its deployment. Researchers have proposed protecting privacy by aggregating user data before it reaches the utility, using techniques of homomorphic encryption to prevent exposure of unaggregated values. However, such schemes generally require users to trust in the correct operation of a single aggregation server. We propose two alternative systems based on secret sharing techniques that distribute this trust among multiple service providers, protecting user privacy against a misbehaving server. We also provide an extensive evaluation of the systems considered, comparing their robustness to privacy compromise, error handling, computational performance, and data transmission costs. We conclude that while all the systems should be computationally feasible on smart meters, the two methods based on secret sharing require much less computation while also providing better protection against corrupted aggregators. Building systems using these techniques could help defend the privacy of electricity customers, as well as customers of other utilities as they move to a more data-driven architecture.
Spacetime Replication of Quantum Information Using (2 , 3) Quantum Secret Sharing and Teleportation
NASA Astrophysics Data System (ADS)
Wu, Yadong; Khalid, Abdullah; Davijani, Masoud; Sanders, Barry
The aim of this work is to construct a protocol to replicate quantum information in any valid configuration of causal diamonds and assess resources required to physically realize spacetime replication. We present a set of codes to replicate quantum information along with a scheme to realize these codes using continuous-variable quantum optics. We use our proposed experimental realizations to determine upper bounds on the quantum and classical resources required to simulate spacetime replication. For four causal diamonds, our implementation scheme is more efficient than the one proposed previously. Our codes are designed using a decomposition algorithm for complete directed graphs, (2 , 3) quantum secret sharing, quantum teleportation and entanglement swapping. These results show the simulation of spacetime replication of quantum information is feasible with existing experimental methods. Alberta Innovates, NSERC, China's 1000 Talent Plan and the Institute for Quantum Information and Matter, which is an NSF Physics Frontiers Center (NSF Grant PHY-1125565) with support of the Gordon and Betty Moore Foundation (GBMF-2644).
Comment on "Proactive quantum secret sharing"
NASA Astrophysics Data System (ADS)
Gao, Gan; Wang, Yue
2017-03-01
In the paper, Qin and Dai (Quantum Inf Process 14:4237-4244, 2015) proposed a proactive quantum secret sharing scheme. We study the security of the proposed scheme and find that it is not secure. In the distribution phase of the proposed scheme, two dishonest participants may collaborate to eavesdrop the secret of the dealer without introducing any error.
On Asymptotically Good Ramp Secret Sharing Schemes
NASA Astrophysics Data System (ADS)
Geil, Olav; Martin, Stefano; Martínez-Peñas, Umberto; Matsumoto, Ryutaroh; Ruano, Diego
Asymptotically good sequences of linear ramp secret sharing schemes have been intensively studied by Cramer et al. in terms of sequences of pairs of nested algebraic geometric codes. In those works the focus is on full privacy and full reconstruction. In this paper we analyze additional parameters describing the asymptotic behavior of partial information leakage and possibly also partial reconstruction giving a more complete picture of the access structure for sequences of linear ramp secret sharing schemes. Our study involves a detailed treatment of the (relative) generalized Hamming weights of the considered codes.
Graph State-Based Quantum Secret Sharing with the Chinese Remainder Theorem
NASA Astrophysics Data System (ADS)
Guo, Ying; Luo, Peng; Wang, Yijun
2016-11-01
Quantum secret sharing (QSS) is a significant quantum cryptography technology in the literature. Dividing an initial secret into several sub-secrets which are then transferred to other legal participants so that it can be securely recovered in a collaboration fashion. In this paper, we develop a quantum route selection based on the encoded quantum graph state, thus enabling the practical QSS scheme in the small-scale complex quantum network. Legal participants are conveniently designated with the quantum route selection using the entanglement of the encoded graph states. Each participant holds a vertex of the graph state so that legal participants are selected through performing operations on specific vertices. The Chinese remainder theorem (CRT) strengthens the security of the recovering process of the initial secret among the legal participants. The security is ensured by the entanglement of the encoded graph states that are cooperatively prepared and shared by legal users beforehand with the sub-secrets embedded in the CRT over finite fields.
Quantum secret sharing via local operations and classical communication.
Yang, Ying-Hui; Gao, Fei; Wu, Xia; Qin, Su-Juan; Zuo, Hui-Juan; Wen, Qiao-Yan
2015-11-20
We investigate the distinguishability of orthogonal multipartite entangled states in d-qudit system by restricted local operations and classical communication. According to these properties, we propose a standard (2, n)-threshold quantum secret sharing scheme (called LOCC-QSS scheme), which solves the open question in [Rahaman et al., Phys. Rev. A, 91, 022330 (2015)]. On the other hand, we find that all the existing (k, n)-threshold LOCC-QSS schemes are imperfect (or "ramp"), i.e., unauthorized groups can obtain some information about the shared secret. Furthermore, we present a (3, 4)-threshold LOCC-QSS scheme which is close to perfect.
Comment on "Dynamic quantum secret sharing"
NASA Astrophysics Data System (ADS)
Liao, Ci-Hong; Yang, Chun-Wei; Hwang, Tzonelish
2013-10-01
Hsu et al. (Quantum Inf Process 12:331-344,2013) proposed a dynamic quantum secret sharing (DQSS) protocol using the entanglement swapping of Bell states for an agent to easily join (or leave) the system. In 2013, Wang and Li (Quantum Inf Process 12(5):1991-1997, 2013) proposed a collusion attack on Hsu et al.'s DQSS protocol. Nevertheless, this study points out a new security issue on Hsu et al.'s DQSS protocol regarding to the honesty of a revoked agent. Without considering this issue, the DQSS protocol could be failed to provide secret sharing function.
(t, n) Threshold d-Level Quantum Secret Sharing.
Song, Xiu-Li; Liu, Yan-Bing; Deng, Hong-Yao; Xiao, Yong-Gang
2017-07-25
Most of Quantum Secret Sharing(QSS) are (n, n) threshold 2-level schemes, in which the 2-level secret cannot be reconstructed until all n shares are collected. In this paper, we propose a (t, n) threshold d-level QSS scheme, in which the d-level secret can be reconstructed only if at least t shares are collected. Compared with (n, n) threshold 2-level QSS, the proposed QSS provides better universality, flexibility, and practicability. Moreover, in this scheme, any one of the participants does not know the other participants' shares, even the trusted reconstructor Bob 1 is no exception. The transformation of the particles includes some simple operations such as d-level CNOT, Quantum Fourier Transform(QFT), Inverse Quantum Fourier Transform(IQFT), and generalized Pauli operator. The transformed particles need not to be transmitted from one participant to another in the quantum channel. Security analysis shows that the proposed scheme can resist intercept-resend attack, entangle-measure attack, collusion attack, and forgery attack. Performance comparison shows that it has lower computation and communication costs than other similar schemes when 2 < t < n - 1.
Comment on ‘Authenticated quantum secret sharing with quantum dialogue based on Bell states’
NASA Astrophysics Data System (ADS)
Gao, Gan; Wang, Yue; Wang, Dong; Ye, Liu
2018-02-01
In the paper (2016 Phys. Scr. 91 085101), Abulkasim et al proposed a authenticated quantum secret sharing scheme. We study the security of the multiparty case in the proposed scheme and find that it is not secure.
Modified Multi Prime RSA Cryptosystem
NASA Astrophysics Data System (ADS)
Ghazali Kamardan, M.; Aminudin, N.; Che-Him, Norziha; Sufahani, Suliadi; Khalid, Kamil; Roslan, Rozaini
2018-04-01
RSA [1] is one of the mostly used cryptosystem in securing data and information. Though, it has been recently discovered that RSA has some weaknesses and in advance technology, RSA is believed to be inefficient especially when it comes to decryption. Thus, a new algorithm called Multi prime RSA, an extended version of the standard RSA is studied. Then, a modification is made to the Multi prime RSA where another keys is shared secretly between the receiver and the sender to increase the securerity. As in RSA, the methodology used for modified Multi-prime RSA also consists of three phases; 1. Key Generation in which the secret and public keys are generated and published. In this phase, the secrecy is improved by adding more prime numbers and addition of secret keys. 2. Encryption of the message using the public and secret keys given. 3. Decryption of the secret message using the secret key generated. For the decryption phase, a method called Chinese Remainder Theorem is used which helps to fasten the computation. Since Multi prime RSA use more than two prime numbers, the algorithm is more efficient and secure when compared to the standard RSA. Furthermore, in modified Multi prime RSA another secret key is introduced to increase the obstacle to the attacker. Therefore, it is strongly believed that this new algorithm is better and can be an alternative to the RSA.
Multiparty Quantum Secret Sharing of Key Using Practical Faint Laser Pulses
NASA Astrophysics Data System (ADS)
Zhang, Zhan-Jun; Man, Zhong-Xiao
2005-07-01
Based on a bidirectional quantum key distribution protocol [Phys. Rev. A 70 (2004) 012311], we propose a (m-1,m-1)-threshold scheme of m (m >= 3)-party quantum secret sharing of key by using practical faint laser pulses. In our scheme, if all the m-1 sharers collaborate, they can obtain the joint secret key from the message sender. Our scheme is more feasible according to the present-day technology.
Quantum secret sharing via local operations and classical communication
Yang, Ying-Hui; Gao, Fei; Wu, Xia; Qin, Su-Juan; Zuo, Hui-Juan; Wen, Qiao-Yan
2015-01-01
We investigate the distinguishability of orthogonal multipartite entangled states in d-qudit system by restricted local operations and classical communication. According to these properties, we propose a standard (2, n)-threshold quantum secret sharing scheme (called LOCC-QSS scheme), which solves the open question in [Rahaman et al., Phys. Rev. A, 91, 022330 (2015)]. On the other hand, we find that all the existing (k, n)-threshold LOCC-QSS schemes are imperfect (or “ramp”), i.e., unauthorized groups can obtain some information about the shared secret. Furthermore, we present a (3, 4)-threshold LOCC-QSS scheme which is close to perfect. PMID:26586412
Two-party secret key distribution via a modified quantum secret sharing protocol.
Grice, W P; Evans, P G; Lawrie, B; Legré, M; Lougovski, P; Ray, W; Williams, B P; Qi, B; Smith, A M
2015-03-23
We present and demonstrate a novel protocol for distributing secret keys between two and only two parties based on N-party single-qubit Quantum Secret Sharing (QSS). We demonstrate our new protocol with N = 3 parties using phase-encoded photons. We show that any two out of N parties can build a secret key based on partial information from each other and with collaboration from the remaining N - 2 parties. Our implementation allows for an accessible transition between N-party QSS and arbitrary two party QKD without modification of hardware. In addition, our approach significantly reduces the number of resources such as single photon detectors, lasers and dark fiber connections needed to implement QKD.
Book, Adam J.; Lewin, Gina R.; McDonald, Bradon R.; Takasuka, Taichi E.; Doering, Drew T.; Adams, Aaron S.; Blodgett, Joshua A. V.; Clardy, Jon; Raffa, Kenneth F.; Fox, Brian G.
2014-01-01
Actinobacteria in the genus Streptomyces are critical players in microbial communities that decompose complex carbohydrates in the soil, and these bacteria have recently been implicated in the deconstruction of plant polysaccharides for some herbivorous insects. Despite the importance of Streptomyces to carbon cycling, the extent of their plant biomass-degrading ability remains largely unknown. In this study, we compared four strains of Streptomyces isolated from insect herbivores that attack pine trees: DpondAA-B6 (SDPB6) from the mountain pine beetle, SPB74 from the southern pine beetle, and SirexAA-E (SACTE) and SirexAA-G from the woodwasp, Sirex noctilio. Biochemical analysis of secreted enzymes demonstrated that only two of these strains, SACTE and SDPB6, were efficient at degrading plant biomass. Genomic analyses indicated that SACTE and SDPB6 are closely related and that they share similar compositions of carbohydrate-active enzymes. Genome-wide proteomic and transcriptomic analyses revealed that the major exocellulases (GH6 and GH48), lytic polysaccharide monooxygenases (AA10), and mannanases (GH5) were conserved and secreted by both organisms, while the secreted endocellulases (GH5 and GH9 versus GH9 and GH12) were from diverged enzyme families. Together, these data identify two phylogenetically related insect-associated Streptomyces strains with high biomass-degrading activity and characterize key enzymatic similarities and differences used by these organisms to deconstruct plant biomass. PMID:24837391
Fujiwara, M.; Waseda, A.; Nojima, R.; Moriai, S.; Ogata, W.; Sasaki, M.
2016-01-01
Distributed storage plays an essential role in realizing robust and secure data storage in a network over long periods of time. A distributed storage system consists of a data owner machine, multiple storage servers and channels to link them. In such a system, secret sharing scheme is widely adopted, in which secret data are split into multiple pieces and stored in each server. To reconstruct them, the data owner should gather plural pieces. Shamir’s (k, n)-threshold scheme, in which the data are split into n pieces (shares) for storage and at least k pieces of them must be gathered for reconstruction, furnishes information theoretic security, that is, even if attackers could collect shares of less than the threshold k, they cannot get any information about the data, even with unlimited computing power. Behind this scenario, however, assumed is that data transmission and authentication must be perfectly secure, which is not trivial in practice. Here we propose a totally information theoretically secure distributed storage system based on a user-friendly single-password-authenticated secret sharing scheme and secure transmission using quantum key distribution, and demonstrate it in the Tokyo metropolitan area (≤90 km). PMID:27363566
Fujiwara, M; Waseda, A; Nojima, R; Moriai, S; Ogata, W; Sasaki, M
2016-07-01
Distributed storage plays an essential role in realizing robust and secure data storage in a network over long periods of time. A distributed storage system consists of a data owner machine, multiple storage servers and channels to link them. In such a system, secret sharing scheme is widely adopted, in which secret data are split into multiple pieces and stored in each server. To reconstruct them, the data owner should gather plural pieces. Shamir's (k, n)-threshold scheme, in which the data are split into n pieces (shares) for storage and at least k pieces of them must be gathered for reconstruction, furnishes information theoretic security, that is, even if attackers could collect shares of less than the threshold k, they cannot get any information about the data, even with unlimited computing power. Behind this scenario, however, assumed is that data transmission and authentication must be perfectly secure, which is not trivial in practice. Here we propose a totally information theoretically secure distributed storage system based on a user-friendly single-password-authenticated secret sharing scheme and secure transmission using quantum key distribution, and demonstrate it in the Tokyo metropolitan area (≤90 km).
NASA Astrophysics Data System (ADS)
Qin, Su-Juan; Gao, Fei; Wen, Qiao-Yan; Zhu, Fu-Chen
2008-11-01
The security of a multiparty quantum secret sharing protocol [L.F. Han, Y.M. Liu, J. Liu, Z.J. Zhang, Opt. Commun. 281 (2008) 2690] is reexamined. It is shown that any one dishonest participant can obtain all the transmitted secret bits by a special attack, where the controlled- (-iσy) gate is employed to invalidate the role of the random phase shift operation. Furthermore, a possible way to resist this attack is discussed.
Secret Key Generation via a Modified Quantum Secret Sharing Protocol
DOE Office of Scientific and Technical Information (OSTI.GOV)
Smith IV, Amos M; Evans, Philip G; Lawrie, Benjamin J
We present and experimentally show a novel protocol for distributing secret information between two and only two parties in a N-party single-qubit Quantum Secret Sharing (QSS) system. We demonstrate this new algorithm with N = 3 active parties over 6km of telecom. ber. Our experimental device is based on the Clavis2 Quantum Key Distribution (QKD) system built by ID Quantique but is generalizable to any implementation. We show that any two out of the N parties can build secret keys based on partial information from each other and with collaboration from the remaining N > 2 parties. This algorithm allowsmore » for the creation of two-party secret keys were standard QSS does not and signicantly reduces the number of resources needed to implement QKD on a highly connected network such as the electrical grid.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Phan, Jason; Tropea, Joseph E.; Waugh, David S.
2010-11-16
Pathogenic Yersinia species use a type III secretion system to inject cytotoxic effector proteins directly into the cytosol of mammalian cells, where they neutralize the innate immune response by interfering with the signal-transduction pathways that control phagocytosis and inflammation. To be exported efficiently, some effectors must transiently associate with cognate cytoplasmic secretion chaperones. SycH is the chaperone for YopH, a potent eukaryotic-like protein tyrosine phosphatase that is essential for virulence. SycH also binds two negative regulators of type III secretion, YscM1 and YscM2, both of which share significant sequence homology with the chaperone-binding domain of YopH. Here, the structure ofmore » a complex between SycH and a stable fragment of YscM2 that was designed on the basis of limited proteolysis experiments is presented. The overall fold of SycH is very similar to the structures of other homodimeric secretion chaperones that have been determined to date. YscM2 wraps around SycH in an extended fashion, with some secondary but no tertiary structure, assuming a conformation distinct from the globular fold that it is predicted to adopt in the absence of SycH.« less
Quantum secret sharing using the d-dimensional GHZ state
NASA Astrophysics Data System (ADS)
Bai, Chen-Ming; Li, Zhi-Hui; Xu, Ting-Ting; Li, Yong-Ming
2017-03-01
We propose a quantum secret sharing scheme that uses an orthogonal pair of n-qudit GHZ states and local distinguishability. In the proposed protocol, the participants use an X-basis measurement and classical communication to distinguish between the two orthogonal states and reconstruct the original secret. We also present (2, n)-threshold and generalized restricted (2, n)-threshold schemes that enable any two cooperating players from two disjoint groups to always reconstruct the secret. Compared to the existing scheme by Rahaman and Parker (Phys Rev A 91:022330, 2015), the proposed scheme is more general and the access structure contains more authorized sets.
Navajo Code Talker Joe Morris, Sr. shared insights from his time as a secret World War Two messenger
NASA Technical Reports Server (NTRS)
2002-01-01
Navajo Code Talker Joe Morris, Sr. shared insights from his time as a secret World War Two messenger with his audience at NASA's Dryden Flight Research Center on Nov. 26, 2002. NASA Dryden is located on Edwards Air Force Base in California's Mojave Desert.
Two-Party secret key distribution via a modified quantum secret sharing protocol
DOE Office of Scientific and Technical Information (OSTI.GOV)
Grice, Warren P.; Evans, Philip G.; Lawrie, Benjamin
We present and demonstrate a method of distributing secret information based on N-party single-qubit Quantum Secret Sharing (QSS) in a modied plug-and-play two-party Quantum Key Distribution (QKD) system with N 2 intermediate nodes and compare it to both standard QSS and QKD. Our setup is based on the Clavis2 QKD system built by ID Quantique but is generalizable to any implementation. We show that any two out of N parties can build a secret key based on partial information from each other and with collaboration from the remaining N 2 parties. This method signicantly reduces the number of resources (singlemore » photon detectors, lasers and dark ber connections) needed to implement QKD on the grid.« less
Two-Party secret key distribution via a modified quantum secret sharing protocol
Grice, Warren P.; Evans, Philip G.; Lawrie, Benjamin; ...
2015-01-01
We present and demonstrate a method of distributing secret information based on N-party single-qubit Quantum Secret Sharing (QSS) in a modied plug-and-play two-party Quantum Key Distribution (QKD) system with N 2 intermediate nodes and compare it to both standard QSS and QKD. Our setup is based on the Clavis2 QKD system built by ID Quantique but is generalizable to any implementation. We show that any two out of N parties can build a secret key based on partial information from each other and with collaboration from the remaining N 2 parties. This method signicantly reduces the number of resources (singlemore » photon detectors, lasers and dark ber connections) needed to implement QKD on the grid.« less
Verifying Secrets and Relative Secrecy
2000-01-01
Systems that authenticate a user based on a shared secret (such as a password or PIN) normally allow anyone to query whether the secret is a given...value. For example, an ATM machine allows one to ask whether a string is the secret PIN of a (lost or stolen) ATM card. Yet such queries are prohibited
2002-11-26
Navajo Code Talker Joe Morris, Sr. shared insights from his time as a secret World War Two messenger with his audience at NASA's Dryden Flight Research Center on Nov. 26, 2002. NASA Dryden is located on Edwards Air Force Base in California's Mojave Desert.
NASA Astrophysics Data System (ADS)
Karimipour, V.
2006-07-01
In the preceding Comment [Jian-Zhong Du, Su-Juan Qin, Qiao-Yan Wen, and Fu-Chen Zhu, Phys. Rev. A 74, 016301 (2006)], it has been shown that in a quantum secret sharing protocol proposed in [S. Bagherinezhad and V. Karimipour, Phys. Rev. A 67, 044302 (2003)], one of the receivers can cheat by splitting the entanglement of the carrier and intercepting the secret, without being detected. In this reply we show that a simple modification of the protocol prevents the receivers from this kind of cheating.
Application of homomorphism to secure image sharing
NASA Astrophysics Data System (ADS)
Islam, Naveed; Puech, William; Hayat, Khizar; Brouzet, Robert
2011-09-01
In this paper, we present a new approach for sharing images between l players by exploiting the additive and multiplicative homomorphic properties of two well-known public key cryptosystems, i.e. RSA and Paillier. Contrary to the traditional schemes, the proposed approach employs secret sharing in a way that limits the influence of the dealer over the protocol and allows each player to participate with the help of his key-image. With the proposed approach, during the encryption step, each player encrypts his own key-image using the dealer's public key. The dealer encrypts the secret-to-be-shared image with the same public key and then, the l encrypted key-images plus the encrypted to-be shared image are multiplied homomorphically to get another encrypted image. After this step, the dealer can safely get a scrambled image which corresponds to the addition or multiplication of the l + 1 original images ( l key-images plus the secret image) because of the additive homomorphic property of the Paillier algorithm or multiplicative homomorphic property of the RSA algorithm. When the l players want to extract the secret image, they do not need to use keys and the dealer has no role. Indeed, with our approach, to extract the secret image, the l players need only to subtract their own key-image with no specific order from the scrambled image. Thus, the proposed approach provides an opportunity to use operators like multiplication on encrypted images for the development of a secure privacy preserving protocol in the image domain. We show that it is still possible to extract a visible version of the secret image with only l-1 key-images (when one key-image is missing) or when the l key-images used for the extraction are different from the l original key-images due to a lossy compression for example. Experimental results and security analysis verify and prove that the proposed approach is secure from cryptographic viewpoint.
A QR Code Based Zero-Watermarking Scheme for Authentication of Medical Images in Teleradiology Cloud
Seenivasagam, V.; Velumani, R.
2013-01-01
Healthcare institutions adapt cloud based archiving of medical images and patient records to share them efficiently. Controlled access to these records and authentication of images must be enforced to mitigate fraudulent activities and medical errors. This paper presents a zero-watermarking scheme implemented in the composite Contourlet Transform (CT)—Singular Value Decomposition (SVD) domain for unambiguous authentication of medical images. Further, a framework is proposed for accessing patient records based on the watermarking scheme. The patient identification details and a link to patient data encoded into a Quick Response (QR) code serves as the watermark. In the proposed scheme, the medical image is not subjected to degradations due to watermarking. Patient authentication and authorized access to patient data are realized on combining a Secret Share with the Master Share constructed from invariant features of the medical image. The Hu's invariant image moments are exploited in creating the Master Share. The proposed system is evaluated with Checkmark software and is found to be robust to both geometric and non geometric attacks. PMID:23970943
Seenivasagam, V; Velumani, R
2013-01-01
Healthcare institutions adapt cloud based archiving of medical images and patient records to share them efficiently. Controlled access to these records and authentication of images must be enforced to mitigate fraudulent activities and medical errors. This paper presents a zero-watermarking scheme implemented in the composite Contourlet Transform (CT)-Singular Value Decomposition (SVD) domain for unambiguous authentication of medical images. Further, a framework is proposed for accessing patient records based on the watermarking scheme. The patient identification details and a link to patient data encoded into a Quick Response (QR) code serves as the watermark. In the proposed scheme, the medical image is not subjected to degradations due to watermarking. Patient authentication and authorized access to patient data are realized on combining a Secret Share with the Master Share constructed from invariant features of the medical image. The Hu's invariant image moments are exploited in creating the Master Share. The proposed system is evaluated with Checkmark software and is found to be robust to both geometric and non geometric attacks.
Analysis of medical confidentiality from the islamic ethics perspective.
Tavaokkoli, Saeid Nazari; Nejadsarvari, Nasrin; Ebrahimi, Ali
2015-04-01
Confidentiality is one of the old rules of the medical profession. While emphasizing the necessity of confidentiality in religious teachings, disclosure of other's secrets to commit sin deserves punishment hereafter known. Today, progress in medical science and invention of new diagnostic and therapeutic procedures, as well as the extent of information and disclosure of the secrets of the patients, have provided more than ever. After explaining the concepts and principles of confidentiality in medical ethics, the Islamic-oriented Virtue Ethics, in a comparative review, share the differences in these two sets of ethical review and explain the issue of confidentiality. In professional medical ethics, only the behaviors of health staff are evaluated and moral evaluation of the features cannot be evaluated, but in Islamic ethics, the moral evaluation of the features that are sensual, confidentiality is more stable, without any external supervision will maintain its efficiency.
Coulette, Quentin; Lemauf, Séverine; Colinet, Dominique; Prévost, Geneviève; Anselme, Caroline; Poirié, Marylène
2017-01-01
Aspartylglucosaminidase (AGA) is a low-abundance intracellular enzyme that plays a key role in the last stage of glycoproteins degradation, and whose deficiency leads to human aspartylglucosaminuria, a lysosomal storage disease. Surprisingly, high amounts of AGA-like proteins are secreted in the venom of two phylogenetically distant hymenopteran parasitoid wasp species, Asobara tabida (Braconidae) and Leptopilina heterotoma (Cynipidae). These venom AGAs have a similar domain organization as mammalian AGAs. They share with them key residues for autocatalysis and activity, and the mature α- and β-subunits also form an (αβ)2 structure in solution. Interestingly, only one of these AGAs subunits (α for AtAGA and β for LhAGA) is glycosylated instead of the two subunits for lysosomal human AGA (hAGA), and these glycosylations are partially resistant to PGNase F treatment. The two venom AGAs are secreted as fully activated enzymes, they have a similar aspartylglucosaminidase activity and are both also efficient asparaginases. Once AGAs are injected into the larvae of the Drosophila melanogaster host, the asparaginase activity may play a role in modulating their physiology. Altogether, our data provide new elements for a better understanding of the secretion and the role of venom AGAs as virulence factors in the parasitoid wasps’ success. PMID:28742131
Rate-loss analysis of an efficient quantum repeater architecture
NASA Astrophysics Data System (ADS)
Guha, Saikat; Krovi, Hari; Fuchs, Christopher A.; Dutton, Zachary; Slater, Joshua A.; Simon, Christoph; Tittel, Wolfgang
2015-08-01
We analyze an entanglement-based quantum key distribution (QKD) architecture that uses a linear chain of quantum repeaters employing photon-pair sources, spectral-multiplexing, linear-optic Bell-state measurements, multimode quantum memories, and classical-only error correction. Assuming perfect sources, we find an exact expression for the secret-key rate, and an analytical description of how errors propagate through the repeater chain, as a function of various loss-and-noise parameters of the devices. We show via an explicit analytical calculation, which separately addresses the effects of the principle nonidealities, that this scheme achieves a secret-key rate that surpasses the Takeoka-Guha-Wilde bound—a recently found fundamental limit to the rate-vs-loss scaling achievable by any QKD protocol over a direct optical link—thereby providing one of the first rigorous proofs of the efficacy of a repeater protocol. We explicitly calculate the end-to-end shared noisy quantum state generated by the repeater chain, which could be useful for analyzing the performance of other non-QKD quantum protocols that require establishing long-distance entanglement. We evaluate that shared state's fidelity and the achievable entanglement-distillation rate, as a function of the number of repeater nodes, total range, and various loss-and-noise parameters of the system. We extend our theoretical analysis to encompass sources with nonzero two-pair-emission probability, using an efficient exact numerical evaluation of the quantum state propagation and measurements. We expect our results to spur formal rate-loss analysis of other repeater protocols and also to provide useful abstractions to seed analyses of quantum networks of complex topologies.
Accelerating Innovation Through Coopetition: The Innovation Learning Network Experience.
McCarthy, Chris; Ford Carleton, Penny; Krumpholz, Elizabeth; Chow, Marilyn P
Coopetition, the simultaneous pursuit of cooperation and competition, is a growing force in the innovation landscape. For some organizations, the primary mode of innovation continues to be deeply secretive and highly competitive, but for others, a new style of shared challenges, shared purpose, and shared development has become a superior, more efficient way of working to accelerate innovation capabilities and capacity. Over the last 2 decades, the literature base devoted to coopetition has gradually expanded. However, the field is still in its infancy. The majority of coopetition research is qualitative, primarily consisting of case studies. Few studies have addressed the nonprofit sector or service industries such as health care. The authors believe that this article may offer a unique perspective on coopetition in the context of a US-based national health care learning alliance designed to accelerate innovation, the Innovation Learning Network or ILN. The mission of the ILN is to "Share the joy and pain of innovation," accelerating innovation by sharing solutions, teaching techniques, and cultivating friendships. These 3 pillars (sharing, teaching, and cultivating) form the foundation for coopetition within the ILN. Through the lens of coopetition, we examine the experience of the ILN over the last 10 years and provide case examples that illustrate the benefits and challenges of coopetition in accelerating innovation in health care.
Tag Content Access Control with Identity-based Key Exchange
NASA Astrophysics Data System (ADS)
Yan, Liang; Rong, Chunming
2010-09-01
Radio Frequency Identification (RFID) technology that used to identify objects and users has been applied to many applications such retail and supply chain recently. How to prevent tag content from unauthorized readout is a core problem of RFID privacy issues. Hash-lock access control protocol can make tag to release its content only to reader who knows the secret key shared between them. However, in order to get this shared secret key required by this protocol, reader needs to communicate with a back end database. In this paper, we propose to use identity-based secret key exchange approach to generate the secret key required for hash-lock access control protocol. With this approach, not only back end database connection is not needed anymore, but also tag cloning problem can be eliminated at the same time.
Teleportation-based continuous variable quantum cryptography
NASA Astrophysics Data System (ADS)
Luiz, F. S.; Rigolin, Gustavo
2017-03-01
We present a continuous variable (CV) quantum key distribution (QKD) scheme based on the CV quantum teleportation of coherent states that yields a raw secret key made up of discrete variables for both Alice and Bob. This protocol preserves the efficient detection schemes of current CV technology (no single-photon detection techniques) and, at the same time, has efficient error correction and privacy amplification schemes due to the binary modulation of the key. We show that for a certain type of incoherent attack, it is secure for almost any value of the transmittance of the optical line used by Alice to share entangled two-mode squeezed states with Bob (no 3 dB or 50% loss limitation characteristic of beam splitting attacks). The present CVQKD protocol works deterministically (no postselection needed) with efficient direct reconciliation techniques (no reverse reconciliation) in order to generate a secure key and beyond the 50% loss case at the incoherent attack level.
Retrieving and routing quantum information in a quantum network
NASA Astrophysics Data System (ADS)
Sazim, S.; Chiranjeevi, V.; Chakrabarty, I.; Srinathan, K.
2015-12-01
In extant quantum secret sharing protocols, once the secret is shared in a quantum network ( qnet) it cannot be retrieved, even if the dealer wishes that his/her secret no longer be available in the network. For instance, if the dealer is part of the two qnets, say {{Q}}_1 and {{Q}}_2 and he/she subsequently finds that {{Q}}_2 is more reliable than {{Q}}_1, he/she may wish to transfer all her secrets from {{Q}}_1 to {{Q}}_2. Known protocols are inadequate to address such a revocation. In this work we address this problem by designing a protocol that enables the source/dealer to bring back the information shared in the network, if desired. Unlike classical revocation, the no-cloning theorem automatically ensures that the secret is no longer shared in the network. The implications of our results are multi-fold. One interesting implication of our technique is the possibility of routing qubits in asynchronous qnets. By asynchrony we mean that the requisite data/resources are intermittently available (but not necessarily simultaneously) in the qnet. For example, we show that a source S can send quantum information to a destination R even though (a) S and R share no quantum resource, (b) R's identity is unknown to S at the time of sending the message, but is subsequently decided, (c) S herself can be R at a later date and/or in a different location to bequeath her information (`backed-up' in the qnet) and (d) importantly, the path chosen for routing the secret may hit a dead end due to resource constraints, congestion, etc., (therefore the information needs to be back-tracked and sent along an alternate path). Another implication of our technique is the possibility of using insecure resources. For instance, if the quantum memory within an organization is insufficient, it may safely store (using our protocol) its private information with a neighboring organization without (a) revealing critical data to the host and (b) losing control over retrieving the data. Putting the two implications together, namely routing and secure storage, it is possible to envision applications like quantum mail (qmail) as an outsourced service.
Experimental quantum secret sharing and third-man quantum cryptography.
Chen, Yu-Ao; Zhang, An-Ning; Zhao, Zhi; Zhou, Xiao-Qi; Lu, Chao-Yang; Peng, Cheng-Zhi; Yang, Tao; Pan, Jian-Wei
2005-11-11
Quantum secret sharing (QSS) and third-man quantum cryptography (TQC) are essential for advanced quantum communication; however, the low intensity and fragility of the multiphoton entanglement source in previous experiments have made their realization an extreme experimental challenge. Here, we develop and exploit an ultrastable high intensity source of four-photon entanglement to report an experimental realization of QSS and TQC. The technology developed in our experiment will be important for future multiparty quantum communication.
Chahal, Sabreen; Wei, Peter; Moua, Pachai; Park, Sung Pil James; Kwon, Janet; Patel, Arth; Vu, Anthony T; Catolico, Jason A; Tsai, Yu Fang Tina; Shaheen, Nadia; Chu, Tiffany T; Tam, Vivian; Khan, Zill-E-Huma; Joo, Hyun Henry; Xue, Liang; Lin-Cereghino, Joan; Tsai, Jerry W; Lin-Cereghino, Geoff P
2017-01-20
The methylotrophic yeast Pichia pastoris has been used extensively for expressing recombinant proteins because it combines the ease of genetic manipulation, the ability to provide complex posttranslational modifications and the capacity for efficient protein secretion. The most successful and commonly used secretion signal leader in Pichia pastoris has been the alpha mating factor (MATα) prepro secretion signal. However, limitations exist as some proteins cannot be secreted efficiently, leading to strategies to enhance secretion efficiency by modifying the secretion signal leader. Based on a Jpred secondary structure prediction and knob-socket modeling of tertiary structure, numerous deletions and duplications of the MATα prepro leader were engineered to evaluate the correlation between predicted secondary structure and the secretion level of the reporters horseradish peroxidase (HRP) and Candida antarctica lipase B. In addition, circular dichroism analyses were completed for the wild type and several mutant pro-peptides to evaluate actual differences in secondary structure. The results lead to a new model of MATα pro-peptide signal leader, which suggests that the N and C-termini of MATα pro-peptide need to be presented in a specific orientation for proper interaction with the cellular secretion machinery and for efficient protein secretion. Copyright © 2016 Elsevier B.V. All rights reserved.
Local distinguishability of Dicke states in quantum secret sharing
NASA Astrophysics Data System (ADS)
Wang, Jing-Tao; Xu, Gang; Chen, Xiu-Bo; Sun, Xing-Ming; Jia, Heng-Yue
2017-03-01
We comprehensively investigate the local distinguishability of orthogonal Dicke states under local operations and classical communication (LOCC) from both qualitative and quantitative aspects. Based on our work, defects in the LOCC-quantum secret sharing (QSS) scheme can be complemented, and the information leakage can be quantified. For (k1 ,k2 , k , n)-threshold LOCC-QSS scheme, more intuitive formulas for unambiguous probability and guessing probability were established, which can be used for determining the parameter k1 and k2 directly.
NASA Astrophysics Data System (ADS)
Sun, Ying; Wen, Qiao-yan; Zhu, Fu-chen
2010-01-01
The security of the multiparty quantum secret sharing protocol presented by Zhang [Z.J. Zhang, Physica A, 361 (2006) 233] is analyzed. It is shown that this protocol is vulnerable to the insider attack since eavesdropping detection is performed only when all states arrive at the last agent. We propose an attack strategy and give an improved version of the original protocol. The improved protocol is robust and has the same traits with the original one.
Experimental circular quantum secret sharing over telecom fiber network.
Wei, Ke-Jin; Ma, Hai-Qiang; Yang, Jian-Hui
2013-07-15
We present a robust single photon circular quantum secret sharing (QSS) scheme with phase encoding over 50 km single mode fiber network using a circular QSS protocol. Our scheme can automatically provide a perfect compensation of birefringence and remain stable for a long time. A high visibility of 99.3% is obtained. Furthermore, our scheme realizes a polarization insensitive phase modulators. The visibility of this system can be maintained perpetually without any adjustment to the system every time we test the system.
2013-01-01
Background Fungal pathogens cause devastating losses in economically important cereal crops by utilising pathogen proteins to infect host plants. Secreted pathogen proteins are referred to as effectors and have thus far been identified by selecting small, cysteine-rich peptides from the secretome despite increasing evidence that not all effectors share these attributes. Results We take advantage of the availability of sequenced fungal genomes and present an unbiased method for finding putative pathogen proteins and secreted effectors in a query genome via comparative hidden Markov model analyses followed by unsupervised protein clustering. Our method returns experimentally validated fungal effectors in Stagonospora nodorum and Fusarium oxysporum as well as the N-terminal Y/F/WxC-motif from the barley powdery mildew pathogen. Application to the cereal pathogen Fusarium graminearum reveals a secreted phosphorylcholine phosphatase that is characteristic of hemibiotrophic and necrotrophic cereal pathogens and shares an ancient selection process with bacterial plant pathogens. Three F. graminearum protein clusters are found with an enriched secretion signal. One of these putative effector clusters contains proteins that share a [SG]-P-C-[KR]-P sequence motif in the N-terminal and show features not commonly associated with fungal effectors. This motif is conserved in secreted pathogenic Fusarium proteins and a prime candidate for functional testing. Conclusions Our pipeline has successfully uncovered conservation patterns, putative effectors and motifs of fungal pathogens that would have been overlooked by existing approaches that identify effectors as small, secreted, cysteine-rich peptides. It can be applied to any pathogenic proteome data, such as microbial pathogen data of plants and other organisms. PMID:24252298
Quantum secret sharing using orthogonal multiqudit entangled states
NASA Astrophysics Data System (ADS)
Bai, Chen-Ming; Li, Zhi-Hui; Liu, Cheng-Ji; Li, Yong-Ming
2017-12-01
In this work, we investigate the distinguishability of orthogonal multiqudit entangled states under restricted local operations and classical communication. According to these properties, we propose a quantum secret sharing scheme to realize three types of access structures, i.e., the ( n, n)-threshold, the restricted (3, n)-threshold and restricted (4, n)-threshold schemes (called LOCC-QSS scheme). All cooperating players in the restricted threshold schemes are from two disjoint groups. In the proposed protocol, the participants use the computational basis measurement and classical communication to distinguish between those orthogonal states and reconstruct the original secret. Furthermore, we also analyze the security of our scheme in four primary quantum attacks and give a simple encoding method in order to better prevent the participant conspiracy attack.
Practical scheme to share a secret key through a quantum channel with a 27.6% bit error rate
NASA Astrophysics Data System (ADS)
Chau, H. F.
2002-12-01
A secret key shared through quantum key distribution between two cooperative players is secure against any eavesdropping attack allowed by the laws of physics. Yet, such a key can be established only when the quantum channel error rate due to eavesdropping or imperfect apparatus is low. Here, a practical quantum key distribution scheme by making use of an adaptive privacy amplification procedure with two-way classical communication is reported. Then, it is proven that the scheme generates a secret key whenever the bit error rate of the quantum channel is less than 0.5-0.1(5)≈27.6%, thereby making it the most error resistant scheme known to date.
Low cost and compact quantum key distribution
NASA Astrophysics Data System (ADS)
Duligall, J. L.; Godfrey, M. S.; Harrison, K. A.; Munro, W. J.; Rarity, J. G.
2006-10-01
We present the design of a novel free-space quantum cryptography system, complete with purpose-built software, that can operate in daylight conditions. The transmitter and receiver modules are built using inexpensive off-the-shelf components. Both modules are compact allowing the generation of renewed shared secrets on demand over a short range of a few metres. An analysis of the software is shown as well as results of error rates and therefore shared secret yields at varying background light levels. As the system is designed to eventually work in short-range consumer applications, we also present a use scenario where the consumer can regularly 'top up' a store of secrets for use in a variety of one-time-pad (OTP) and authentication protocols.
NASA Astrophysics Data System (ADS)
Li, Xianye; Meng, Xiangfeng; Wang, Yurong; Yang, Xiulun; Yin, Yongkai; Peng, Xiang; He, Wenqi; Dong, Guoyan; Chen, Hongyi
2017-09-01
A multiple-image encryption method is proposed that is based on row scanning compressive ghost imaging, (t, n) threshold secret sharing, and phase retrieval in the Fresnel domain. In the encryption process, after wavelet transform and Arnold transform of the target image, the ciphertext matrix can be first detected using a bucket detector. Based on a (t, n) threshold secret sharing algorithm, the measurement key used in the row scanning compressive ghost imaging can be decomposed and shared into two pairs of sub-keys, which are then reconstructed using two phase-only mask (POM) keys with fixed pixel values, placed in the input plane and transform plane 2 of the phase retrieval scheme, respectively; and the other POM key in the transform plane 1 can be generated and updated by the iterative encoding of each plaintext image. In each iteration, the target image acts as the input amplitude constraint in the input plane. During decryption, each plaintext image possessing all the correct keys can be successfully decrypted by measurement key regeneration, compression algorithm reconstruction, inverse wavelet transformation, and Fresnel transformation. Theoretical analysis and numerical simulations both verify the feasibility of the proposed method.
Quantum state sharing against the controller's cheating
NASA Astrophysics Data System (ADS)
Shi, Run-hua; Zhong, Hong; Huang, Liu-sheng
2013-08-01
Most existing QSTS schemes are equivalent to the controlled teleportation, in which a designated agent (i.e., the recoverer) can recover the teleported state with the help of the controllers. However, the controller may attempt to cheat the recoverer during the phase of recovering the secret state. How can we detect this cheating? In this paper, we considered the problem of detecting the controller's cheating in Quantum State Sharing, and further proposed an effective Quantum State Sharing scheme against the controller's cheating. We cleverly use Quantum Secret Sharing, Multiple Quantum States Sharing and decoy-particle techniques. In our scheme, via a previously shared entanglement state Alice can teleport multiple arbitrary multi-qubit states to Bob with the help of Charlie. Furthermore, by the classical information shared previously, Alice and Bob can check whether there is any cheating of Charlie. In addition, our scheme only needs to perform Bell-state and single-particle measurements, and to apply C-NOT gate and other single-particle unitary operations. With the present techniques, it is feasible to implement these necessary measurements and operations.
Quantum Dialogue with Authentication Based on Bell States
NASA Astrophysics Data System (ADS)
Shen, Dongsu; Ma, Wenping; Yin, Xunru; Li, Xiaoping
2013-06-01
We propose an authenticated quantum dialogue protocol, which is based on a shared private quantum entangled channel. In this protocol, the EPR pairs are randomly prepared in one of the four Bell states for communication. By performing four Pauli operations on the shared EPR pairs to encode their shared authentication key and secret message, two legitimate users can implement mutual identity authentication and quantum dialogue without the help from the third party authenticator. Furthermore, due to the EPR pairs which are used for secure communication are utilized to implement authentication and the whole authentication process is included in the direct secure communication process, it does not require additional particles to realize authentication in this protocol. The updated authentication key provides the counterparts with a new authentication key for the next authentication and direct communication. Compared with other secure communication with authentication protocols, this one is more secure and efficient owing to the combination of authentication and direct communication. Security analysis shows that it is secure against the eavesdropping attack, the impersonation attack and the man-in-the-middle (MITM) attack.
Multi-party Quantum Key Agreement without Entanglement
NASA Astrophysics Data System (ADS)
Cai, Bin-Bin; Guo, Gong-De; Lin, Song
2017-04-01
A new efficient quantum key agreement protocol without entanglement is proposed. In this protocol, each user encodes his secret key into the traveling particles by performing one of four rotation operations that one cannot perfectly distinguish. In the end, all users can simultaneously obtain the final shared key. The security of the presented protocol against some common attacks is discussed. It is shown that this protocol can effectively protect the privacy of each user and satisfy the requirement of fairness in theory. Moreover, the quantum carriers and the encoding operations used in the protocol can be achieved in realistic physical devices. Therefore, the presented protocol is feasible with current technology.
Fault-tolerant Remote Quantum Entanglement Establishment for Secure Quantum Communications
NASA Astrophysics Data System (ADS)
Tsai, Chia-Wei; Lin, Jason
2016-07-01
This work presents a strategy for constructing long-distance quantum communications among a number of remote users through collective-noise channel. With the assistance of semi-honest quantum certificate authorities (QCAs), the remote users can share a secret key through fault-tolerant entanglement swapping. The proposed protocol is feasible for large-scale distributed quantum networks with numerous users. Each pair of communicating parties only needs to establish the quantum channels and the classical authenticated channels with his/her local QCA. Thus, it enables any user to communicate freely without point-to-point pre-establishing any communication channels, which is efficient and feasible for practical environments.
Entropic inequalities for a class of quantum secret-sharing states
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sarvepalli, Pradeep
It is well known that von Neumann entropy is nonmonotonic, unlike Shannon entropy (which is monotonically nondecreasing). Consequently, it is difficult to relate the entropies of the subsystems of a given quantum state. In this paper, we show that if we consider quantum secret-sharing states arising from a class of monotone span programs, then we can partially recover the monotonicity of entropy for the so-called unauthorized sets. Furthermore, we can show for these quantum states that the entropy of the authorized sets is monotonically nonincreasing.
Brough, David; Pelegrin, Pablo; Nickel, Walter
2017-10-01
Extracellular proteins with important signalling roles in processes, such as inflammation and angiogenesis, are known to employ unconventional routes of protein secretion. Although mechanisms of unconventional protein secretion are beginning to emerge, the precise molecular details have remained elusive for the majority of cargo proteins secreted by unconventional means. Recent findings suggest that for two examples of unconventionally secreted proteins, interleukin 1β (IL-1β) and fibroblast growth factor 2 (FGF2), the common molecular principle of pore formation may be shared. Under specific experimental conditions, secretion of IL-1β and FGF2 is triggered by phosphatidylinositol 4,5-bisphosphate [PI(4,5)P 2 ]-dependent formation of pores across the plasma membrane. However, the underlying mechanisms are different, with FGF2 known to directly interact with PI(4,5)P 2 , whereas in the case of IL-1β secretion, it is proposed that the N-terminal fragment of gasdermin D interacts with PI(4,5)P 2 to form the pore. Thus, although implemented in different ways, these findings suggest that pore formation may be shared by the unconventional secretion mechanisms for FGF2 and IL-1β in at least some cases. In this Opinion article, we discuss the unconventional mechanisms of FGF2 and IL-1β release with a particular emphasis on recent discoveries suggesting the importance of pore formation on the plasma membrane. © 2017. Published by The Company of Biologists Ltd.
Detector-device-independent quantum secret sharing with source flaws.
Yang, Xiuqing; Wei, Kejin; Ma, Haiqiang; Liu, Hongwei; Yin, Zhenqiang; Cao, Zhu; Wu, Lingan
2018-04-10
Measurement-device-independent entanglement witness (MDI-EW) plays an important role for detecting entanglement with untrusted measurement device. We present a double blinding-attack on a quantum secret sharing (QSS) protocol based on GHZ state. Using the MDI-EW method, we propose a QSS protocol against all detector side-channels. We allow source flaws in practical QSS system, so that Charlie can securely distribute a key between the two agents Alice and Bob over long distances. Our protocol provides condition on the extracted key rate for the secret against both external eavesdropper and arbitrary dishonest participants. A tight bound for collective attacks can provide good bounds on the practical QSS with source flaws. Then we show through numerical simulations that using single-photon source a secure QSS over 136 km can be achieved.
Experimental demonstration of graph-state quantum secret sharing.
Bell, B A; Markham, D; Herrera-Martí, D A; Marin, A; Wadsworth, W J; Rarity, J G; Tame, M S
2014-11-21
Quantum communication and computing offer many new opportunities for information processing in a connected world. Networks using quantum resources with tailor-made entanglement structures have been proposed for a variety of tasks, including distributing, sharing and processing information. Recently, a class of states known as graph states has emerged, providing versatile quantum resources for such networking tasks. Here we report an experimental demonstration of graph state-based quantum secret sharing--an important primitive for a quantum network with applications ranging from secure money transfer to multiparty quantum computation. We use an all-optical setup, encoding quantum information into photons representing a five-qubit graph state. We find that one can reliably encode, distribute and share quantum information amongst four parties, with various access structures based on the complex connectivity of the graph. Our results show that graph states are a promising approach for realising sophisticated multi-layered communication protocols in quantum networks.
Enhanced secretion of natto phytase by Bacillus subtilis.
Tsuji, Shogo; Tanaka, Kosei; Takenaka, Shinji; Yoshida, Ken-ichi
2015-01-01
Phytases comprise a group of phosphatases that trim inorganic phosphates from phytic acid (IP6). In this study, we aimed to achieve the efficient secretion of phytase by Bacillus subtilis. B. subtilis laboratory standard strain 168 and its derivatives exhibit no phytase activity, whereas a natto starter secretes phytase actively. The natto phytase gene was cloned into strain RIK1285, a protease-defective derivative of 168, to construct a random library of its N-terminal fusions with 173 different signal peptides (SPs) identified in the 168 genome. The library was screened to assess the efficiency of phytase secretion based on clear zones around colonies on plates, which appeared when IP6 was hydrolyzed. The pbp SP enhanced the secretion of the natto phytase most efficiently, i.e. twice that of the original SP. Thus, the secreted natto phytase was purified and found to remove up to 3 phosphates from IP6.
Privacy-preserving photo sharing based on a public key infrastructure
NASA Astrophysics Data System (ADS)
Yuan, Lin; McNally, David; Küpçü, Alptekin; Ebrahimi, Touradj
2015-09-01
A significant number of pictures are posted to social media sites or exchanged through instant messaging and cloud-based sharing services. Most social media services offer a range of access control mechanisms to protect users privacy. As it is not in the best interest of many such services if their users restrict access to their shared pictures, most services keep users' photos unprotected which makes them available to all insiders. This paper presents an architecture for a privacy-preserving photo sharing based on an image scrambling scheme and a public key infrastructure. A secure JPEG scrambling is applied to protect regional visual information in photos. Protected images are still compatible with JPEG coding and therefore can be viewed by any one on any device. However, only those who are granted secret keys will be able to descramble the photos and view their original versions. The proposed architecture applies an attribute-based encryption along with conventional public key cryptography, to achieve secure transmission of secret keys and a fine-grained control over who may view shared photos. In addition, we demonstrate the practical feasibility of the proposed photo sharing architecture with a prototype mobile application, ProShare, which is built based on iOS platform.
A kind of universal quantum secret sharing protocol
NASA Astrophysics Data System (ADS)
Chen, Xiu-Bo; Dou, Zhao; Xu, Gang; He, Xiao-Yu; Yang, Yi-Xian
2017-01-01
Universality is an important feature, but less researched in quantum communication protocols. In this paper, a kind of universal quantum secret sharing protocol is investigated. Firstly, we design a quantum secret sharing protocol based on the Borras-Plastino-Batle (BPB) state. Departing from previous research, our protocol has a salient feature in that participants in our protocol only need projective measurement instead of any unitary operations. It makes our protocol more flexible. Secondly, universality of quantum communication protocols is studied for the first time. More specifically, module division of quantum communication protocols and coupling between different modules are discussed. Our aforementioned protocol is analyzed as an example. On one hand, plenty of quantum states (the BPB-class states and the BPB-like-class states, which are proposed in this paper) could be used as carrier to perform our protocol. On the other hand, our protocol also could be regarded as a quantum private comparison protocol with a little revision. These features are rare for quantum communication protocols, and make our protocol more robust. Thirdly, entanglements of the BPB-class states are calculated in the Appendix.
A kind of universal quantum secret sharing protocol.
Chen, Xiu-Bo; Dou, Zhao; Xu, Gang; He, Xiao-Yu; Yang, Yi-Xian
2017-01-12
Universality is an important feature, but less researched in quantum communication protocols. In this paper, a kind of universal quantum secret sharing protocol is investigated. Firstly, we design a quantum secret sharing protocol based on the Borras-Plastino-Batle (BPB) state. Departing from previous research, our protocol has a salient feature in that participants in our protocol only need projective measurement instead of any unitary operations. It makes our protocol more flexible. Secondly, universality of quantum communication protocols is studied for the first time. More specifically, module division of quantum communication protocols and coupling between different modules are discussed. Our aforementioned protocol is analyzed as an example. On one hand, plenty of quantum states (the BPB-class states and the BPB-like-class states, which are proposed in this paper) could be used as carrier to perform our protocol. On the other hand, our protocol also could be regarded as a quantum private comparison protocol with a little revision. These features are rare for quantum communication protocols, and make our protocol more robust. Thirdly, entanglements of the BPB-class states are calculated in the Appendix.
A kind of universal quantum secret sharing protocol
Chen, Xiu-Bo; Dou, Zhao; Xu, Gang; He, Xiao-Yu; Yang, Yi-Xian
2017-01-01
Universality is an important feature, but less researched in quantum communication protocols. In this paper, a kind of universal quantum secret sharing protocol is investigated. Firstly, we design a quantum secret sharing protocol based on the Borras-Plastino-Batle (BPB) state. Departing from previous research, our protocol has a salient feature in that participants in our protocol only need projective measurement instead of any unitary operations. It makes our protocol more flexible. Secondly, universality of quantum communication protocols is studied for the first time. More specifically, module division of quantum communication protocols and coupling between different modules are discussed. Our aforementioned protocol is analyzed as an example. On one hand, plenty of quantum states (the BPB-class states and the BPB-like-class states, which are proposed in this paper) could be used as carrier to perform our protocol. On the other hand, our protocol also could be regarded as a quantum private comparison protocol with a little revision. These features are rare for quantum communication protocols, and make our protocol more robust. Thirdly, entanglements of the BPB-class states are calculated in the Appendix. PMID:28079109
Improved Secret Image Sharing Scheme in Embedding Capacity without Underflow and Overflow.
Pang, Liaojun; Miao, Deyu; Li, Huixian; Wang, Qiong
2015-01-01
Computational secret image sharing (CSIS) is an effective way to protect a secret image during its transmission and storage, and thus it has attracted lots of attentions since its appearance. Nowadays, it has become a hot topic for researchers to improve the embedding capacity and eliminate the underflow and overflow situations, which is embarrassing and difficult to deal with. The scheme, which has the highest embedding capacity among the existing schemes, has the underflow and overflow problems. Although the underflow and overflow situations have been well dealt with by different methods, the embedding capacities of these methods are reduced more or less. Motivated by these concerns, we propose a novel scheme, in which we take the differential coding, Huffman coding, and data converting to compress the secret image before embedding it to further improve the embedding capacity, and the pixel mapping matrix embedding method with a newly designed matrix is used to embed secret image data into the cover image to avoid the underflow and overflow situations. Experiment results show that our scheme can improve the embedding capacity further and eliminate the underflow and overflow situations at the same time.
Improved Secret Image Sharing Scheme in Embedding Capacity without Underflow and Overflow
Pang, Liaojun; Miao, Deyu; Li, Huixian; Wang, Qiong
2015-01-01
Computational secret image sharing (CSIS) is an effective way to protect a secret image during its transmission and storage, and thus it has attracted lots of attentions since its appearance. Nowadays, it has become a hot topic for researchers to improve the embedding capacity and eliminate the underflow and overflow situations, which is embarrassing and difficult to deal with. The scheme, which has the highest embedding capacity among the existing schemes, has the underflow and overflow problems. Although the underflow and overflow situations have been well dealt with by different methods, the embedding capacities of these methods are reduced more or less. Motivated by these concerns, we propose a novel scheme, in which we take the differential coding, Huffman coding, and data converting to compress the secret image before embedding it to further improve the embedding capacity, and the pixel mapping matrix embedding method with a newly designed matrix is used to embed secret image data into the cover image to avoid the underflow and overflow situations. Experiment results show that our scheme can improve the embedding capacity further and eliminate the underflow and overflow situations at the same time. PMID:26351657
Notes on two multiparty quantum secret sharing schemes
NASA Astrophysics Data System (ADS)
Gao, Gan
In the paper [H. Abulkasim et al., Int. J. Quantum Inform. 15 (2017) 1750023], Abulkasim et al. proposed a quantum secret sharing scheme based on Bell states. We study the security of the multiparty case in the proposed scheme and detect that it is not secure. In the paper [Y. Du and W. Bao, Opt. Commun. 308 (2013) 159], Du and Bao listed Gao’s scheme and gave a attack strategy on the listed scheme. We point out that their listing scheme is not the genuine Gao’s scheme and their research method is not advisable.
Robust multiparty quantum secret key sharing over two collective-noise channels
NASA Astrophysics Data System (ADS)
Zhang, Zhan-jun
2006-02-01
Based on a polarization-based quantum key distribution protocol over a collective-noise channel [Phys. Rev. Lett. 92 (2004) 017901], a robust (n,n)-threshold scheme of multiparty quantum secret sharing of key over two collective-noise channels (i.e., the collective dephasing channel and the collective rotating channel) is proposed. In this scheme the sharer entirety can establish a joint key with the message sender only if all the sharers collaborate together. Since Bell singlets are enough for use and only single-photon polarization needs to be identified, this scheme is feasible according to the present-day technique.
Plants as models for the study of human pathogenesis.
Guttman, David S
2004-05-01
There are many common disease mechanisms used by bacterial pathogens of plants and humans. They use common means of attachment, secretion and genetic regulation. They share many virulence factors, such as extracellular polysaccharides and some type III secreted effectors. Plant and human innate immune systems also share many similarities. Many of these shared bacterial virulence mechanisms are homologous, but even more appear to have independently converged on a common function. This combination of homologous and analogous systems reveals conserved and critical steps in the disease process. Given these similarities, and the many experimental advantages of plant biology, including ease of replication, stringent genetic and reproductive control, and high throughput with low cost, it is proposed that plants would make excellent models for the study of human pathogenesis.
Cheating prevention in visual cryptography.
Hu, Chih-Ming; Tzeng, Wen-Guey
2007-01-01
Visual cryptography (VC) is a method of encrypting a secret image into shares such that stacking a sufficient number of shares reveals the secret image. Shares are usually presented in transparencies. Each participant holds a transparency. Most of the previous research work on VC focuses on improving two parameters: pixel expansion and contrast. In this paper, we studied the cheating problem in VC and extended VC. We considered the attacks of malicious adversaries who may deviate from the scheme in any way. We presented three cheating methods and applied them on attacking existent VC or extended VC schemes. We improved one cheat-preventing scheme. We proposed a generic method that converts a VCS to another VCS that has the property of cheating prevention. The overhead of the conversion is near optimal in both contrast degression and pixel expansion.
SSeCloud: Using secret sharing scheme to secure keys
NASA Astrophysics Data System (ADS)
Hu, Liang; Huang, Yang; Yang, Disheng; Zhang, Yuzhen; Liu, Hengchang
2017-08-01
With the use of cloud storage services, one of the concerns is how to protect sensitive data securely and privately. While users enjoy the convenience of data storage provided by semi-trusted cloud storage providers, they are confronted with all kinds of risks at the same time. In this paper, we present SSeCloud, a secure cloud storage system that improves security and usability by applying secret sharing scheme to secure keys. The system encrypts uploading files on the client side and splits encrypted keys into three shares. Each of them is respectively stored by users, cloud storage providers and the alternative third trusted party. Any two of the parties can reconstruct keys. Evaluation results of prototype system show that SSeCloud provides high security without too much performance penalty.
Thomas, Ranjit; Macsween, Karen F; McAulay, Karen; Clutterbuck, Daniel; Anderson, Richard; Reid, Stuart; Higgins, Craig D; Swerdlow, Anthony J; Harrison, Nadine; Williams, Hilary; Crawford, Dorothy H
2006-09-01
Epstein-Barr virus is present in the saliva of most persistently infected individuals and is generally thought to be spread by close oral contact. However, there are now several reports of EBV in genital secretions, suggesting the possibility of sexual transmission between adults. The present study was undertaken to investigate the risk of sexual transmission of EBV. PCR analysis was used to examined the degree to which a group (n = 11) of patients with infectious mononucleosis (IM) shared the same viral isolates as their sexual partners, and compare this to the extent of isolate sharing among a different group (n = 18) of IM patients and their non-sexual contacts. There was significantly more sharing of EBV isolates among the IM/sexual-contact pairs than among the IM/non-sexual-contact pairs (P = 0.0012). Female cervical (n = 84), male urethral (n = 55), and semen (n = 30) samples from asymptomatic, unselected volunteers were analyzed for the presence of EBV DNA, revealing 7%, 5%, and 3% to be EBV positive, respectively. Fractionation of cervical and urethral samples into cellular and supernatant fluid components showed EBV to be mainly cell-associated. Quantitation of EBV in these samples gave levels of below 10 EBV genomes per microg of DNA. Overall the findings support the possibility that EBV could on occasions be transmitted sexually, however, the low levels detected in genital secretions compared to saliva suggest that this is not a major transmission route. The finding of small quantities of cell-associated virus suggests a latent infection; thus EBV is probably in the B lymphocyte rather than in the epithelial cell component of the secretions.
NASA Astrophysics Data System (ADS)
Gao, Gan
2017-11-01
In this paper, we show that the attack strategy [A. Yin and F. Fu, Mod. Phys. Lett. B 30 (2016) 1650415] fails, that is, the last agent and other agents cannot get the sender’s secret keys without being detected by using the attack strategy.
Secrets of Mlearning Failures: Confronting Reality
ERIC Educational Resources Information Center
Cochrane, Thomas
2012-01-01
Having implemented and evaluated over 35 mlearning projects in a variety of contexts in higher education over the past 6 years the researcher is ready to share the untold secret: not all mlearning projects succeed! This article critiques three of the researcher's mlearning projects that can be classed as "failures" and compares them to successful…
Novel Multi-Party Quantum Key Agreement Protocol with G-Like States and Bell States
NASA Astrophysics Data System (ADS)
Min, Shi-Qi; Chen, Hua-Ying; Gong, Li-Hua
2018-03-01
A significant aspect of quantum cryptography is quantum key agreement (QKA), which ensures the security of key agreement protocols by quantum information theory. The fairness of an absolute security multi-party quantum key agreement (MQKA) protocol demands that all participants can affect the protocol result equally so as to establish a shared key and that nobody can determine the shared key by himself/herself. We found that it is difficult for the existing multi-party quantum key agreement protocol to withstand the collusion attacks. Put differently, it is possible for several cooperated and untruthful participants to determine the final key without being detected. To address this issue, based on the entanglement swapping between G-like state and Bell states, a new multi-party quantum key agreement protocol is put forward. The proposed protocol makes full use of EPR pairs as quantum resources, and adopts Bell measurement and unitary operation to share a secret key. Besides, the proposed protocol is fair, secure and efficient without involving a third party quantum center. It demonstrates that the protocol is capable of protecting users' privacy and meeting the requirement of fairness. Moreover, it is feasible to carry out the protocol with existing technologies.
Novel Multi-Party Quantum Key Agreement Protocol with G-Like States and Bell States
NASA Astrophysics Data System (ADS)
Min, Shi-Qi; Chen, Hua-Ying; Gong, Li-Hua
2018-06-01
A significant aspect of quantum cryptography is quantum key agreement (QKA), which ensures the security of key agreement protocols by quantum information theory. The fairness of an absolute security multi-party quantum key agreement (MQKA) protocol demands that all participants can affect the protocol result equally so as to establish a shared key and that nobody can determine the shared key by himself/herself. We found that it is difficult for the existing multi-party quantum key agreement protocol to withstand the collusion attacks. Put differently, it is possible for several cooperated and untruthful participants to determine the final key without being detected. To address this issue, based on the entanglement swapping between G-like state and Bell states, a new multi-party quantum key agreement protocol is put forward. The proposed protocol makes full use of EPR pairs as quantum resources, and adopts Bell measurement and unitary operation to share a secret key. Besides, the proposed protocol is fair, secure and efficient without involving a third party quantum center. It demonstrates that the protocol is capable of protecting users' privacy and meeting the requirement of fairness. Moreover, it is feasible to carry out the protocol with existing technologies.
Kiel, Elizabeth J.; Hummel, Alexandra C.; Luebbe, Aaron M.
2015-01-01
Childhood sleep problems are prevalent and relate to a wide range of negative psychological outcomes. However, it remains unclear how biological processes, such as HPA activity, may predict sleep problems over time in childhood in the context of certain parenting environments. Fifty-one mothers and their 18–20 month-old toddlers participated in a short-term longitudinal study assessing how shared variance among morning levels, diurnal change, and nocturnal change in toddlers’ cortisol secretion predicted change in sleep problems in the context of maternal overprotection and critical control. A composite characterized by low variability in, and, to a lesser extent, high morning values of cortisol, predicted increasing sleep problems from age 2 to age 3 when mothers reported high critical control. Results suggest value in assessing shared variance among different indices of cortisol secretion patterns and the interaction between cortisol and the environment in predicting sleep problems in early childhood. PMID:25766262
Counterfactual quantum cryptography based on weak coherent states
NASA Astrophysics Data System (ADS)
Yin, Zhen-Qiang; Li, Hong-Wei; Yao, Yao; Zhang, Chun-Mei; Wang, Shuang; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu
2012-08-01
In the “counterfactual quantum cryptography” scheme [T.-G. Noh, Phys. Rev. Lett.PRLTAO0031-900710.1103/PhysRevLett.103.230501 103, 230501 (2009)], two legitimate distant peers may share secret-key bits even when the information carriers do not travel in the quantum channel. The security of this protocol with an ideal single-photon source has been proved by Yin [Z.-Q. Yin, H. W. Li, W. Chen, Z. F. Han, and G. C. Guo, Phys. Rev. APLRAAN1050-294710.1103/PhysRevA.82.042335 82, 042335 (2010)]. In this paper, we prove the security of the counterfactual-quantum-cryptography scheme based on a commonly used weak-coherent-laser source by considering a general collective attack. The basic assumption of this proof is that the efficiency and dark-counting rate of a single-photon detector are consistent for any n-photon Fock states. Then through randomizing the phases of the encoding weak coherent states, Eve's ancilla will be transformed into a classical mixture. Finally, the lower bound of the secret-key-bit rate and a performance analysis for the practical implementation are both given.
Shared elements of host-targeting pathways among apicomplexan parasites of differing lifestyles.
Pellé, Karell G; Jiang, Rays H Y; Mantel, Pierre-Yves; Xiao, Yu-Ping; Hjelmqvist, Daisy; Gallego-Lopez, Gina M; O T Lau, Audrey; Kang, Byung-Ho; Allred, David R; Marti, Matthias
2015-11-01
Apicomplexans are a diverse group of obligate parasites occupying different intracellular niches that require modification to meet the needs of the parasite. To efficiently manipulate their environment, apicomplexans translocate numerous parasite proteins into the host cell. Whereas some parasites remain contained within a parasitophorous vacuole membrane (PVM) throughout their developmental cycle, others do not, a difference that affects the machinery needed for protein export. A signal-mediated pathway for protein export into the host cell has been characterized in Plasmodium parasites, which maintain the PVM. Here, we functionally demonstrate an analogous host-targeting pathway involving organellar staging prior to secretion in the related bovine parasite, Babesia bovis, a parasite that destroys the PVM shortly after invasion. Taking into account recent identification of a similar signal-mediated pathway in the coccidian parasite Toxoplasma gondii, we suggest a model in which this conserved pathway has evolved in multiple steps from signal-mediated trafficking to specific secretory organelles for controlled secretion to a complex protein translocation process across the PVM. © 2015 John Wiley & Sons Ltd.
Huang, Li-Fen; Tan, Chia-Chun; Yeh, Ju-Fang; Liu, Hsin-Yi; Liu, Yu-Kuo; Ho, Shin-Lon; Lu, Chung-An
2015-01-01
Plant-based expression systems have emerged as a competitive platform in the large-scale production of recombinant proteins. By adding a signal peptide, αAmy3sp, the desired recombinant proteins can be secreted outside transgenic rice cells, making them easy to harvest. In this work, to improve the secretion efficiency of recombinant proteins in rice expression systems, various signal peptides including αAmy3sp, CIN1sp, and 33KDsp have been fused to the N-terminus of green fluorescent protein (GFP) and introduced into rice cells to explore the efficiency of secretion of foreign proteins. 33KDsp had better efficiency than αAmy3sp and CIN1sp for the secretion of GFP from calli and suspension-cultured cells. 33KDsp was further applied for the secretion of mouse granulocyte-macrophage colony-stimulating factor (mGM-CSF) from transgenic rice suspension-cultured cells; approximately 76%-92% of total rice-derived mGM-CSF (rmGM-CSF) was detected in the culture medium. The rmGM-CSF was bioactive and could stimulate the proliferation of a murine myeloblastic leukemia cell line, NSF-60. The extracellular yield of rmGM-CSF reached 31.7 mg/L. Our study indicates that 33KDsp is better at promoting the secretion of recombinant proteins in rice suspension-cultured cell systems than the commonly used αAmy3sp.
Pellegrin, Clement; Morin, Emmanuelle; Martin, Francis M.; ...
2015-11-18
Fungi are major players in the carbon cycle in forest ecosystems due to the wide range of interactions they have with plants either through soil degradation processes by litter decayers or biotrophic interactions with pathogenic and ectomycorrhizal symbionts. Secretion of fungal proteins mediates these interactions by allowing the fungus to interact with its environment and/or host. Ectomycorrhizal (ECM) symbiosis independently appeared several times throughout evolution and involves approximately 80% of trees. Despite extensive physiological studies on ECM symbionts, little is known about the composition and specificities of their secretomes. In this study, we used a bioinformatics pipeline to predict andmore » analyze the secretomes of 49 fungal species, including 11 ECM fungi, wood and soil decayers and pathogenic fungi to tackle the following questions: (1) Are there differences between the secretomes of saprophytic and ECM fungi? (2) Are small-secreted proteins (SSPs) more abundant in biotrophic fungi than in saprophytic fungi? and (3) Are there SSPs shared between ECM, saprotrophic and pathogenic fungi? We showed that the number of predicted secreted proteins is similar in the surveyed species, independently of their lifestyle. The secretome from ECM fungi is characterized by a restricted number of secreted CAZymes, but their repertoires of secreted proteases and lipases are similar to those of saprotrophic fungi. Focusing on SSPs, we showed that the secretome of ECM fungi is enriched in SSPs compared with other species. Most of the SSPs are coded by orphan genes with no known PFAM domain or similarities to known sequences in databases. Finally, based on the clustering analysis, we identified shared- and lifestyle-specific SSPs between saprotrophic and ECM fungi. The presence of SSPs is not limited to fungi interacting with living plants as the genome of saprotrophic fungi also code for numerous SSPs. As a result, ECM fungi shared lifestyle-specific SSPs likely involved in symbiosis that are good candidates for further functional analyses.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pellegrin, Clement; Morin, Emmanuelle; Martin, Francis M.
Fungi are major players in the carbon cycle in forest ecosystems due to the wide range of interactions they have with plants either through soil degradation processes by litter decayers or biotrophic interactions with pathogenic and ectomycorrhizal symbionts. Secretion of fungal proteins mediates these interactions by allowing the fungus to interact with its environment and/or host. Ectomycorrhizal (ECM) symbiosis independently appeared several times throughout evolution and involves approximately 80% of trees. Despite extensive physiological studies on ECM symbionts, little is known about the composition and specificities of their secretomes. In this study, we used a bioinformatics pipeline to predict andmore » analyze the secretomes of 49 fungal species, including 11 ECM fungi, wood and soil decayers and pathogenic fungi to tackle the following questions: (1) Are there differences between the secretomes of saprophytic and ECM fungi? (2) Are small-secreted proteins (SSPs) more abundant in biotrophic fungi than in saprophytic fungi? and (3) Are there SSPs shared between ECM, saprotrophic and pathogenic fungi? We showed that the number of predicted secreted proteins is similar in the surveyed species, independently of their lifestyle. The secretome from ECM fungi is characterized by a restricted number of secreted CAZymes, but their repertoires of secreted proteases and lipases are similar to those of saprotrophic fungi. Focusing on SSPs, we showed that the secretome of ECM fungi is enriched in SSPs compared with other species. Most of the SSPs are coded by orphan genes with no known PFAM domain or similarities to known sequences in databases. Finally, based on the clustering analysis, we identified shared- and lifestyle-specific SSPs between saprotrophic and ECM fungi. The presence of SSPs is not limited to fungi interacting with living plants as the genome of saprotrophic fungi also code for numerous SSPs. As a result, ECM fungi shared lifestyle-specific SSPs likely involved in symbiosis that are good candidates for further functional analyses.« less
Pellegrin, Clement; Morin, Emmanuelle; Martin, Francis M.; Veneault-Fourrey, Claire
2015-01-01
Fungi are major players in the carbon cycle in forest ecosystems due to the wide range of interactions they have with plants either through soil degradation processes by litter decayers or biotrophic interactions with pathogenic and ectomycorrhizal symbionts. Secretion of fungal proteins mediates these interactions by allowing the fungus to interact with its environment and/or host. Ectomycorrhizal (ECM) symbiosis independently appeared several times throughout evolution and involves approximately 80% of trees. Despite extensive physiological studies on ECM symbionts, little is known about the composition and specificities of their secretomes. In this study, we used a bioinformatics pipeline to predict and analyze the secretomes of 49 fungal species, including 11 ECM fungi, wood and soil decayers and pathogenic fungi to tackle the following questions: (1) Are there differences between the secretomes of saprophytic and ECM fungi? (2) Are small-secreted proteins (SSPs) more abundant in biotrophic fungi than in saprophytic fungi? and (3) Are there SSPs shared between ECM, saprotrophic and pathogenic fungi? We showed that the number of predicted secreted proteins is similar in the surveyed species, independently of their lifestyle. The secretome from ECM fungi is characterized by a restricted number of secreted CAZymes, but their repertoires of secreted proteases and lipases are similar to those of saprotrophic fungi. Focusing on SSPs, we showed that the secretome of ECM fungi is enriched in SSPs compared with other species. Most of the SSPs are coded by orphan genes with no known PFAM domain or similarities to known sequences in databases. Finally, based on the clustering analysis, we identified shared- and lifestyle-specific SSPs between saprotrophic and ECM fungi. The presence of SSPs is not limited to fungi interacting with living plants as the genome of saprotrophic fungi also code for numerous SSPs. ECM fungi shared lifestyle-specific SSPs likely involved in symbiosis that are good candidates for further functional analyses. PMID:26635749
NASA Astrophysics Data System (ADS)
Liu, Cheng-Ji; Li, Zhi-Hui; Bai, Chen-Ming; Si, Meng-Meng
2018-02-01
The concept of judgment space was proposed by Wang et al. (Phys. Rev. A 95, 022320, 2017), which was used to study some important properties of quantum entangled states based on local distinguishability. In this study, we construct 15 kinds of seven-qudit quantum entangled states in the sense of permutation, calculate their judgment space and propose a distinguishability rule to make the judgment space more clearly. Based on this rule, we study the local distinguishability of the 15 kinds of seven-qudit quantum entangled states and then propose a ( k, n) threshold quantum secret sharing scheme. Finally, we analyze the security of the scheme.
Jones index, secret sharing and total quantum dimension
NASA Astrophysics Data System (ADS)
Fiedler, Leander; Naaijkens, Pieter; Osborne, Tobias J.
2017-02-01
We study the total quantum dimension in the thermodynamic limit of topologically ordered systems. In particular, using the anyons (or superselection sectors) of such models, we define a secret sharing scheme, storing information invisible to a malicious party, and argue that the total quantum dimension quantifies how well we can perform this task. We then argue that this can be made mathematically rigorous using the index theory of subfactors, originally due to Jones and later extended by Kosaki and Longo. This theory provides us with a ‘relative entropy’ of two von Neumann algebras and a quantum channel, and we argue how these can be used to quantify how much classical information two parties can hide form an adversary. We also review the total quantum dimension in finite systems, in particular how it relates to topological entanglement entropy. It is known that the latter also has an interpretation in terms of secret sharing schemes, although this is shown by completely different methods from ours. Our work provides a different and independent take on this, which at the same time is completely mathematically rigorous. This complementary point of view might be beneficial, for example, when studying the stability of the total quantum dimension when the system is perturbed.
Kaihara, Kelly A.; Dickson, Lorna M.; Jacobson, David A.; Tamarina, Natalia; Roe, Michael W.; Philipson, Louis H.; Wicksteed, Barton
2013-01-01
Acute insulin secretion determines the efficiency of glucose clearance. Moreover, impaired acute insulin release is characteristic of reduced glucose control in the prediabetic state. Incretin hormones, which increase β-cell cAMP, restore acute-phase insulin secretion and improve glucose control. To determine the physiological role of the cAMP-dependent protein kinase (PKA), a mouse model was developed to increase PKA activity specifically in the pancreatic β-cells. In response to sustained hyperglycemia, PKA activity potentiated both acute and sustained insulin release. In contrast, a glucose bolus enhanced acute-phase insulin secretion alone. Acute-phase insulin secretion was increased 3.5-fold, reducing circulating glucose to 58% of levels in controls. Exendin-4 increased acute-phase insulin release to a similar degree as PKA activation. However, incretins did not augment the effects of PKA on acute-phase insulin secretion, consistent with incretins acting primarily via PKA to potentiate acute-phase insulin secretion. Intracellular calcium signaling was unaffected by PKA activation, suggesting that the effects of PKA on acute-phase insulin secretion are mediated by the phosphorylation of proteins involved in β-cell exocytosis. Thus, β-cell PKA activity transduces the cAMP signal to dramatically increase acute-phase insulin secretion, thereby enhancing the efficiency of insulin to control circulating glucose. PMID:23349500
Ning, Xiaojun; Luckenbaugh, Laurie; Liu, Kuancheng; Bruss, Volker; Sureau, Camille; Hu, Jianming
2018-05-09
During the morphogenesis of hepatitis B virus (HBV), an enveloped virus, two types of virions are secreted: (1) a minor population of complete virions containing a mature nucleocapsid with the characteristic, partially double-stranded, relaxed circular DNA genome and (2) a major population containing an empty capsid with no DNA or RNA (empty virions). Secretion of both types of virions requires interactions between the HBV capsid or core protein (HBc) and the viral surface or envelope proteins. We have studied the requirements from both HBc and envelope proteins for empty virion secretion, in comparison with those for secretion of complete virions. Substitutions within the N-terminal domain of HBc that block secretion of DNA-containing virions reduced but did not prevent secretion of empty virions. The HBc C-terminal domain was not essential for empty virion secretion. Among the three viral envelope proteins, the smallest, S, alone was sufficient for empty virion secretion at a basal level. The largest protein, L, essential for complete virion secretion, was not required for, but could stimulate empty virion secretion. Also, substitutions in L that eliminate secretion of complete virions reduced but did not eliminate empty virion secretion. S mutations that block secretion of the hepatitis D virus (HDV), an HBV satellite, did not block secretion of either empty or complete HBV virions. Together, these results indicate that both common and distinct signals on empty capsids vs. mature nucleocapsids interact with the S and L proteins during the formation of complete vs. empty virions. IMPORTANCE Hepatitis B virus (HBV) is a major cause of severe liver diseases including cirrhosis and cancer. In addition to the complete infectious virion particle, which contains an outer envelope layer and an interior capsid that, in turn, encloses a DNA genome, HBV infected cells also secrete non-infectious, incomplete viral particles in large excess over the complete virions. In particular, the empty (or genome-free) virion share with the complete virion the outer envelope and interior capsid but contain no genome. We have carried out a comparative study on the capsid and envelope requirements for the secretion of these two types of virion particles and uncovered both shared and distinct determinants on the capsid and envelope for their secretion. These results provide new information on HBV morphogenesis, and have implications for efforts to develop empty HBV virions as a novel biomarker and a new generation of HBV vaccine. Copyright © 2018 American Society for Microbiology.
A Phytase-Based Reporter System for Identification of Functional Secretion Signals in Bifidobacteria
Osswald, Annika; Westermann, Christina; Sun, Zhongke; Riedel, Christian U.
2015-01-01
Health-promoting effects have been attributed to a number of Bifidobacterium sp. strains. These effects as well as the ability to colonise the host depend on secreted proteins. Moreover, rational design of protein secretion systems bears the potential for the generation of novel probiotic bifidobacteria with improved health-promoting or therapeutic properties. To date, there is only very limited data on secretion signals of bifidobacteria available. Using in silico analysis, we demonstrate that all bifidobacteria encode the major components of Sec-dependent secretion machineries but only B. longum strains harbour Tat protein translocation systems. A reporter plasmid for secretion signals in bifidobacteria was established by fusing the coding sequence of the signal peptide of a sialidase of Bifidobacterium bifidum S17 to the phytase gene appA of E. coli. The recombinant strain showed increased phytase activity in spent culture supernatants and reduced phytase levels in crude extracts compared to the control indicating efficient phytase secretion. The reporter plasmid was used to screen seven predicted signal peptides in B. bifidum S17 and B. longum E18. The tested signal peptides differed substantially in their efficacy to mediate protein secretion in different host strains. An efficient signal peptide was used for expression and secretion of a therapeutically relevant protein in B. bifidum S17. Expression of a secreted cytosine deaminase led to a 100-fold reduced sensitivity of B. bifidum S17 to 5-fluorocytosine compared to the non-secreted cytosine deaminase suggesting efficient conversion of 5-fluorocytosine to the cytotoxic cancer drug 5-fluorouracil by cytosine deaminase occurred outside the bacterial cell. Selection of appropriate signal peptides for defined protein secretion might improve therapeutic efficacy as well as probiotic properties of bifidobacteria. PMID:26086721
Efficient Scheme for Perfect Collective Einstein-Podolsky-Rosen Steering
Wang, M.; Gong, Q. H.; Ficek, Z.; He, Q. Y.
2015-01-01
A practical scheme for the demonstration of perfect one-sided device-independent quantum secret sharing is proposed. The scheme involves a three-mode optomechanical system in which a pair of independent cavity modes is driven by short laser pulses and interact with a movable mirror. We demonstrate that by tuning the laser frequency to the blue (anti-Stokes) sideband of the average frequency of the cavity modes, the modes become mutually coherent and then may collectively steer the mirror mode to a perfect Einstein-Podolsky-Rosen state. The scheme is shown to be experimentally feasible, it is robust against the frequency difference between the modes, mechanical thermal noise and damping, and coupling strengths of the cavity modes to the mirror. PMID:26212901
Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi
2015-08-01
Radio Frequency Identification (RFID) based solutions are widely used for providing many healthcare applications include patient monitoring, object traceability, drug administration system and telecare medicine information system (TMIS) etc. In order to reduce malpractices and ensure patient privacy, in 2015, Srivastava et al. proposed a hash based RFID tag authentication protocol in TMIS. Their protocol uses lightweight hash operation and synchronized secret value shared between back-end server and tag, which is more secure and efficient than other related RFID authentication protocols. Unfortunately, in this paper, we demonstrate that Srivastava et al.'s tag authentication protocol has a serious security problem in that an adversary may use the stolen/lost reader to connect to the medical back-end server that store information associated with tagged objects and this privacy damage causing the adversary could reveal medical data obtained from stolen/lost readers in a malicious way. Therefore, we propose a secure and efficient RFID tag authentication protocol to overcome security flaws and improve the system efficiency. Compared with Srivastava et al.'s protocol, the proposed protocol not only inherits the advantages of Srivastava et al.'s authentication protocol for TMIS but also provides better security with high system efficiency.
Seeking to Expand Middle Level Success to All Students: A Not-So-Secret Recipe
ERIC Educational Resources Information Center
White, Jesse
2014-01-01
The recipe for success of Strive Preparatory Charter School (formerly West Denver Preparatory Charter School) is not a secret. This summer program, turned four-campus, middle level phenomenon, is proving to satisfy the appetite of parents hungry for a change in their children's educational opportunities. The intent of this article is to share a…
Wittenberg-Lyles, Elaine; Washington, Karla; Oliver, Debra Parker; Shaunfield, Sara; Gage, L Ashley; Mooney, Megan; Lewis, Alexandria
2015-04-01
Although hospice agencies are required to provide informal caregivers (family or friends of the patient) with formal bereavement support when their loved one passes, most bereavement interventions lack standardization and remain untested. We employed the Dual Processing Model of Bereavement as a theoretical framework for assessing the potential of a secret Facebook group for bereaved hospice caregivers. A mixed-methods approach was utilized to analyze online communication (posts and comments) in the secret Facebook group, and self-reported outcome measures on depression and anxiety were compared pre- and post-intervention. Sixteen caregivers participated in the secret Facebook group over a period of nine months. The majority of online talk was oriented to restoration, revealing abrupt and anticipated triggers that evoked feelings of loss. Caregivers also shared loss orientation through storytelling, sharing and giving advice, and encouraging others to manage the challenges of coping. Caregiver anxiety and depression were lower after the intervention. This pilot study provides insight into the use of a secret Facebook group to facilitate bereavement support to caregivers. Findings highlight the promise of Facebook for hospice bereavement support. Providers and researchers are encouraged to explore the positive outcomes associated with bereavement support.
Two-out-of-two color matching based visual cryptography schemes.
Machizaud, Jacques; Fournel, Thierry
2012-09-24
Visual cryptography which consists in sharing a secret message between transparencies has been extended to color prints. In this paper, we propose a new visual cryptography scheme based on color matching. The stacked printed media reveal a uniformly colored message decoded by the human visual system. In contrast with the previous color visual cryptography schemes, the proposed one enables to share images without pixel expansion and to detect a forgery as the color of the message is kept secret. In order to correctly print the colors on the media and to increase the security of the scheme, we use spectral models developed for color reproduction describing printed colors from an optical point of view.
A novel secret sharing with two users based on joint transform correlator and compressive sensing
NASA Astrophysics Data System (ADS)
Zhao, Tieyu; Chi, Yingying
2018-05-01
Recently, joint transform correlator (JTC) has been widely applied to image encryption and authentication. This paper presents a novel secret sharing scheme with two users based on JTC. Two users must be present during the decryption that the system has high security and reliability. In the scheme, two users use their fingerprints to encrypt plaintext, and they can decrypt only if both of them provide the fingerprints which are successfully authenticated. The linear relationship between the plaintext and ciphertext is broken using the compressive sensing, which can resist existing attacks on JTC. The results of the theoretical analysis and numerical simulation confirm the validity of the system.
Secrets and Misperceptions: The Creation of Self-Fulfilling Illusions
Cowan, Sarah K.
2015-01-01
This study examines who hears what secrets, comparing two similar secrets-one that is highly stigmatized and one that is less so. Using a unique survey representative of American adults and intake forms from a medical clinic, I document marked differences in who hears these secrets. People who are sympathetic to the stigmatizing secret are more likely to hear of it than those who may react negatively. This is a consequence of people not just selectively disclosing their own secrets but selectively sharing others’ as well. As a result, people in the same social network will be exposed to and influenced by different information about those they know and hence experience that network differently. When people effectively exist in networks tailored by others not to offend, then the information they hear tends to be that of which they already approve. Were they to hear secrets they disapproved of, then their attitudes might change, but they are less likely to hear those secrets. As such, the patterns of secret hearing contribute to a stasis in public opinion. PMID:26082932
Secreting and sensing the same molecule allows cells to achieve versatile social behaviors
Youk, Hyun; Lim, Wendell A.
2014-01-01
Cells that secrete and sense the same signaling molecule are ubiquitous. To uncover the functional capabilities of the core ‘secrete-and-sense’ circuit motif shared by these cells, we engineered yeast to secrete and sense the mating pheromone. Perturbing each circuit element revealed parameters that control the degree to which the cell communicated with itself versus with its neighbors. This tunable interplay of self- and neighbor-communication enables cells to span a diverse repertoire of cellular behaviors. These include a cell being asocial by responding only to itself, social through quorum sensing and an isogenic population of cells splitting into social and asocial subpopulations. A mathematical model explained these behaviors. The versatility of the secrete-and-sense circuit motif may explain its recurrence across species. PMID:24503857
Assessing the secretory capacity of pancreatic acinar cells.
Geron, Erez; Schejter, Eyal D; Shilo, Ben-Zion
2014-08-28
Pancreatic acinar cells produce and secrete digestive enzymes. These cells are organized as a cluster which forms and shares a joint lumen. This work demonstrates how the secretory capacity of these cells can be assessed by culture of isolated acini. The setup is advantageous since isolated acini, which retain many characteristics of the intact exocrine pancreas can be manipulated and monitored more readily than in the whole animal. Proper isolation of pancreatic acini is a key requirement so that the ex vivo culture will represent the in vivo nature of the acini. The protocol demonstrates how to isolate intact acini from the mouse pancreas. Subsequently, two complementary methods for evaluating pancreatic secretion are presented. The amylase secretion assay serves as a global measure, while direct imaging of pancreatic secretion allows the characterization of secretion at a sub-cellular resolution. Collectively, the techniques presented here enable a broad spectrum of experiments to study exocrine secretion.
NASA Astrophysics Data System (ADS)
Hughes, Richard
2004-05-01
Quantum key distribution (QKD) uses single-photon communications to generate the shared, secret random number sequences that are used to encrypt and decrypt secret communications. The unconditional security of QKD is based on the interplay between fundamental principles of quantum physics and information theory. An adversary can neither successfully tap the transmissions, nor evade detection (eavesdropping raises the key error rate above a threshold value). QKD could be particularly attractive for free-space optical communications, both ground-based and for satellites. I will describe a QKD experiment performed over multi-kilometer line-of-sight paths, which serves as a model for a satellite-to-ground key distribution system. The system uses single-photon polarization states, without active polarization switching, and for the first time implements the complete BB84 QKD protocol including, reconciliation, privacy amplification and the all-important authentication stage. It is capable of continuous operation throughout the day and night, achieving the self-sustaining production of error-free, shared, secret bits. I will also report on the results of satellite-to-ground QKD modeling.
Cao, Haojie; van Heel, Auke J; Ahmed, Hifza; Mols, Maarten; Kuipers, Oscar P
2017-04-04
Bacillus subtilis is widely used as a cell factory for numerous heterologous proteins of commercial value and medical interest. To explore the possibility of further enhancing the secretion potential of this model bacterium, a library of engineered strains with modified cell surface components was constructed, and the corresponding influences on protein secretion were investigated by analyzing the secretion of α-amylase variants with either low-, neutral- or high- isoelectric points (pI). Relative to the wild-type strain, the presence of overall anionic membrane phospholipids (phosphatidylglycerol and cardiolipin) increased dramatically in the PssA-, ClsA- and double KO mutants, which resulted in an up to 47% higher secretion of α-amylase. Additionally, we demonstrated that the appropriate net charge of secreted targets (AmyTS-23, AmyBs and AmyBm) was beneficial for secretion efficiency as well. In B. subtilis, the characteristics of cell membrane phospholipid bilayer and the pIs of heterologous α-amylases appear to be important for their secretion efficiency. These two factors can be engineered to reduce the electrostatic interaction between each other during the secretion process, which finally leads to a better secretion yield of α-amylases.
Ying, Yu; Meng, Dongdong; Chen, Xiaohua; Li, Fuli
2013-08-15
An anaerobic, extremely thermophilic, and cellulose- and xylan-degrading bacterium F32 was isolated from biocompost. Sequence analysis of the 16S rRNA gene of this strain showed that it was closely related to Caldicellulosiruptor saccharolyticus DSM 8903 (99.0% identity). Physiological and biochemical data also supported that identification of strain F32 as a Caldicellulosiruptor species. The proteins secreted by Caldicellulosiruptor sp. F32 grown on xylan showed a xylanase activity of 7.74U/mg, which was 2.5 times higher than that of C. saccharolyticus DSM 8903. Based on the genomic sequencing data, 2 xylanase genes, JX030400 and JX030401, were identified in Caldicellulosiruptor sp. F32. The xylanase encoded by JX030401 shared 97% identity with Csac_0696 of C. saccharolyticus DSM 8903, while that encoded by JX030400 shared 94% identity with Athe_0089 of C. bescii DSM 6725, which was not found in the genome of strain DSM 8903. Xylanse encoded by JX030400 had 9-fold higher specific activity than JX030401. Our results indicated that although the 2 strains shared high identity, the xylanase system in Caldicellulosiruptor sp. F32 was more efficient than that in C. saccharolyticus DSM 8903. Copyright © 2013 Elsevier Inc. All rights reserved.
Topics in quantum cryptography, quantum error correction, and channel simulation
NASA Astrophysics Data System (ADS)
Luo, Zhicheng
In this thesis, we mainly investigate four different topics: efficiently implementable codes for quantum key expansion [51], quantum error-correcting codes based on privacy amplification [48], private classical capacity of quantum channels [44], and classical channel simulation with quantum side information [49, 50]. For the first topic, we propose an efficiently implementable quantum key expansion protocol, capable of increasing the size of a pre-shared secret key by a constant factor. Previously, the Shor-Preskill proof [64] of the security of the Bennett-Brassard 1984 (BB84) [6] quantum key distribution protocol relied on the theoretical existence of good classical error-correcting codes with the "dual-containing" property. But the explicit and efficiently decodable construction of such codes is unknown. We show that we can lift the dual-containing constraint by employing the non-dual-containing codes with excellent performance and efficient decoding algorithms. For the second topic, we propose a construction of Calderbank-Shor-Steane (CSS) [19, 68] quantum error-correcting codes, which are originally based on pairs of mutually dual-containing classical codes, by combining a classical code with a two-universal hash function. We show, using the results of Renner and Koenig [57], that the communication rates of such codes approach the hashing bound on tensor powers of Pauli channels in the limit of large block-length. For the third topic, we prove a regularized formula for the secret key assisted capacity region of a quantum channel for transmitting private classical information. This result parallels the work of Devetak on entanglement assisted quantum communication capacity. This formula provides a new family protocol, the private father protocol, under the resource inequality framework that includes the private classical communication without the assisted secret keys as a child protocol. For the fourth topic, we study and solve the problem of classical channel simulation with quantum side information at the receiver. Our main theorem has two important corollaries: rate-distortion theory with quantum side information and common randomness distillation. Simple proofs of achievability of classical multi-terminal source coding problems can be made via a unified approach using the channel simulation theorem as building blocks. The fully quantum generalization of the problem is also conjectured with outer and inner bounds on the achievable rate pairs.
Byun, Hyunjong; Park, Jiyeon; Kim, Sun Chang; Ahn, Jung Hoon
2017-12-01
Efficient protein production for industrial and academic purposes often involves engineering microorganisms to produce and secrete target proteins into the culture. Pseudomonas fluorescens has a TliDEF ATP-binding cassette transporter, a type I secretion system, which recognizes C-terminal LARD3 signal sequence of thermostable lipase TliA. Many proteins are secreted by TliDEF in vivo when recombined with LARD3, but there are still others that cannot be secreted by TliDEF even when LARD3 is attached. However, the factors that determine whether or not a recombinant protein can be secreted through TliDEF are still unknown. Here, we recombined LARD3 with several proteins and examined their secretion through TliDEF. We found that the proteins secreted via LARD3 are highly negatively charged with highly-acidic isoelectric points (pI) lower than 5.5. Attaching oligo-aspartate to lower the pI of negatively-charged recombinant proteins improved their secretion, and attaching oligo-arginine to negatively-charged proteins blocked their secretion by LARD3. In addition, negatively supercharged green fluorescent protein (GFP) showed improved secretion, whereas positively supercharged GFP did not secrete. These results disclosed that proteins' acidic pI and net negative charge are major factors that determine their secretion through TliDEF. Homology modeling for TliDEF revealed that TliD dimer forms evolutionarily-conserved positively-charged clusters in its pore and substrate entrance site, which also partially explains the pI dependence of the TliDEF-dependent secretions. In conclusion, lowering the isoelectric point improved LARD3-mediated protein secretion, both widening the range of protein targets for efficient production via secretion and signifying an important aspect of ABC transporter-mediated secretions. © 2017 by The American Society for Biochemistry and Molecular Biology, Inc.
Recent Works Share Mothers' Unique Experiences
Shilling, Teri
2005-01-01
In this column, reviewers offer perspectives and comments on The Official Lamaze Guide, a book by Judith Lothian and Charlotte De Vries; Breastfeeding, a slideshow by Roni Chastain; 100 Promises to My Baby, a book by Mallika Chopra; and The Breastfeeding Café: Mothers Share the Joys, Challenges, and Secrets of Nursing, a book by Barbara L. Berhmann.
Salivary Glands in Predatory Mollusks: Evolutionary Considerations.
Ponte, Giovanna; Modica, Maria Vittoria
2017-01-01
Many marine mollusks attain or increase their predatory efficiency using complex chemical secretions, which are often produced and delivered through specialized anatomical structures of the foregut. The secretions produced in venom glands of Conus snails and allies have been extensively studied, revealing an amazing chemical diversity of small, highly constrained neuropeptides, whose characterization led to significant pharmacological developments. Conversely, salivary glands, the other main secretory structures of molluscan foregut, have been neglected despite their shared occurrence in the two lineages including predatory members: Gastropoda and Cephalopoda. Over the last few years, the interest for the chemistry of salivary mixtures increased based on their potential biomedical applications. Recent investigation with -omics technologies are complementing the classical biochemical descriptions, that date back to the 1950s, highlighting the high level of diversification of salivary secretions in predatory mollusks, and suggesting they can be regarded as a pharmaceutical cornucopia. As with other animal venoms, some of the salivary toxins are reported to target, for example, sodium and/or potassium ion channels or receptors and transporters for neurotransmitters such as, glutamate, serotonin, neurotensin, and noradrenaline, thus manipulating the neuromuscular system of the preys. Other bioactive components possess anticoagulant, anesthetic and hypotensive activities. Here, we overview available knowledge on the salivary glands of key predatory molluscan taxa, gastropods, and cephalopods, summarizing their anatomical, physiological and biochemical complexity in order to facilitate future comparative studies on main evolutionary trends and functional convergence in the acquisition of successful predatory strategies.
Salivary Glands in Predatory Mollusks: Evolutionary Considerations
Ponte, Giovanna; Modica, Maria Vittoria
2017-01-01
Many marine mollusks attain or increase their predatory efficiency using complex chemical secretions, which are often produced and delivered through specialized anatomical structures of the foregut. The secretions produced in venom glands of Conus snails and allies have been extensively studied, revealing an amazing chemical diversity of small, highly constrained neuropeptides, whose characterization led to significant pharmacological developments. Conversely, salivary glands, the other main secretory structures of molluscan foregut, have been neglected despite their shared occurrence in the two lineages including predatory members: Gastropoda and Cephalopoda. Over the last few years, the interest for the chemistry of salivary mixtures increased based on their potential biomedical applications. Recent investigation with -omics technologies are complementing the classical biochemical descriptions, that date back to the 1950s, highlighting the high level of diversification of salivary secretions in predatory mollusks, and suggesting they can be regarded as a pharmaceutical cornucopia. As with other animal venoms, some of the salivary toxins are reported to target, for example, sodium and/or potassium ion channels or receptors and transporters for neurotransmitters such as, glutamate, serotonin, neurotensin, and noradrenaline, thus manipulating the neuromuscular system of the preys. Other bioactive components possess anticoagulant, anesthetic and hypotensive activities. Here, we overview available knowledge on the salivary glands of key predatory molluscan taxa, gastropods, and cephalopods, summarizing their anatomical, physiological and biochemical complexity in order to facilitate future comparative studies on main evolutionary trends and functional convergence in the acquisition of successful predatory strategies. PMID:28848453
Semiquantum key distribution with secure delegated quantum computation
Li, Qin; Chan, Wai Hong; Zhang, Shengyu
2016-01-01
Semiquantum key distribution allows a quantum party to share a random key with a “classical” party who only can prepare and measure qubits in the computational basis or reorder some qubits when he has access to a quantum channel. In this work, we present a protocol where a secret key can be established between a quantum user and an almost classical user who only needs the quantum ability to access quantum channels, by securely delegating quantum computation to a quantum server. We show the proposed protocol is robust even when the delegated quantum server is a powerful adversary, and is experimentally feasible with current technology. As one party of our protocol is the most quantum-resource efficient, it can be more practical and significantly widen the applicability scope of quantum key distribution. PMID:26813384
Multi-party quantum key agreement with five-qubit brown states
NASA Astrophysics Data System (ADS)
Cai, Tao; Jiang, Min; Cao, Gang
2018-05-01
In this paper, we propose a multi-party quantum key agreement protocol with five-qubit brown states and single-qubit measurements. Our multi-party protocol ensures each participant to contribute equally to the agreement key. Each party performs three single-qubit unitary operations on three qubits of each brown state. Finally, by measuring brown states and decoding the measurement results, all participants can negotiate a shared secret key without classical bits exchange between them. With the analysis of security, our protocol demonstrates that it can resist against both outsider and participant attacks. Compared with other schemes, it also possesses a higher information efficiency. In terms of physical operation, it requires single-qubit measurements only which weakens the hardware requirements of participant and has a better operating flexibility.
Two-party quantum key agreement with five-particle entangled states
NASA Astrophysics Data System (ADS)
He, Ye-Feng; Ma, Wen-Ping
A two-party quantum key agreement protocol is proposed with five-particle entangled states and the delayed measurement technique. According to the measurement correlation property of five-particle entangled states, two participants can deduce the measurement results of each other’s initial quantum states. As a result, two parties can extract the secret keys of each other by using the publicly announced value or by performing the delayed measurement, respectively. Thus, a shared key is fairly established. Since each particle is transmitted only once in quantum channel, the protocol is congenitally free from the Trojan horse attacks. It is shown that the protocol not only is secure against both participant and outsider attacks but also has no information leakage problem. Moreover, it has high qubit efficiency.
NASA Astrophysics Data System (ADS)
Wu, Chia-Hua; Lee, Suiang-Shyan; Lin, Ja-Chen
2017-06-01
This all-in-one hiding method creates two transparencies that have several decoding options: visual decoding with or without translation flipping and computer decoding. In visual decoding, two less-important (or fake) binary secret images S1 and S2 can be revealed. S1 is viewed by the direct stacking of two transparencies. S2 is viewed by flipping one transparency and translating the other to a specified coordinate before stacking. Finally, important/true secret files can be decrypted by a computer using the information extracted from transparencies. The encoding process to hide this information includes the translated-flip visual cryptography, block types, the ways to use polynomial-style sharing, and linear congruential generator. If a thief obtained both transparencies, which are stored in distinct places, he still needs to find the values of keys used in computer decoding to break through after viewing S1 and/or S2 by stacking. However, the thief might just try every other kind of stacking and finally quit finding more secrets; for computer decoding is totally different from stacking decoding. Unlike traditional image hiding that uses images as host media, our method hides fine gray-level images in binary transparencies. Thus, our host media are transparencies. Comparisons and analysis are provided.
Large-Capacity Three-Party Quantum Digital Secret Sharing Using Three Particular Matrices Coding
NASA Astrophysics Data System (ADS)
Lai, Hong; Luo, Ming-Xing; Pieprzyk, Josef; Tao, Li; Liu, Zhi-Ming; Orgun, Mehmet A.
2016-11-01
In this paper, we develop a large-capacity quantum digital secret sharing (QDSS) scheme, combined the Fibonacci- and Lucas-valued orbital angular momentum (OAM) entanglement with the recursive Fibonacci and Lucas matrices. To be exact, Alice prepares pairs of photons in the Fibonacci- and Lucas-valued OAM entangled states, and then allocates them to two participants, say, Bob and Charlie, to establish the secret key. Moreover, the available Fibonacci and Lucas values from the matching entangled states are used as the seed for generating the Fibonacci and Lucas matrices. This is achieved because the entries of the Fibonacci and Lucas matrices are recursive. The secret key can only be obtained jointly by Bob and Charlie, who can further recover the secret. Its security is based on the facts that nonorthogonal states are indistinguishable, and Bob or Charlie detects a Fibonacci number, there is still a twofold uncertainty for Charlie' (Bob') detected value. Supported by the Fundamental Research Funds for the Central Universities under Grant No. XDJK2016C043 and the Doctoral Program of Higher Education under Grant No. SWU115091, the National Natural Science Foundation of China under Grant No. 61303039, the Fundamental Research Funds for the Central Universities under Grant No. XDJK2015C153 and the Doctoral Program of Higher Education under Grant No. SWU114112, and the Financial Support the 1000-Plan of Chongqing by Southwest University under Grant No. SWU116007
Secreted production of Renilla luciferase in Bacillus subtilis.
Chiang, Chung-Jen; Chen, Po Ting; Chao, Yun-Peng
2010-01-01
Luciferase (Rluc) from the soft coral Renilla reniformis has been widely used as a bioluminescent reporter, and its secreted production has been solely performed in mammalian cells thus far. To make the production more efficient, a series of approaches was attempted to overproduce Rluc extracellularly in Bacillus subtilis. First, Cys124 in the Rluc gene was substituted with Ala. The mutant gene was subsequently incorporated into a pUB110/R6K-based plasmid, consequently, fusing with the P43 promoter and the sacB signal peptide. With the nitrogen-rich medium, B. subtilis strain bearing the plasmid became able to secret a detectable amount of Rluc. Moreover, the secretion signal for the Rluc gene was replaced by the aprN leader peptide with or without the propeptide. The result led to a more than twofold increase in the secreted Rluc. Finally, by enhancing the transcription of the Rluc gene implementing the P43 and spac tandem promoter, it resulted in the secreted Rluc with a yield of 100 mg/L. Overall, this study illustrates a potential strategy for improving the secretion efficiency of heterologous proteins in B. subtilis.
Biliary obstruction - slideshow
... ency/presentations/100199.htm Biliary obstruction - series—Normal anatomy To use the sharing ... Overview Bile is a digestive fluid secreted by the liver and stored in the gallbladder which normally is ...
Durand, Eric; Zoued, Abdelrahim; Spinelli, Silvia; Watson, Paul J. H.; Aschtgen, Marie-Stéphanie; Journet, Laure; Cambillau, Christian; Cascales, Eric
2012-01-01
The Type VI secretion system (T6SS) is a macromolecular system distributed in Gram-negative bacteria, responsible for the secretion of effector proteins into target cells. The T6SS has a broad versatility as it can target both eukaryotic and prokaryotic cells. It is therefore involved in host pathogenesis or killing neighboring bacterial cells to colonize a new niche. At the architecture level, the T6SS core apparatus is composed of 13 proteins, which assemble in two subcomplexes. One of these subcomplexes, composed of subunits that share structural similarities with bacteriophage tail and baseplate components, is anchored to the cell envelope by the membrane subcomplex. This latter is constituted of at least three proteins, TssL, TssM, and TssJ. The crystal structure of the TssJ outer membrane lipoprotein and its interaction with the inner membrane TssM protein have been recently reported. TssL and TssM share sequence homology and characteristics with two components of the Type IVb secretion system (T4bSS), IcmH/DotU and IcmF, respectively. In this study, we report the crystal structure of the cytoplasmic domain of the TssL inner membrane protein from the enteroaggregative Escherichia coli Sci-1 T6SS. It folds as a hook-like structure composed of two three-helix bundles. Two TssL molecules associate to form a functional complex. Although the TssL trans-membrane segment is the main determinant of self-interaction, contacts between the cytoplasmic domains are required for TssL function. Based on sequence homology and secondary structure prediction, we propose that the TssL structure is the prototype for the members of the TssL and IcmH/DotU families. PMID:22371492
Modulation of interleukin-1 secretion by immunosuppressive drugs, alone and in combination.
Reisman, L; Lin, W G; Martinelli, G P
1995-03-01
This study evaluates the ability of the immunosuppressive drugs dexamethasone, cyclosporine, FK506 and rapamycin, alone and in combination to suppress interleukin-1 beta (IL-1 beta) secretion in vitro by THP-1 cells when stimulated by lipopolysaccharide. All four drugs, when added to cell culture medium at therapeutic concentrations, significantly decrease secretion of the monokine to well below control levels. However, only dexamethasone completely suppresses IL-1 beta secretion in a dose-dependent fashion. Cyclosporine, FK506 and rapamycin only partially suppress secretion of IL-1 beta at concentrations within their therapeutic ranges and increasing concentrations of the drugs do not result in further suppression of secretion. Likewise, the combination of any two of these three drugs does not provide any additional suppressive effect. Dexamethasone, however, when added in increasing concentrations in combination with any of the other drugs, results in further suppression of IL-1 secretion in a dose-dependent fashion. These data suggest that cyclosporine, FK506 and rapamycin all share a common effect on the production of IL-1 beta, different from that of dexamethasone.
A Comprehensive Comparison of Multiparty Secure Additions with Differential Privacy
Goryczka, Slawomir; Xiong, Li
2016-01-01
This paper considers the problem of secure data aggregation (mainly summation) in a distributed setting, while ensuring differential privacy of the result. We study secure multiparty addition protocols using well known security schemes: Shamir’s secret sharing, perturbation-based, and various encryptions. We supplement our study with our new enhanced encryption scheme EFT, which is efficient and fault tolerant. Differential privacy of the final result is achieved by either distributed Laplace or Geometric mechanism (respectively DLPA or DGPA), while approximated differential privacy is achieved by diluted mechanisms. Distributed random noise is generated collectively by all participants, which draw random variables from one of several distributions: Gamma, Gauss, Geometric, or their diluted versions. We introduce a new distributed privacy mechanism with noise drawn from the Laplace distribution, which achieves smaller redundant noise with efficiency. We compare complexity and security characteristics of the protocols with different differential privacy mechanisms and security schemes. More importantly, we implemented all protocols and present an experimental comparison on their performance and scalability in a real distributed environment. Based on the evaluations, we identify our security scheme and Laplace DLPA as the most efficient for secure distributed data aggregation with privacy. PMID:28919841
A Comprehensive Comparison of Multiparty Secure Additions with Differential Privacy.
Goryczka, Slawomir; Xiong, Li
2017-01-01
This paper considers the problem of secure data aggregation (mainly summation) in a distributed setting, while ensuring differential privacy of the result. We study secure multiparty addition protocols using well known security schemes: Shamir's secret sharing, perturbation-based, and various encryptions. We supplement our study with our new enhanced encryption scheme EFT, which is efficient and fault tolerant. Differential privacy of the final result is achieved by either distributed Laplace or Geometric mechanism (respectively DLPA or DGPA), while approximated differential privacy is achieved by diluted mechanisms. Distributed random noise is generated collectively by all participants, which draw random variables from one of several distributions: Gamma, Gauss, Geometric, or their diluted versions. We introduce a new distributed privacy mechanism with noise drawn from the Laplace distribution, which achieves smaller redundant noise with efficiency. We compare complexity and security characteristics of the protocols with different differential privacy mechanisms and security schemes. More importantly, we implemented all protocols and present an experimental comparison on their performance and scalability in a real distributed environment. Based on the evaluations, we identify our security scheme and Laplace DLPA as the most efficient for secure distributed data aggregation with privacy.
Semi-counterfactual cryptography
NASA Astrophysics Data System (ADS)
Akshata Shenoy, H.; Srikanth, R.; Srinivas, T.
2013-09-01
In counterfactual quantum key distribution (QKD), two remote parties can securely share random polarization-encoded bits through the blocking rather than the transmission of particles. We propose a semi-counterfactual QKD, i.e., one where the secret bit is shared, and also encoded, based on the blocking or non-blocking of a particle. The scheme is thus semi-counterfactual and not based on polarization encoding. As with other counterfactual schemes and the Goldenberg-Vaidman protocol, but unlike BB84, the encoding states are orthogonal and security arises ultimately from single-particle non-locality. Unlike any of them, however, the secret bit generated is maximally indeterminate until the joint action of Alice and Bob. We prove the general security of the protocol, and study the most general photon-number-preserving incoherent attack in detail.
Hemrajani, Cordula; Marches, Olivier; Wiles, Siouxsie; Girard, Francis; Dennis, Alison; Dziva, Francis; Best, Angus; Phillips, Alan D; Berger, Cedric N; Mousnier, Aurelie; Crepin, Valerie F; Kruidenier, Laurens; Woodward, Martin J; Stevens, Mark P; La Ragione, Roberto M; MacDonald, Thomas T; Frankel, Gad
2008-11-01
The human pathogen enterohemorrhagic Escherichia coli (EHEC) O157:H7 colonizes human and animal gut via formation of attaching and effacing lesions. EHEC strains use a type III secretion system to translocate a battery of effector proteins into the mammalian host cell, which subvert diverse signal transduction pathways implicated in actin dynamics, phagocytosis, and innate immunity. The genomes of sequenced EHEC O157:H7 strains contain two copies of the effector protein gene nleH, which share 49% sequence similarity with the gene for the Shigella effector OspG, recently implicated in inhibition of migration of the transcriptional regulator NF-kappaB to the nucleus. In this study we investigated the role of NleH during EHEC O157:H7 infection of calves and lambs. We found that while EHEC DeltanleH colonized the bovine gut more efficiently than the wild-type strain, in lambs the wild-type strain exhibited a competitive advantage over the mutant during mixed infection. Using the mouse pathogen Citrobacter rodentium, which shares many virulence factors with EHEC O157:H7, including NleH, we observed that the wild-type strain exhibited a competitive advantage over the mutant during mixed infection. We found no measurable differences in T-cell infiltration or hyperplasia in colons of mice inoculated with the wild-type or the nleH mutant strain. Using NF-kappaB reporter mice carrying a transgene containing a luciferase reporter driven by three NF-kappaB response elements, we found that NleH causes an increase in NF-kappaB activity in the colonic mucosa. Consistent with this, we found that the nleH mutant triggered a significantly lower tumor necrosis factor alpha response than the wild-type strain.
Chida, Koji; Morohashi, Gembu; Fuji, Hitoshi; Magata, Fumihiko; Fujimura, Akiko; Hamada, Koki; Ikarashi, Dai; Yamamoto, Ryuichi
2014-01-01
Background and objective While the secondary use of medical data has gained attention, its adoption has been constrained due to protection of patient privacy. Making medical data secure by de-identification can be problematic, especially when the data concerns rare diseases. We require rigorous security management measures. Materials and methods Using secure computation, an approach from cryptography, our system can compute various statistics over encrypted medical records without decrypting them. An issue of secure computation is that the amount of processing time required is immense. We implemented a system that securely computes healthcare statistics from the statistical computing software ‘R’ by effectively combining secret-sharing-based secure computation with original computation. Results Testing confirmed that our system could correctly complete computation of average and unbiased variance of approximately 50 000 records of dummy insurance claim data in a little over a second. Computation including conditional expressions and/or comparison of values, for example, t test and median, could also be correctly completed in several tens of seconds to a few minutes. Discussion If medical records are simply encrypted, the risk of leaks exists because decryption is usually required during statistical analysis. Our system possesses high-level security because medical records remain in encrypted state even during statistical analysis. Also, our system can securely compute some basic statistics with conditional expressions using ‘R’ that works interactively while secure computation protocols generally require a significant amount of processing time. Conclusions We propose a secure statistical analysis system using ‘R’ for medical data that effectively integrates secret-sharing-based secure computation and original computation. PMID:24763677
Chida, Koji; Morohashi, Gembu; Fuji, Hitoshi; Magata, Fumihiko; Fujimura, Akiko; Hamada, Koki; Ikarashi, Dai; Yamamoto, Ryuichi
2014-10-01
While the secondary use of medical data has gained attention, its adoption has been constrained due to protection of patient privacy. Making medical data secure by de-identification can be problematic, especially when the data concerns rare diseases. We require rigorous security management measures. Using secure computation, an approach from cryptography, our system can compute various statistics over encrypted medical records without decrypting them. An issue of secure computation is that the amount of processing time required is immense. We implemented a system that securely computes healthcare statistics from the statistical computing software 'R' by effectively combining secret-sharing-based secure computation with original computation. Testing confirmed that our system could correctly complete computation of average and unbiased variance of approximately 50,000 records of dummy insurance claim data in a little over a second. Computation including conditional expressions and/or comparison of values, for example, t test and median, could also be correctly completed in several tens of seconds to a few minutes. If medical records are simply encrypted, the risk of leaks exists because decryption is usually required during statistical analysis. Our system possesses high-level security because medical records remain in encrypted state even during statistical analysis. Also, our system can securely compute some basic statistics with conditional expressions using 'R' that works interactively while secure computation protocols generally require a significant amount of processing time. We propose a secure statistical analysis system using 'R' for medical data that effectively integrates secret-sharing-based secure computation and original computation. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.
Teleradiology mobile internet system with a new information security solution
NASA Astrophysics Data System (ADS)
Satoh, Hitoshi; Niki, Noboru; Eguchi, Kenji; Ohmatsu, Hironobu; Kusumoto, Masahiko; Kaneko, Masahiro; Moriyama, Noriyuki
2014-03-01
We have developed an external storage system by using secret sharing scheme and tokenization for regional medical cooperation, PHR service and information preservation. The use of mobile devices such as smart phones and tablets will be accelerated for a PHR service, and the confidential medical information is exposed to the risk of damage and intercept. We verified the transfer rate of the sending and receiving of data to and from the external storage system that connected it with PACS by the Internet this time. External storage systems are the data centers that exist in Okinawa, in Osaka, in Sapporo and in Tokyo by using secret sharing scheme. PACS continuously transmitted 382 CT images to the external data centers. Total capacity of the CT images is about 200MB. The total time that had been required to transmit was about 250 seconds. Because the preservation method to use secret sharing scheme is applied, security is strong. But, it also takes the information transfer time of this system too much. Therefore, DICOM data is masked to the header information part because it is made to anonymity in our method. The DICOM data made anonymous is preserved in the data base in the hospital. Header information including individual information is divided into two or more tallies by secret sharing scheme, and preserved at two or more external data centers. The token to relate the DICOM data anonymity made to header information preserved outside is strictly preserved in the token server. The capacity of header information that contains patient's individual information is only about 2% of the entire DICOM data. This total time that had been required to transmit was about 5 seconds. Other, common solutions that can protect computer communication networks from attacks are classified as cryptographic techniques or authentication techniques. Individual number IC card is connected with electronic certification authority of web medical image conference system. Individual number IC card is given only to the person to whom the authority to operate web medical image conference system was given.
Diversity and Phylogenetic Distribution of Extracellular Microbial Peptidases
NASA Astrophysics Data System (ADS)
Nguyen, Trang; Mueller, Ryan; Myrold, David
2017-04-01
Depolymerization of proteinaceous compounds by extracellular proteolytic enzymes is a bottleneck in the nitrogen cycle, limiting the rate of the nitrogen turnover in soils. Protein degradation is accomplished by a diverse range of extracellular (secreted) peptidases. Our objective was to better understand the evolution of these enzymes and how their functional diversity corresponds to known phylogenetic diversity. Peptidase subfamilies from 110 archaeal, 1,860 bacterial, and 97 fungal genomes were extracted from the MEROPS database along with corresponding SSU sequences for each genome from the SILVA database, resulting in 43,177 secreted peptidases belonging to 34 microbial phyla and 149 peptidase subfamilies. We compared the distribution of each peptidase subfamily across all taxa to the phylogenetic relationships of these organisms based on their SSU gene sequences. The occurrence and abundance of genes coding for secreted peptidases varied across microbial taxa, distinguishing the peptidase complement of the three microbial kingdoms. Bacteria had the highest frequency of secreted peptidase coding genes per 1,000 genes and contributed from 1% to 6% of the gene content. Fungi only had a slightly higher number of secreted peptidase gene content than archaea, standardized by the total genes. The relative abundance profiles of secreted peptidases in each microbial kingdom also varied, in which aspartic family was found to be the greatest in fungi (25%), whereas it was only 12% in archaea and 4% in bacteria. Serine, metallo, and cysteine families consistently contributed widely up to 75% of the secreted peptidase abundance across the three kingdoms. Overall, bacteria had a much wider collection of secreted peptidases, whereas fungi and archaea shared most of their secreted peptidase families. Principle coordinate analysis of the peptidase subfamily-based dissimilarities showed distinguishable clusters for different groups of microorganisms. The distribution of secreted peptidases was found to be significantly correlated with phylogenetic relationships within kingdoms (archaea rMantel=0.364, p=0.001; bacteria rMantel=0.257, p=0.001, and fungi rMantel=0.281, p=0.005), inferring an evolutionary relationship where subsets of phylogenetically related organisms share similar types of secreted peptidases. We also tested the phylogenetic signal strength of each peptidase subfamily for each microbial kingdom based on the binary traits of the distribution (presence or absence of secreted peptidase subfamilies in individual species). About one-third of the peptidase subfamilies displayed a strong evolutionary signal; the rest were phylogenetically over-dispersed, suggesting that these subfamilies are randomly distributed across the tree of life or the result of events such as horizontal gene transfer. Study of the diversity and phylogenetic distribution of secreted peptidases offered a mechanistic basis to anticipate the proteolytic potential function of microbial communities.
2014-01-01
Background Among other advantages, recombinant antibody-binding fragments (Fabs) hold great clinical and commercial potential, owing to their efficient tissue penetration compared to that of full-length IgGs. Although production of recombinant Fab using microbial expression systems has been reported, yields of active Fab have not been satisfactory. We recently developed the Corynebacterium glutamicum protein expression system (CORYNEX®) and demonstrated improved yield and purity for some applications, although the system has not been applied to Fab production. Results The Fab fragment of human anti-HER2 was successfully secreted by the CORYNEX® system using the conventional C. glutamicum strain YDK010, but the productivity was very low. To improve the secretion efficiency, we investigated the effects of deleting cell wall-related genes. Fab secretion was increased 5.2 times by deletion of pbp1a, encoding one of the penicillin-binding proteins (PBP1a), mediating cell wall peptidoglycan (PG) synthesis. However, this Δpbp1a mutation did not improve Fab secretion in the wild-type ATCC13869 strain. Because YDK010 carries a mutation in the cspB gene encoding a surface (S)-layer protein, we evaluated the effect of ΔcspB mutation on Fab secretion from ATCC13869. The Δpbp1a mutation showed a positive effect on Fab secretion only in combination with the ΔcspB mutation. The ΔcspBΔpbp1a double mutant showed much greater sensitivity to lysozyme than either single mutant or the wild-type strain, suggesting that these mutations reduced cell wall resistance to protein secretion. Conclusion There are at least two crucial permeability barriers to Fab secretion in the cell surface structure of C. glutamicum, the PG layer, and the S-layer. The ΔcspBΔpbp1a double mutant allows efficient Fab production using the CORYNEX® system. PMID:24731213
Efficient Numeric and Geometric Computations using Heterogeneous Shared Memory Architectures
2017-10-04
Report: Efficient Numeric and Geometric Computations using Heterogeneous Shared Memory Architectures The views, opinions and/or findings contained in this...Chapel Hill Title: Efficient Numeric and Geometric Computations using Heterogeneous Shared Memory Architectures Report Term: 0-Other Email: dm...algorithms for scientific and geometric computing by exploiting the power and performance efficiency of heterogeneous shared memory architectures . These
Tripartite counterfactual quantum cryptography
NASA Astrophysics Data System (ADS)
Salih, Hatim
2014-07-01
We show how two distrustful parties, "Bob" and "Charlie," can share a secret key with the help of a mutually trusted "Alice" counterfactually; that is, with no information-carrying particles traveling between any of the three.
Experimentally feasible security check for n-qubit quantum secret sharing
DOE Office of Scientific and Technical Information (OSTI.GOV)
Schauer, Stefan; Huber, Marcus; Hiesmayr, Beatrix C.
In this article we present a general security strategy for quantum secret sharing (QSS) protocols based on the scheme presented by Hillery, Buzek, and Berthiaume (HBB) [Phys. Rev. A 59, 1829 (1999)]. We focus on a generalization of the HBB protocol to n communication parties thus including n-partite Greenberger-Horne-Zeilinger states. We show that the multipartite version of the HBB scheme is insecure in certain settings and impractical when going to large n. To provide security for such QSS schemes in general we use the framework presented by some of the authors [M. Huber, F. Mintert, A. Gabriel, B. C. Hiesmayr,more » Phys. Rev. Lett. 104, 210501 (2010)] to detect certain genuine n-partite entanglement between the communication parties. In particular, we present a simple inequality which tests the security.« less
Won, Jongho; Ma, Chris Y. T.; Yau, David K. Y.; ...
2016-06-01
Smart meters are integral to demand response in emerging smart grids, by reporting the electricity consumption of users to serve application needs. But reporting real-time usage information for individual households raises privacy concerns. Existing techniques to guarantee differential privacy (DP) of smart meter users either are not fault tolerant or achieve (possibly partial) fault tolerance at high communication overheads. In this paper, we propose a fault-tolerant protocol for smart metering that can handle general communication failures while ensuring DP with significantly improved efficiency and lower errors compared with the state of the art. Our protocol handles fail-stop faults proactively bymore » using a novel design of future ciphertexts, and distributes trust among the smart meters by sharing secret keys among them. We prove the DP properties of our protocol and analyze its advantages in fault tolerance, accuracy, and communication efficiency relative to competing techniques. We illustrate our analysis by simulations driven by real-world traces of electricity consumption.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Won, Jongho; Ma, Chris Y. T.; Yau, David K. Y.
Smart meters are integral to demand response in emerging smart grids, by reporting the electricity consumption of users to serve application needs. But reporting real-time usage information for individual households raises privacy concerns. Existing techniques to guarantee differential privacy (DP) of smart meter users either are not fault tolerant or achieve (possibly partial) fault tolerance at high communication overheads. In this paper, we propose a fault-tolerant protocol for smart metering that can handle general communication failures while ensuring DP with significantly improved efficiency and lower errors compared with the state of the art. Our protocol handles fail-stop faults proactively bymore » using a novel design of future ciphertexts, and distributes trust among the smart meters by sharing secret keys among them. We prove the DP properties of our protocol and analyze its advantages in fault tolerance, accuracy, and communication efficiency relative to competing techniques. We illustrate our analysis by simulations driven by real-world traces of electricity consumption.« less
Lakkaraju, Asvin K. K.; Thankappan, Ratheeshkumar; Mary, Camille; Garrison, Jennifer L.; Taunton, Jack; Strub, Katharina
2012-01-01
Mammalian cells secrete a large number of small proteins, but their mode of translocation into the endoplasmic reticulum is not fully understood. Cotranslational translocation was expected to be inefficient due to the small time window for signal sequence recognition by the signal recognition particle (SRP). Impairing the SRP pathway and reducing cellular levels of the translocon component Sec62 by RNA interference, we found an alternate, Sec62-dependent translocation path in mammalian cells required for the efficient translocation of small proteins with N-terminal signal sequences. The Sec62-dependent translocation occurs posttranslationally via the Sec61 translocon and requires ATP. We classified preproteins into three groups: 1) those that comprise ≤100 amino acids are strongly dependent on Sec62 for efficient translocation; 2) those in the size range of 120–160 amino acids use the SRP pathway, albeit inefficiently, and therefore rely on Sec62 for efficient translocation; and 3) those larger than 160 amino acids depend on the SRP pathway to preserve a transient translocation competence independent of Sec62. Thus, unlike in yeast, the Sec62-dependent translocation pathway in mammalian cells serves mainly as a fail-safe mechanism to ensure efficient secretion of small proteins and provides cells with an opportunity to regulate secretion of small proteins independent of the SRP pathway. PMID:22648169
MIX and match: mobile T6SS MIX-effectors enhance bacterial fitness
Salomon, Dor
2016-01-01
ABSTRACT Protein secretion systems that mediate interbacterial competition secret a wide repertoire of antibacterial toxins. A major player in these competitions is the newly discovered bacterial type VI secretion system (T6SS). We recently found that a subset of polymorphic MIX-effectors, which are a widespread class of effectors secreted by T6SSs, are horizontally shared between marine bacteria and are used to diversify their T6SS effector repertoires, thus enhancing their environmental fitness. In this commentary, I expand on the ideas that were introduced in the previous report, and further speculate on the possible mobility of other MIX-effectors. In addition, I discuss the possible role of horizontal gene transfer in the dissemination of MIX-effectors through bacterial genomes, as well as its possible role in diversifying the T6SS effector repertoire. PMID:27066305
RIG-I detects infection with live Listeria by sensing secreted bacterial nucleic acids
Abdullah, Zeinab; Schlee, Martin; Roth, Susanne; Mraheil, Mobarak Abu; Barchet, Winfried; Böttcher, Jan; Hain, Torsten; Geiger, Sergej; Hayakawa, Yoshihiro; Fritz, Jörg H; Civril, Filiz; Hopfner, Karl-Peter; Kurts, Christian; Ruland, Jürgen; Hartmann, Gunther; Chakraborty, Trinad; Knolle, Percy A
2012-01-01
Immunity against infection with Listeria monocytogenes is not achieved from innate immune stimulation by contact with killed but requires viable Listeria gaining access to the cytosol of infected cells. It has remained ill-defined how such immune sensing of live Listeria occurs. Here, we report that efficient cytosolic immune sensing requires access of nucleic acids derived from live Listeria to the cytoplasm of infected cells. We found that Listeria released nucleic acids and that such secreted bacterial RNA/DNA was recognized by the cytosolic sensors RIG-I, MDA5 and STING thereby triggering interferon β production. Secreted Listeria nucleic acids also caused RIG-I-dependent IL-1β-production and inflammasome activation. The signalling molecule CARD9 contributed to IL-1β production in response to secreted nucleic acids. In conclusion, cytosolic recognition of secreted bacterial nucleic acids by RIG-I provides a mechanistic explanation for efficient induction of immunity by live bacteria. PMID:23064150
Eom, Gyeong Tae; Lee, Seung Hwan; Oh, Young Hoon; Choi, Ji Eun; Park, Si Jae; Song, Jae Kwang
2014-10-01
Heterologous ABC protein exporters, the apparatus of type I secretion pathway in Gram-negative bacteria, were used for extracellular production of Pseudomonas fluorescens lipase (TliA) in recombinant Escherichia coli. The effect of the expression of different ABC protein exporter gene clusters (P. fluorescens tliDEF, Pseudomonas aeruginosa aprDEF, Erwinia chrysanthemi prtDEF, and Serratia marcescens lipBCD genes) was examined on the secretion of TliA at growth temperatures of 20, 25, 30 and 35 °C. TliA secretion in recombinant E. coli XL10-Gold varied depending upon type of ABC protein exporter and culture temperature. E. coli expressing S. marcescens lipBCD genes showed the highest secretion level of TliA (122.8 U ml(-1)) when cultured at 25 °C. Thus, optimized culture conditions for efficient extracellular production of lipase in recombinant E. coli can be designed by changing the type of ABC protein exporter and the growth temperature.
Bacterial exopolymer utilization by a harpacticoid copepod: A methodology and results
DOE Office of Scientific and Technical Information (OSTI.GOV)
Decho, A.W.; Moriarty, D.J.W.
1990-07-01
Exopolymer mucus secretions of bacteria and diatoms are potential foods for benthic animals. These secretions are coincidently ingested by animals during consumption of microbial cells and sediments. The utilization of microbial secretions was investigated with exopolymer derived from a marine bacterium (pseudomonas sp.) from seagrass beds and a harpacticoid copepod Laophonte sp. from the same habitat. A new technique was developed to examine ingestion, absorption, and absorption efficiencies of these bacterial secretions by consumers. Exopolymer mucus (from the bacterium in stationary phase) was labeled with {sup 14}C, collected, purified, and bound onto bacterium-sized beads. The exopolymer slime coating mimicked themore » coatings associated with many marine bacteria. Results from feeding experiments where the coated beads were mixed with sediment demonstrated that the mucus-exopolymer secretions of bacteria were ingested and utilized by Laophonte sp. Absorption efficiencies, determined directly, were > 80% in the presence of other food resources, indicating that exopolymer is potentially a highly labile C resource for this animal.« less
Deterministic MDI QKD with two secret bits per shared entangled pair
NASA Astrophysics Data System (ADS)
Zebboudj, Sofia; Omar, Mawloud
2018-03-01
Although quantum key distribution schemes have been proven theoretically secure, they are based on assumptions about the devices that are not yet satisfied with today's technology. The measurement-device-independent scheme has been proposed to shorten the gap between theory and practice by removing all detector side-channel attacks. On the other hand, two-way quantum key distribution schemes have been proposed to raise the secret key generation rate. In this paper, we propose a new quantum key distribution scheme able to achieve a relatively high secret key generation rate based on two-way quantum key distribution that also inherits the robustness of the measurement-device-independent scheme against detector side-channel attacks.
"In search of a tale they can live with": about loss, family secrets, and selective disclosure.
Rober, Peter; Walravens, Geertje; Versteynen, Leen
2012-07-01
Several authors have written about family secrets in the family therapy literature in interesting ways. According to these authors, the questions "who knows the secret?" and "who does not know the secret?" are central. In the present study, we have qualitatively analyzed the documentary film Familiegeheim (Family Secret) by the Dutch director Jaap van Hoewijk. The film shows van Hoewijk's investigation into the death of his father in 1974 and tells the story of a family in which the suicide of the father is kept secret from the three children. Our analysis of the film highlights the complex ways in which families deal with sensitive issues like loss, grief, and suicide. The concept of family secrets seems to poorly capture this complexity, focusing one-sidedly on the destructive effects of withholding delicate information. The concept of selective disclosure is proposed as an alternative. Selective disclosure refers to the complex processes involved in dealing with the dialectic tension between sharing information and keeping it secret. The concept is not only focused on the destructiveness of secrecy but, in addition, also makes room for an appreciation of the caution with which family members deal with sensitive family issues. © 2011 American Association for Marriage and Family Therapy.
Containing the secret of child sexual abuse.
McElvaney, Rosaleen; Greene, Sheila; Hogan, Diane
2012-04-01
This study reports a grounded theory study of the process of how children tell of their experiences of child sexual abuse from the perspectives of young people and their parents. Individual interviews were conducted with 22 young people aged 8 to 18, and 14 parents. A theoretical model was developed that conceptualises the process of disclosure as one of containing the secret of child sexual abuse. Three key dynamics were identified: the active withholding of the secret on the part of the child, the experience of a 'pressure cooker effect' reflecting a conflict between the wish to tell and the wish to keep the secret, and the confiding itself which often occurs in the context of an intimacy being shared. Children's experiences of disclosure were multidetermined and suggest the need for multifaceted and multisystemic approaches to prevention and intervention. The need for the secret to be contained, individually and interpersonally in appropriate safeguarding and therapeutic contexts needs to be respected in helping children tell.
Practicality of quantum information processing
NASA Astrophysics Data System (ADS)
Lau, Hoi-Kwan
Quantum Information Processing (QIP) is expected to bring revolutionary enhancement to various technological areas. However, today's QIP applications are far from being practical. The problem involves both hardware issues, i.e., quantum devices are imperfect, and software issues, i.e., the functionality of some QIP applications is not fully understood. Aiming to improve the practicality of QIP, in my PhD research I have studied various topics in quantum cryptography and ion trap quantum computation. In quantum cryptography, I first studied the security of position-based quantum cryptography (PBQC). I discovered a wrong assumption in the previous literature that the cheaters are not allowed to share entangled resources. I proposed entanglement attacks that could cheat all known PBQC protocols. I also studied the practicality of continuous-variable (CV) quantum secret sharing (QSS). While the security of CV QSS was considered by the literature only in the limit of infinite squeezing, I found that finitely squeezed CV resources could also provide finite secret sharing rate. Our work relaxes the stringent resources requirement of implementing QSS. In ion trap quantum computation, I studied the phase error of quantum information induced by dc Stark effect during ion transportation. I found an optimized ion trajectory for which the phase error is the minimum. I also defined a threshold speed, above which ion transportation would induce significant error. In addition, I proposed a new application for ion trap systems as universal bosonic simulators (UBS). I introduced two architectures, and discussed their respective strength and weakness. I illustrated the implementations of bosonic state initialization, transformation, and measurement by applying radiation fields or by varying the trap potential. When comparing with conducting optical experiments, the ion trap UBS is advantageous in higher state initialization efficiency and higher measurement accuracy. Finally, I proposed a new method to re-cool ion qubits during quantum computation. The idea is to transfer the motional excitation of a qubit to another ion that is prepared in the motional ground state. I showed that my method could be ten times faster than current laser cooling techniques, and thus could improve the speed of ion trap quantum computation.
de Carvalho, João Carlos Monteiro; Mayfield, Stephen Patrick
2018-01-01
Efficient protein secretion is a desirable trait for any recombinant protein expression system, together with simple, low-cost, and defined media, such as the typical media used for photosynthetic cultures of microalgae. However, low titers of secreted heterologous proteins are usually obtained, even with the most extensively studied microalga Chlamydomonas reinhardtii, preventing their industrial application. In this study, we aimed to expand and evaluate secretory signal peptides (SP) for heterologous protein secretion in C. reinhardtii by comparing previously described SP with untested sequences. We compared the SPs from arylsulfatase 1 and carbonic anhydrase 1, with those of untried SPs from binding protein 1, an ice-binding protein, and six sequences identified in silico. We identified over 2000 unique SPs using the SignalP 4.0 software. mCherry fluorescence was used to compare the protein secretion of up to 96 colonies for each construct, non-secretion construct, and parental wild-type cc1690 cells. Supernatant fluorescence varied according to the SP used, with a 10-fold difference observed between the highest and lowest secretors. Moreover, two SPs identified in silico secreted the highest amount of mCherry. Our results demonstrate that the SP should be carefully selected and that efficient sequences can be coded in the C. reinhardtii genome. The SPs described here expand the portfolio available for research on heterologous protein secretion and for biomanufacturing applications. PMID:29408937
Childhood Obesity: Common Misconceptions
... Issues Listen Español Text Size Email Print Share Childhood Obesity: Common Misconceptions Page Content Article Body Everyone, it ... for less than 1% of the cases of childhood obesity. Yes, hypothyroidism (a deficit in thyroid secretion) and ...
Cheng, Yali; Avis, Tyler J; Bolduc, Sébastien; Zhao, Yingyi; Anguenot, Raphaël; Neveu, Bertrand; Labbé, Caroline; Belzile, François; Bélanger, Richard R
2008-12-01
Secretion of recombinant proteins aims to reproduce the correct posttranslational modifications of the expressed protein while simplifying its recovery. In this study, secretion signal sequences from an abundantly secreted 34-kDa protein (P34) from Pseudozyma flocculosa were cloned. The efficiency of these sequences in the secretion of recombinant green fluorescent protein (GFP) was investigated in two Pseudozyma species and compared with other secretion signal sequences, from S. cerevisiae and Pseudozyma spp. The results indicate that various secretion signal sequences were functional and that the P34 signal peptide was the most effective secretion signal sequence in both P. flocculosa and P. antarctica. The cells correctly processed the secretion signal sequences, including P34 signal peptide, and mature GFP was recovered from the culture medium. This is the first report of functional secretion signal sequences in P. flocculosa. These sequences can be used to test the secretion of other recombinant proteins and for studying the secretion pathway in P. flocculosa and P. antarctica.
Shared Savings Financing for College and University Energy Efficiency Investments.
ERIC Educational Resources Information Center
Business Officer, 1984
1984-01-01
Shared savings arrangements for campus energy efficient investments are discussed. Shared savings is a term for an agreement in which a private company offers to implement an energy efficiency program, including capital improvements, in exchange for a portion of the energy cost savings. Attention is directed to: types of shared savings…
Stewart, Andrew K.; Shmukler, Boris E.; Vandorpe, David H.; Reimold, Fabian; Heneghan, John F.; Nakakuki, M.; Akhavein, Arash; Ko, Shigeru; Ishiguro, Hiroshi
2011-01-01
The secretin-stimulated human pancreatic duct secretes HCO3−-rich fluid essential for normal digestion. Optimal stimulation of pancreatic HCO3− secretion likely requires coupled activities of the cystic fibrosis transmembrane regulator (CFTR) anion channel and apical SLC26 Cl−/HCO3− exchangers. However, whereas stimulated human and guinea pig pancreatic ducts secrete ∼140 mM HCO3− or more, mouse and rat ducts secrete ∼40–70 mM HCO3−. Moreover, the axial distribution and physiological roles of SLC26 anion exchangers in pancreatic duct secretory processes remain controversial and may vary among mammalian species. Thus the property of high HCO3− secretion shared by human and guinea pig pancreatic ducts prompted us to clone from guinea pig pancreatic duct cDNAs encoding Slc26a3, Slc26a6, and Slc26a11 polypeptides. We then functionally characterized these anion transporters in Xenopus oocytes and human embryonic kidney (HEK) 293 cells. In Xenopus oocytes, gpSlc26a3 mediated only Cl−/Cl− exchange and electroneutral Cl−/HCO3− exchange. gpSlc26a6 in Xenopus oocytes mediated Cl−/Cl− exchange and bidirectional exchange of Cl− for oxalate and sulfate, but Cl−/HCO3− exchange was detected only in HEK 293 cells. gpSlc26a11 in Xenopus oocytes exhibited pH-dependent Cl−, oxalate, and sulfate transport but no detectable Cl−/HCO3− exchange. The three gpSlc26 anion transporters exhibited distinct pharmacological profiles of 36Cl− influx, including partial sensitivity to CFTR inhibitors Inh-172 and GlyH101, but only Slc26a11 was inhibited by PPQ-102. This first molecular and functional assessment of recombinant SLC26 anion transporters from guinea pig pancreatic duct enhances our understanding of pancreatic HCO3− secretion in species that share a high HCO3− secretory output. PMID:21593449
Alcalá, Ana C; Palomares, Laura A; Ludert, Juan E
2018-05-02
The dengue virus NS1 is a multifunctional glycoprotein. For decades, the notion in the field was that NS1 was secreted exclusively from vertebrate, but not mosquito, cells. However, recent evidence shows that mosquito cells also secrete NS1 efficiently. In this review, we discuss the evidence for dengue, and other flaviviruses, NS1 secretion from mosquito cells, differences between NS1 secreted from mosquito and vertebrate cells, and possible roles of soluble NS1 in the insect flavivirus vector. Copyright © 2018 American Society for Microbiology.
Monks, Jenifer; Dzieciatkowska, Monika; Bales, Elise S; Orlicky, David J; Wright, Richard M; McManaman, James L
2016-10-15
Xanthine oxidoreductase (XOR) modulates milk lipid secretion and lactation initiation. XOR is required for butyrophilin1a1 clustering in the membrane during milk lipid secretion. XOR mediates apical membrane reorganization during milk lipid secretion. Loss of XOR delays milk fat globule secretion. XOR loss alters the proteome of milk fat globules. Apocrine secretion is utilized by epithelial cells of exocrine glands. These cells bud off membrane-bound particles into the lumen of the gland, losing a portion of the cytoplasm in the secretion product. The lactating mammary gland secretes milk lipid by this mechanism, and xanthine oxidoreductase (XOR) has long been thought to be functionally important. We generated mammary-specific XOR knockout (MGKO) mice, expecting lactation to fail. Histology of the knockout glands showed very large lipid droplets enclosed in the mammary alveolar cells, but milk analysis showed that these large globules were secreted. Butyrophilin, a membrane protein known to bind to XOR, was clustered at the point of contact of the cytoplasmic lipid droplet with the apical plasma membrane, in the wild-type gland but not in the knockout, suggesting that XOR mediates 'docking' to this membrane. Secreted milk fat globules were isolated from mouse milk of wild-type and XOR MGKO dams, and subjected to LC-MS/MS for analysis of protein component. Proteomic results showed that loss of XOR leads to an increase in cytoplasmic, cytoskeletal, Golgi apparatus and lipid metabolism proteins associated with the secreted milk fat globule. Association of XOR with the lipid droplet results in membrane docking and more efficient retention of cytoplasmic components by the secretory cell. Loss of XOR then results in a reversion to a more rudimentary, less efficient, apocrine secretion mechanism, but does not prevent milk fat globule secretion. © 2016 The Authors. The Journal of Physiology © 2016 The Physiological Society.
Quantum-noise randomized data encryption for wavelength-division-multiplexed fiber-optic networks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Corndorf, Eric; Liang Chuang; Kanter, Gregory S.
2005-06-15
We demonstrate high-rate randomized data-encryption through optical fibers using the inherent quantum-measurement noise of coherent states of light. Specifically, we demonstrate 650 Mbit/s data encryption through a 10 Gbit/s data-bearing, in-line amplified 200-km-long line. In our protocol, legitimate users (who share a short secret key) communicate using an M-ry signal set while an attacker (who does not share the secret key) is forced to contend with the fundamental and irreducible quantum-measurement noise of coherent states. Implementations of our protocol using both polarization-encoded signal sets as well as polarization-insensitive phase-keyed signal sets are experimentally and theoretically evaluated. Different from the performancemore » criteria for the cryptographic objective of key generation (quantum key-generation), one possible set of performance criteria for the cryptographic objective of data encryption is established and carefully considered.« less
Authentication Based on Non-Interactive Zero-Knowledge Proofs for the Internet of Things.
Martín-Fernández, Francisco; Caballero-Gil, Pino; Caballero-Gil, Cándido
2016-01-07
This paper describes the design and analysis of a new scheme for the authenticated exchange of confidential information in insecure environments within the Internet of Things, which allows a receiver of a message to authenticate the sender and compute a secret key shared with it. The proposal is based on the concept of a non-interactive zero-knowledge proof, so that in a single communication, relevant data may be inferred to verify the legitimacy of the sender. Besides, the new scheme uses the idea under the Diffie-Hellman protocol for the establishment of a shared secret key. The proposal has been fully developed for platforms built on the Android Open Source Project, so it can be used in any device or sensor with this operating system. This work provides a performance study of the implementation and a comparison between its promising results and others obtained with similar schemes.
Fast implementation of length-adaptive privacy amplification in quantum key distribution
NASA Astrophysics Data System (ADS)
Zhang, Chun-Mei; Li, Mo; Huang, Jing-Zheng; Patcharapong, Treeviriyanupab; Li, Hong-Wei; Li, Fang-Yi; Wang, Chuan; Yin, Zhen-Qiang; Chen, Wei; Keattisak, Sripimanwat; Han, Zhen-Fu
2014-09-01
Post-processing is indispensable in quantum key distribution (QKD), which is aimed at sharing secret keys between two distant parties. It mainly consists of key reconciliation and privacy amplification, which is used for sharing the same keys and for distilling unconditional secret keys. In this paper, we focus on speeding up the privacy amplification process by choosing a simple multiplicative universal class of hash functions. By constructing an optimal multiplication algorithm based on four basic multiplication algorithms, we give a fast software implementation of length-adaptive privacy amplification. “Length-adaptive” indicates that the implementation of privacy amplification automatically adapts to different lengths of input blocks. When the lengths of the input blocks are 1 Mbit and 10 Mbit, the speed of privacy amplification can be as fast as 14.86 Mbps and 10.88 Mbps, respectively. Thus, it is practical for GHz or even higher repetition frequency QKD systems.
Authentication Based on Non-Interactive Zero-Knowledge Proofs for the Internet of Things
Martín-Fernández, Francisco; Caballero-Gil, Pino; Caballero-Gil, Cándido
2016-01-01
This paper describes the design and analysis of a new scheme for the authenticated exchange of confidential information in insecure environments within the Internet of Things, which allows a receiver of a message to authenticate the sender and compute a secret key shared with it. The proposal is based on the concept of a non-interactive zero-knowledge proof, so that in a single communication, relevant data may be inferred to verify the legitimacy of the sender. Besides, the new scheme uses the idea under the Diffie–Hellman protocol for the establishment of a shared secret key. The proposal has been fully developed for platforms built on the Android Open Source Project, so it can be used in any device or sensor with this operating system. This work provides a performance study of the implementation and a comparison between its promising results and others obtained with similar schemes. PMID:26751454
Lang, Jun
2012-01-30
In this paper, we propose a novel secure image sharing scheme based on Shamir's three-pass protocol and the multiple-parameter fractional Fourier transform (MPFRFT), which can safely exchange information with no advance distribution of either secret keys or public keys between users. The image is encrypted directly by the MPFRFT spectrum without the use of phase keys, and information can be shared by transmitting the encrypted image (or message) three times between users. Numerical simulation results are given to verify the performance of the proposed algorithm.
A novel autotransporter adhesin is required for efficient colonization during bubonic plague.
Lawrenz, Matthew B; Lenz, Jonathan D; Miller, Virginia L
2009-01-01
Many proteins secreted by the type V secretion system (autotransporters) have been linked to virulence in gram-negative bacteria. Several putative conventional autotransporters are present in the Yersinia pestis genome, but only one, YapE, is conserved in the other pathogenic Yersinia species. Here, we introduce YapE and demonstrate that it is secreted via a type V mechanism. Inactivation of yapE in Y. pestis results in decreased efficiency in colonization of tissues during bubonic infection. Coinfection with wild-type bacteria only partially compensates for this defect. Analysis of the host immune response suggests that YapE is required for either efficient colonization at the inoculation site or dissemination to draining lymph nodes. YapE also demonstrates adhesive properties capable of mediating interactions with bacteria and eukaryotic cells. These findings support a role for YapE in modulating host-pathogen interactions that are important for colonization of the mammalian host.
Létoffé, S; Wandersman, C
1992-01-01
Protease B from Erwinia chrysanthemi was shown previously to have a C-terminal secretion signal located downstream of a domain that contains six glycine-rich repeats. This domain is conserved in all known bacterial proteins secreted by the signal peptide-independent pathway. The role of these repeats in the secretion process is controversial. We compared the secretion processes of various heterologous polypeptides fused either directly to the signal or separated from it by the glycine-rich domain. Although the repeats are not involved in the secretion of small truncated protease B carboxy-terminal peptides, they are required for the secretion of higher-molecular-weight fusion proteins. Secretion efficiency was also dependent on the size of the passenger polypeptide. Images PMID:1629152
An Enhanced Privacy-Preserving Authentication Scheme for Vehicle Sensor Networks.
Zhou, Yousheng; Zhao, Xiaofeng; Jiang, Yi; Shang, Fengjun; Deng, Shaojiang; Wang, Xiaojun
2017-12-08
Vehicle sensor networks (VSNs) are ushering in a promising future by enabling more intelligent transportation systems and providing a more efficient driving experience. However, because of their inherent openness, VSNs are subject to a large number of potential security threats. Although various authentication schemes have been proposed for addressing security problems, they are not suitable for VSN applications because of their high computation and communication costs. Chuang and Lee have developed a trust-extended authentication mechanism (TEAM) for vehicle-to-vehicle communication using a transitive trust relationship, which they claim can resist various attacks. However, it fails to counter internal attacks because of the utilization of a shared secret key. In this paper, to eliminate the vulnerability of TEAM, an enhanced privacy-preserving authentication scheme for VSNs is constructed. The security of our proposed scheme is proven under the random oracle model based on the assumption of the computational Diffie-Hellman problem.
An Enhanced Privacy-Preserving Authentication Scheme for Vehicle Sensor Networks
Zhou, Yousheng; Zhao, Xiaofeng; Jiang, Yi; Shang, Fengjun; Deng, Shaojiang; Wang, Xiaojun
2017-01-01
Vehicle sensor networks (VSNs) are ushering in a promising future by enabling more intelligent transportation systems and providing a more efficient driving experience. However, because of their inherent openness, VSNs are subject to a large number of potential security threats. Although various authentication schemes have been proposed for addressing security problems, they are not suitable for VSN applications because of their high computation and communication costs. Chuang and Lee have developed a trust-extended authentication mechanism (TEAM) for vehicle-to-vehicle communication using a transitive trust relationship, which they claim can resist various attacks. However, it fails to counter internal attacks because of the utilization of a shared secret key. In this paper, to eliminate the vulnerability of TEAM, an enhanced privacy-preserving authentication scheme for VSNs is constructed. The security of our proposed scheme is proven under the random oracle model based on the assumption of the computational Diffie–Hellman problem. PMID:29292792
Experimental measurement-device-independent quantum key distribution with uncharacterized encoding.
Wang, Chao; Wang, Shuang; Yin, Zhen-Qiang; Chen, Wei; Li, Hong-Wei; Zhang, Chun-Mei; Ding, Yu-Yang; Guo, Guang-Can; Han, Zheng-Fu
2016-12-01
Measurement-device-independent quantum key distribution (MDI QKD) is an efficient way to share secrets using untrusted measurement devices. However, the assumption on the characterizations of encoding states is still necessary in this promising protocol, which may lead to unnecessary complexity and potential loopholes in realistic implementations. Here, by using the mismatched-basis statistics, we present the first proof-of-principle experiment of MDI QKD with uncharacterized encoding sources. In this demonstration, the encoded states are only required to be constrained in a two-dimensional Hilbert space, and two distant parties (Alice and Bob) are resistant to state preparation flaws even if they have no idea about the detailed information of their encoding states. The positive final secure key rates of our system exhibit the feasibility of this novel protocol, and demonstrate its value for the application of secure communication with uncharacterized devices.
Eavesdropping on counterfactual quantum key distribution with finite resources
NASA Astrophysics Data System (ADS)
Liu, Xingtong; Zhang, Bo; Wang, Jian; Tang, Chaojing; Zhao, Jingjing; Zhang, Sheng
2014-08-01
A striking scheme called "counterfactual quantum cryptography" gives a conceptually new approach to accomplish the task of key distribution. It allows two legitimate parties to share a secret even though a particle carrying secret information is not, in fact, transmitted through the quantum channel. Since an eavesdropper cannot directly access the entire quantum system of each signal particle, the protocol seems to provide practical security advantages. However, here we propose an eavesdropping method which works on the scheme in a finite key scenario. We show that, for practical systems only generating a finite number of keys, the eavesdropping can obtain all of the secret information without being detected. We also present a improved protocol as a countermeasure against this attack.
Moua, Pachai S; Gonzalez, Alfonso; Oshiro, Kristin T; Tam, Vivian; Li, Zhiguo Harry; Chang, Jennifer; Leung, Wilson; Yon, Amy; Thor, Der; Venkatram, Sri; Franz, Andreas H; Risser, Douglas D; Lin-Cereghino, Joan; Lin-Cereghino, Geoff P
2016-08-01
The Escherichia coli maltose binding protein (MBP) is an N-terminal fusion partner that was shown to enhance the secretion of some heterologous proteins from the yeast Pichia pastoris, a popular host for recombinant protein expression. The amount of increase in secretion was dependent on the identity of the cargo protein, and the fusions were proteolyzed prior to secretion, limiting its use as a purification tag. In order to overcome these obstacles, we used the MBP as C-terminal partner for several cargo peptides. While the Cargo-MBP proteins were no longer proteolyzed in between these two moieties when the MBP was in this relative position, the secretion efficiency of several fusions was lower than when MBP was located at the opposite end of the cargo protein (MBP-Cargo). Furthermore, fluorescence analysis suggested that the MBP-EGFP and EGFP-MBP proteins followed different routes within the cell. The effect of several Pichia pastoris beta-galactosidase supersecretion (bgs) strains, mutants showing enhanced secretion of select reporters, was also investigated on both MBP-EGFP and EGFP-MBP. While the secretion efficiency, proteolysis and localization of the MBP-EGFP was influenced by the modified function of Bgs13, EGFP-MBP behavior was not affected in the bgs strain. Taken together, these results indicate that the location of the MBP in a fusion affects the pathway and trans-acting factors regulating secretion in P. pastoris. Copyright © 2016 Elsevier Inc. All rights reserved.
Normal and abnormal secretion by haemopoietic cells
STINCHCOMBE, JANE C; GRIFFITHS, GILLIAN M
2001-01-01
The secretory lysosomes found in haemopoietic cells provide a very efficient mechanism for delivering the effector proteins of many immune cells in response to antigen recognition. Although secretion shows some similarities to the secretion of specialized granules in other secretory cell types, some aspects of secretory lysosome release appear to be unique to melanocytes and cells of the haemopoietic lineage. Mast cells and platelets have provided excellent models for studying secretion, but recent advances in characterizing the immunological synapse allow a very fine dissection of the secretory process in T lymphocytes. These studies show that secretory lysosomes are secreted from the centre of the talin ring at the synapse. Proper secretion requires a series of Rab and cytoskeletal elements which play critical roles in the specialized secretion of lysosomes in haemopoietic cells. PMID:11380687
On Hierarchical Threshold Access Structures
2010-11-01
One of the recent generalizations of (t, n) secret sharing for hierarchical threshold access structures is given by Tassa, where he answers the...of theoretical background. We give a conceptually simpler alternative for the understanding of the realization of hierarchical threshold access
DOE Office of Scientific and Technical Information (OSTI.GOV)
Samudrala, Ram; Heffron, Fred; McDermott, Jason E.
2009-04-24
The type III secretion system is an essential component for virulence in many Gram-negative bacteria. Though components of the secretion system apparatus are conserved, its substrates, effector proteins, are not. We have used a machine learning approach to identify new secreted effectors. The method integrates evolutionary measures, such as the pattern of homologs in a range of other organisms, and sequence-based features, such as G+C content, amino acid composition and the N-terminal 30 residues of the protein sequence. The method was trained on known effectors from Salmonella typhimurium and validated on a corresponding set of effectors from Pseudomonas syringae, aftermore » eliminating effectors with detectable sequence similarity. The method was able to identify all of the known effectors in P. syringae with a specificity of 84% and sensitivity of 82%. The reciprocal validation, training on P. syringae and validating on S. typhimurium, gave similar results with a specificity of 86% when the sensitivity level was 87%. These results show that type III effectors in disparate organisms share common features. We found that maximal performance is attained by including an N-terminal sequence of only 30 residues, which agrees with previous studies indicating that this region contains the secretion signal. We then used the method to define the most important residues in this putative secretion signal. Finally, we present novel predictions of secreted effectors in S. typhimurium, some of which have been experimentally validated, and apply the method to predict secreted effectors in the genetically intractable human pathogen Chlamydia trachomatis. This approach is a novel and effective way to identify secreted effectors in a broad range of pathogenic bacteria for further experimental characterization and provides insight into the nature of the type III secretion signal.« less
Mutations in ppe38 block PE_PGRS secretion and increase virulence of Mycobacterium tuberculosis.
Ates, Louis S; Dippenaar, Anzaan; Ummels, Roy; Piersma, Sander R; van der Woude, Aniek D; van der Kuij, Kim; Le Chevalier, Fabien; Mata-Espinosa, Dulce; Barrios-Payán, Jorge; Marquina-Castillo, Brenda; Guapillo, Carolina; Jiménez, Connie R; Pain, Arnab; Houben, Edith N G; Warren, Robin M; Brosch, Roland; Hernández-Pando, Rogelio; Bitter, Wilbert
2018-02-01
Mycobacterium tuberculosis requires a large number of secreted and exported proteins for its virulence, immune modulation and nutrient uptake. Most of these proteins are transported by the different type VII secretion systems 1,2 . The most recently evolved type VII secretion system, ESX-5, secretes dozens of substrates belonging to the PE and PPE families, which are named for conserved proline and glutamic acid residues close to the amino terminus 3,4 . However, the role of these proteins remains largely elusive 1 . Here, we show that mutations of ppe38 completely block the secretion of two large subsets of ESX-5 substrates, that is, PPE-MPTR and PE_PGRS, together comprising >80 proteins. Importantly, hypervirulent clinical M. tuberculosis strains of the Beijing lineage have such a mutation and a concomitant loss of secretion 5 . Restoration of PPE38-dependent secretion partially reverted the hypervirulence phenotype of a Beijing strain, and deletion of ppe38 in moderately virulent M. tuberculosis increased virulence. This indicates that these ESX-5 substrates have an important role in virulence attenuation. Phylogenetic analysis revealed that deletion of ppe38 occurred at the branching point of the 'modern' Beijing sublineage and is shared by Beijing outbreak strains worldwide, suggesting that this deletion may have contributed to their success and global distribution 6,7 .
Color extended visual cryptography using error diffusion.
Kang, InKoo; Arce, Gonzalo R; Lee, Heung-Kyu
2011-01-01
Color visual cryptography (VC) encrypts a color secret message into n color halftone image shares. Previous methods in the literature show good results for black and white or gray scale VC schemes, however, they are not sufficient to be applied directly to color shares due to different color structures. Some methods for color visual cryptography are not satisfactory in terms of producing either meaningless shares or meaningful shares with low visual quality, leading to suspicion of encryption. This paper introduces the concept of visual information pixel (VIP) synchronization and error diffusion to attain a color visual cryptography encryption method that produces meaningful color shares with high visual quality. VIP synchronization retains the positions of pixels carrying visual information of original images throughout the color channels and error diffusion generates shares pleasant to human eyes. Comparisons with previous approaches show the superior performance of the new method.
Code of Federal Regulations, 2010 CFR
2010-10-01
... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION VESSEL FINANCING ASSISTANCE OBLIGATION GUARANTEES Introduction § 298... if you are not a well established firm with strong financial qualifications and strong market shares... attachments, contains information you consider to be trade secrets or commercial or financial information and...
Sak-Ubol, Suttipong; Namvijitr, Peenida; Pechsrichuang, Phornsiri; Haltrich, Dietmar; Nguyen, Thu-Ha; Mathiesen, Geir; Eijsink, Vincent G H; Yamabhai, Montarop
2016-05-12
Heterologous production of hydrolytic enzymes is important for green and white biotechnology since these enzymes serve as efficient biocatalysts for the conversion of a wide variety of raw materials into value-added products. Lactic acid bacteria are interesting cell factories for the expression of hydrolytic enzymes as many of them are generally recognized as safe and require only a simple cultivation process. We are studying a potentially food-grade expression system for secretion of hydrolytic enzymes into the culture medium, since this enables easy harvesting and purification, while allowing direct use of the enzymes in food applications. We studied overexpression of a chitosanase (CsnA) and a β-mannanase (ManB), from Bacillus licheniformis and Bacillus subtilis, respectively, in Lactobacillus plantarum, using the pSIP system for inducible expression. The enzymes were over-expressed in three forms: without a signal peptide, with their natural signal peptide and with the well-known OmpA signal peptide from Escherichia coli. The total production levels and secretion efficiencies of CsnA and ManB were highest when using the native signal peptides, and both were reduced considerably when using the OmpA signal. At 20 h after induction with 12.5 ng/mL of inducing peptide in MRS media containing 20 g/L glucose, the yields and secretion efficiencies of the proteins with their native signal peptides were 50 kU/L and 84% for ManB, and 79 kU/L and 56% for CsnA, respectively. In addition, to avoid using antibiotics, the erythromycin resistance gene was replaced on the expression plasmid with the alanine racemase (alr) gene, which led to comparable levels of protein production and secretion efficiency in a suitable, alr-deficient L. plantarum host. ManB and CsnA were efficiently produced and secreted in L. plantarum using pSIP-based expression vectors containing either an erythromycin resistance or the alr gene as selection marker.
Zhang, Ningning; Dolan, Maureen; Wu, Di; Phillips, Gregory C; Xu, Jianfeng
2016-12-01
Cell growth medium composition has profound impacts on the O -glycosylation of a "designer" arabinogalactan protein-based module; full glycosylation is essential in directing efficient extracellular secretion of the tagged recombinant protein. Expression of recombinant proteins in plant cells as fusion with a de novo designed hydroxyproline (Hyp)-O-glycosylated peptide (HypGP) tag, termed HypGP engineering technology, resulted in dramatically increased secreted protein yields. This is due to the function of the HypGP tag as a molecular carrier in promoting efficient transport of conjoined proteins into culture media. To optimize the cell culture to achieve the best secreted protein yields, the medium effects on the cell growth and protein secretion were investigated using as a model system the tobacco BY-2 cell expressing enhanced green fluorescence protein (EGFP) fused with a (SP) 32 tag (32 tandem repeats of "Ser-Pro" motif). The (SP) 32 tag was found to undergo two-stage Hyp-O-glycosylation in plant cells with the dramatic secretion of the conjoined EGFP correlating with the triggering of the second-stage glycosylation. The BY-2 cell culture in SH medium generated a high secreted protein yield (125 mg/L) with a low cell biomass accumulation (~7.5 gDW/L). In contrast, very low secreted protein yields (~1.5 mg/L) with a high cell biomass accumulation (13.5 gDW/L) were obtained in MS medium. The macronutrients, specifically, the nitrogen supply greatly impacted the glycosylation of the (SP) 32 tag and subsequent protein secretion. Modified MS medium with reduced nitrogen levels boosted the secreted EGFP yields to 168 mg/L. This study demonstrates the profound impacts of medium composition on the secreted yields of a HypGP-tagged protein, and provides a basis for medium design to achieve the highest productivity of the HypGP engineering technology.
Pituitary-hormone secretion by thyrotropinomas.
Roelfsema, Ferdinand; Kok, Simon; Kok, Petra; Pereira, Alberto M; Biermasz, Nienke R; Smit, Jan W; Frolich, Marijke; Keenan, Daniel M; Veldhuis, Johannes D; Romijn, Johannes A
2009-01-01
Hormone secretion by somatotropinomas, corticotropinomas and prolactinomas exhibits increased pulse frequency, basal and pulsatile secretion, accompanied by greater disorderliness. Increased concentrations of growth hormone (GH) or prolactin (PRL) are observed in about 30% of thyrotropinomas leading to acromegaly or disturbed sexual functions beyond thyrotropin (TSH)-induced hyperthyroidism. Regulation of non-TSH pituitary hormones in this context is not well understood. We there therefore evaluated TSH, GH and PRL secretion in 6 patients with up-to-date analytical and mathematical tools by 24-h blood sampling at 10-min intervals in a clinical research laboratory. The profiles were analyzed with a new deconvolution method, approximate entropy, cross-approximate entropy, cross-correlation and cosinor regression. TSH burst frequency and basal and pulsatile secretion were increased in patients compared with controls. TSH secretion patterns in patients were more irregular, but the diurnal rhythm was preserved at a higher mean with a 2.5 h phase delay. Although only one patient had clinical acromegaly, GH secretion and IGF-I levels were increased in two other patients and all three had a significant cross-correlation between the GH and TSH. PRL secretion was increased in one patient, but all patients had a significant cross-correlation with TSH and showed decreased PRL regularity. Cross-ApEn synchrony between TSH and GH did not differ between patients and controls, but TSH and PRL synchrony was reduced in patients. We conclude that TSH secretion by thyrotropinomas shares many characteristics of other pituitary hormone-secreting adenomas. In addition, abnormalities in GH and PRL secretion exist ranging from decreased (joint) regularity to overt hypersecretion, although not always clinically obvious, suggesting tumoral transformation of thyrotrope lineage cells.
Hung, Chien-Wen; Klein, Tobias; Cassidy, Liam; Linke, Dennis; Lange, Sabrina; Anders, Uwe; Bureik, Matthias; Heinzle, Elmar; Schneider, Konstantin; Tholey, Andreas
2016-01-01
Protein secretion in yeast is a complex process and its efficiency depends on a variety of parameters. We performed a comparative proteome analysis of a set of Schizosaccharomyces pombe strains producing the α-glucosidase maltase in increasing amounts to investigate the overall proteomic response of the cell to the burden of protein production along the various steps of protein production and secretion. Proteome analysis of these strains, utilizing an isobaric labeling/two dimensional LC-MALDI MS approach, revealed complex changes, from chaperones and secretory transport machinery to proteins controlling transcription and translation. We also found an unexpectedly high amount of changes in enzyme levels of the central carbon metabolism and a significant up-regulation of several amino acid biosyntheses. These amino acids were partially underrepresented in the cellular protein compared with the composition of the model protein. Additional feeding of these amino acids resulted in a 1.5-fold increase in protein secretion. Membrane fluidity was identified as a second bottleneck for high-level protein secretion and addition of fluconazole to the culture caused a significant decrease in ergosterol levels, whereas protein secretion could be further increased by a factor of 2.1. In summary, we show that high level protein secretion causes global changes of protein expression levels in the cell and that precursor availability and membrane composition limit protein secretion in this yeast. In this respect, comparative proteome analysis is a powerful tool to identify targets for an efficient increase of protein production and secretion in S. pombe. Data are available via ProteomeXchange with identifiers PXD002693 and PXD003016. PMID:27477394
Preserving privacy of online digital physiological signals using blind and reversible steganography.
Shiu, Hung-Jr; Lin, Bor-Sing; Huang, Chien-Hung; Chiang, Pei-Ying; Lei, Chin-Laung
2017-11-01
Physiological signals such as electrocardiograms (ECG) and electromyograms (EMG) are widely used to diagnose diseases. Presently, the Internet offers numerous cloud storage services which enable digital physiological signals to be uploaded for convenient access and use. Numerous online databases of medical signals have been built. The data in them must be processed in a manner that preserves patients' confidentiality. A reversible error-correcting-coding strategy will be adopted to transform digital physiological signals into a new bit-stream that uses a matrix in which is embedded the Hamming code to pass secret messages or private information. The shared keys are the matrix and the version of the Hamming code. An online open database, the MIT-BIH arrhythmia database, was used to test the proposed algorithms. The time-complexity, capacity and robustness are evaluated. Comparisons of several evaluations subject to related work are also proposed. This work proposes a reversible, low-payload steganographic scheme for preserving the privacy of physiological signals. An (n, m)-hamming code is used to insert (n - m) secret bits into n bits of a cover signal. The number of embedded bits per modification is higher than in comparable methods, and the computational power is efficient and the scheme is secure. Unlike other Hamming-code based schemes, the proposed scheme is both reversible and blind. Copyright © 2017 Elsevier B.V. All rights reserved.
Maccani, Andreas; Landes, Nils; Stadlmayr, Gerhard; Maresch, Daniel; Leitner, Christian; Maurer, Michael; Gasser, Brigitte; Ernst, Wolfgang; Kunert, Renate; Mattanovich, Diethard
2014-01-01
Chinese hamster ovary (CHO) cells are currently the workhorse of the biopharmaceutical industry. However, yeasts such as Pichia pastoris are about to enter this field. To compare their capability for recombinant protein secretion, P. pastoris strains and CHO cell lines producing human serum albumin (HSA) and the 3D6 single chain Fv-Fc anti-HIV-1 antibody (3D6scFv-Fc) were cultivated in comparable fed batch processes. In P. pastoris, the mean biomass-specific secretion rate (qp) was 40-fold lower for 3D6scFv-Fc compared to HSA. On the contrary, qp was similar for both proteins in CHO cells. When comparing both organisms, the mean qp of the CHO cell lines was 1011-fold higher for 3D6scFv-Fc and 26-fold higher for HSA. Due to the low qp of the 3D6scFv-Fc producing strain, the space-time yield (STY) was 9.6-fold lower for P. pastoris. In contrast, the STY of the HSA producer was 9.2-fold higher compared to CHO cells because of the shorter process time and higher biomass density. The results indicate that the protein secretion machinery of P. pastoris is much less efficient and the secretion rate strongly depends on the complexity of the recombinant protein. However, process efficiency of the yeast system allows higher STYs for less complex proteins. PMID:24390926
NASA Technical Reports Server (NTRS)
Chow, Edward T.; Woo, Simon S.; James, Mark; Paloulian, George K.
2012-01-01
As communication and networking technologies advance, networks will become highly complex and heterogeneous, interconnecting different network domains. There is a need to provide user authentication and data protection in order to further facilitate critical mission operations, especially in the tactical and mission-critical net-centric networking environment. The Autonomous Information Unit (AIU) technology was designed to provide the fine-grain data access and user control in a net-centric system-testing environment to meet these objectives. The AIU is a fundamental capability designed to enable fine-grain data access and user control in the cross-domain networking environments, where an AIU is composed of the mission data, metadata, and policy. An AIU provides a mechanism to establish trust among deployed AIUs based on recombining shared secrets, authentication and verify users with a username, X.509 certificate, enclave information, and classification level. AIU achieves data protection through (1) splitting data into multiple information pieces using the Shamir's secret sharing algorithm, (2) encrypting each individual information piece using military-grade AES-256 encryption, and (3) randomizing the position of the encrypted data based on the unbiased and memory efficient in-place Fisher-Yates shuffle method. Therefore, it becomes virtually impossible for attackers to compromise data since attackers need to obtain all distributed information as well as the encryption key and the random seeds to properly arrange the data. In addition, since policy can be associated with data in the AIU, different user access and data control strategies can be included. The AIU technology can greatly enhance information assurance and security management in the bandwidth-limited and ad hoc net-centric environments. In addition, AIU technology can be applicable to general complex network domains and applications where distributed user authentication and data protection are necessary. AIU achieves fine-grain data access and user control, reducing the security risk significantly, simplifying the complexity of various security operations, and providing the high information assurance across different network domains.
Hemrajani, Cordula; Marches, Olivier; Wiles, Siouxsie; Girard, Francis; Dennis, Alison; Dziva, Francis; Best, Angus; Phillips, Alan D.; Berger, Cedric N.; Mousnier, Aurelie; Crepin, Valerie F.; Kruidenier, Laurens; Woodward, Martin J.; Stevens, Mark P.; La Ragione, Roberto M.; MacDonald, Thomas T.; Frankel, Gad
2008-01-01
The human pathogen enterohemorrhagic Escherichia coli (EHEC) O157:H7 colonizes human and animal gut via formation of attaching and effacing lesions. EHEC strains use a type III secretion system to translocate a battery of effector proteins into the mammalian host cell, which subvert diverse signal transduction pathways implicated in actin dynamics, phagocytosis, and innate immunity. The genomes of sequenced EHEC O157:H7 strains contain two copies of the effector protein gene nleH, which share 49% sequence similarity with the gene for the Shigella effector OspG, recently implicated in inhibition of migration of the transcriptional regulator NF-κB to the nucleus. In this study we investigated the role of NleH during EHEC O157:H7 infection of calves and lambs. We found that while EHEC ΔnleH colonized the bovine gut more efficiently than the wild-type strain, in lambs the wild-type strain exhibited a competitive advantage over the mutant during mixed infection. Using the mouse pathogen Citrobacter rodentium, which shares many virulence factors with EHEC O157:H7, including NleH, we observed that the wild-type strain exhibited a competitive advantage over the mutant during mixed infection. We found no measurable differences in T-cell infiltration or hyperplasia in colons of mice inoculated with the wild-type or the nleH mutant strain. Using NF-κB reporter mice carrying a transgene containing a luciferase reporter driven by three NF-κB response elements, we found that NleH causes an increase in NF-κB activity in the colonic mucosa. Consistent with this, we found that the nleH mutant triggered a significantly lower tumor necrosis factor alpha response than the wild-type strain. PMID:18725419
Muir, Elizabeth; Raza, Mansoor; Ellis, Clare; Burnside, Emily; Love, Fiona; Heller, Simon; Elliot, Matthew; Daniell, Esther; Dasgupta, Debayan; Alves, Nuno; Day, Priscilla; Fawcett, James; Keynes, Roger
2017-01-01
There is very little reported in the literature about the relationship between modifications of bacterial proteins and their secretion by mammalian cells that synthesize them. We previously reported that the secretion of the bacterial enzyme Chondroitinase ABC by mammalian cells requires the strategic removal of at least three N-glycosylation sites. The aim of this study was to determine if it is possible to enhance the efficacy of the enzyme as a treatment for spinal cord injury by increasing the quantity of enzyme secreted or by altering its cellular location. To determine if the efficiency of enzyme secretion could be further increased, cells were transfected with constructs encoding the gene for chondroitinase ABC modified for expression by mammalian cells; these contained additional modifications of strategic N-glycosylation sites or alternative signal sequences to direct secretion of the enzyme from the cells. We show that while removal of certain specific N-glycosylation sites enhances enzyme secretion, N-glycosylation of at least two other sites, N-856 and N-773, is essential for both production and secretion of active enzyme. Furthermore, we find that the signal sequence directing secretion also influences the quantity of enzyme secreted, and that this varies widely amongst the cell types tested. Last, we find that replacing the 3'UTR on the cDNA encoding Chondroitinase ABC with that of β-actin is sufficient to target the enzyme to the neuronal growth cone when transfected into neurons. This also enhances neurite outgrowth on an inhibitory substrate. Some intracellular trafficking pathways are adversely affected by cryptic signals present in the bacterial gene sequence, whilst unexpectedly others are required for efficient secretion of the enzyme. Furthermore, targeting chondroitinase to the neuronal growth cone promotes its ability to increase neurite outgrowth on an inhibitory substrate. These findings are timely in view of the renewed prospects for gene therapy, and of direct relevance to strategies aimed at expressing foreign proteins in mammalian cells, in particular bacterial proteins.
Diverse CLE peptides from cyst nematode species
USDA-ARS?s Scientific Manuscript database
Plant CLAVATA3/ESR (CLE)-like peptides play diverse roles in plant growth and development including maintenance of the stem cell population in the root meristem. Small secreted peptides sharing similarity to plant CLE signaling peptides have been isolated from several cyst nematode species including...
ERIC Educational Resources Information Center
Good, Rebecca
2008-01-01
Instructional leadership is defined in a broader yet more intense definition today than it was 20 years ago. Originally, the role involved traditional tasks such as setting clear goals, allocating resources to instruction, managing the curriculum, monitoring lesson plans, and evaluating teachers. Today it includes much deeper involvement in the…
ERIC Educational Resources Information Center
Mathematics Teacher, 1985
1985-01-01
Discusses: (1) use of matrix techniques to write secret codes (includes ready-to-duplicate worksheets); (2) a method of multiplication and division of polynomials in one variable that is not tedius, time-consuming, or dependent on guesswork; and (3) adding and subtracting rational expressions and solving rational equations. (JN)
Role of nematode peptides and other small molecules in plant parasitism
USDA-ARS?s Scientific Manuscript database
Molecular, genetic, and biochemical studies are demonstrating an increasingly important role of peptide signaling in nematode parasitism of plants. To date, the majority of nematode-secreted peptides identified share similarity with plant CLAVATA3/ESR (CLE) peptides, but bioinformatics analyses of n...
Defense Acquisition Review Journal. Volume 15, Number 3, Issue 49, December 2008
2008-12-01
objectives (Bennis & Biederman , 1997). The Defense Acquisition University and many of its external corporate university partners share the belief that an... Biederman , P. W. (1997). Organizing genius: The secrets of creative collaboration. Reading, MA: Addison-Wesley. Beyerlein, M. (1995). Measuring
Gaussian private quantum channel with squeezed coherent states
Jeong, Kabgyun; Kim, Jaewan; Lee, Su-Yong
2015-01-01
While the objective of conventional quantum key distribution (QKD) is to secretly generate and share the classical bits concealed in the form of maximally mixed quantum states, that of private quantum channel (PQC) is to secretly transmit individual quantum states concealed in the form of maximally mixed states using shared one-time pad and it is called Gaussian private quantum channel (GPQC) when the scheme is in the regime of continuous variables. We propose a GPQC enhanced with squeezed coherent states (GPQCwSC), which is a generalization of GPQC with coherent states only (GPQCo) [Phys. Rev. A 72, 042313 (2005)]. We show that GPQCwSC beats the GPQCo for the upper bound on accessible information. As a subsidiary example, it is shown that the squeezed states take an advantage over the coherent states against a beam splitting attack in a continuous variable QKD. It is also shown that a squeezing operation can be approximated as a superposition of two different displacement operations in the small squeezing regime. PMID:26364893
A novel lost packets recovery scheme based on visual secret sharing
NASA Astrophysics Data System (ADS)
Lu, Kun; Shan, Hong; Li, Zhi; Niu, Zhao
2017-08-01
In this paper, a novel lost packets recovery scheme which encrypts the effective parts of an original packet into two shadow packets based on (2, 2)-threshold XOR-based visual Secret Sharing (VSS) is proposed. The two shadow packets used as watermarks would be embedded into two normal data packets with digital watermarking embedding technology and then sent from one sensor node to another. Each shadow packet would reveal no information of the original packet, which can improve the security of original packet delivery greatly. The two shadow packets which can be extracted from the received two normal data packets delivered from a sensor node can recover the original packet lossless based on XOR-based VSS. The Performance analysis present that the proposed scheme provides essential services as long as possible in the presence of selective forwarding attack. The proposed scheme would not increase the amount of additional traffic, namely, lower energy consumption, which is suitable for Wireless Sensor Network (WSN).
Gaussian private quantum channel with squeezed coherent states.
Jeong, Kabgyun; Kim, Jaewan; Lee, Su-Yong
2015-09-14
While the objective of conventional quantum key distribution (QKD) is to secretly generate and share the classical bits concealed in the form of maximally mixed quantum states, that of private quantum channel (PQC) is to secretly transmit individual quantum states concealed in the form of maximally mixed states using shared one-time pad and it is called Gaussian private quantum channel (GPQC) when the scheme is in the regime of continuous variables. We propose a GPQC enhanced with squeezed coherent states (GPQCwSC), which is a generalization of GPQC with coherent states only (GPQCo) [Phys. Rev. A 72, 042313 (2005)]. We show that GPQCwSC beats the GPQCo for the upper bound on accessible information. As a subsidiary example, it is shown that the squeezed states take an advantage over the coherent states against a beam splitting attack in a continuous variable QKD. It is also shown that a squeezing operation can be approximated as a superposition of two different displacement operations in the small squeezing regime.
Joint Remote State Preparation of a Single-Atom Qubit State via a GHZ Entangled State
NASA Astrophysics Data System (ADS)
Xiao, Xiao-Qi; Yao, Fengwei; Lin, Xiaochen; Gong, Lihua
2018-04-01
We proposed a physical protocol for the joint remote preparation of a single-atom qubit state via a three-atom entangled GHZ-type state previously shared by the two senders and one receiver. Only rotation operations of single-atom, which can be achieved though the resonant interaction between the two-level atom and the classical field, are required in the scheme. It shows that the splitting way of the classical information of the secret qubit not only determines the success of reconstruction of the secret qubit, but also influences the operations of the senders.
Deconstructing The Bomb: Confessions of a Nuclear Archeologist
NASA Astrophysics Data System (ADS)
Coster-Mullen, John
2017-01-01
I am the author of the groundbreaking book Atom Bombs: The Top Secret Inside Story of Little Boy and Fat Man. I will be sharing some of my quarter century of research and methodology that has allowed me to be the first researcher ever to unravel with an unprecedented level of accuracy, the most closely-guarded secrets of the first two Atomic Bombs (``Little Boy'' and ``Fat Man'') created by the Manhattan Project that were used to end WWII. I refer to this methodology as ``Nuclear Archeology'' and will demonstrate that this was done using entirely ``Open Sources'' of information.
Molecular Cloning of Secreted Luciferases from Marine Planktonic Copepods.
Takenaka, Yasuhiro; Ikeo, Kazuho; Shigeri, Yasushi
2016-01-01
Secreted luciferases isolated from copepod crustaceans are frequently used for nondisruptive reporter-gene assays, such as the continuous, automated and/or high-throughput monitoring of gene expression in living cells. All known copepod luciferases share highly conserved amino acid residues in two similar, repeated domains in the sequence. The similarity in the domains are ideal nature for designing PCR primers to amplify cDNA fragments of unidentified copepod luciferases from bioluminescent copepod crustaceans. Here, we introduce how to establish a cDNA encoding novel copepod luciferases from a copepod specimen by PCR with degenerated primers.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Feibel, C.E.
This study uses multiple data collection and research methods including in depth interviews, 271 surveys of shared taxi and minibus operators, participant observation, secondary sources, and the literature on public transport from low, medium, and high-income countries. Extensive use is also made of a survey administered in Istanbul in 1976 to 1935 paratransit operators. Primary findings are that private buses are more efficient than public buses on a cost per passenger-km basis, and that private minibuses are as efficient as public buses. In terms of energy efficiency, minibuses are almost as efficient as public and private buses using actual-occupancy levels.more » Large shared taxis are twice as cost and energy efficient as cars, and small shared taxis 50% more efficient. In terms of investment cost per seat, large shared taxis have the lowest cost followed by smaller shared taxis, minibuses, and buses. Considering actual occupancy levels, minibuses are only slightly less effective in terms of congestion than buses, and large and small shared taxis are twice as effective as cars. It is also shown that minibuses and shared taxis have better service quality than buses because of higher frequencies and speeds, and because they provide a much higher probability of getting a seat than buses. Analysis of regulation and policy suggests that there are many unintended cost of public-transport regulations.« less
Huang, Mingtao; Bai, Yunpeng; Sjostrom, Staffan L; Hallström, Björn M; Liu, Zihe; Petranovic, Dina; Uhlén, Mathias; Joensson, Haakan N; Andersson-Svahn, Helene; Nielsen, Jens
2015-08-25
There is an increasing demand for biotech-based production of recombinant proteins for use as pharmaceuticals in the food and feed industry and in industrial applications. Yeast Saccharomyces cerevisiae is among preferred cell factories for recombinant protein production, and there is increasing interest in improving its protein secretion capacity. Due to the complexity of the secretory machinery in eukaryotic cells, it is difficult to apply rational engineering for construction of improved strains. Here we used high-throughput microfluidics for the screening of yeast libraries, generated by UV mutagenesis. Several screening and sorting rounds resulted in the selection of eight yeast clones with significantly improved secretion of recombinant α-amylase. Efficient secretion was genetically stable in the selected clones. We performed whole-genome sequencing of the eight clones and identified 330 mutations in total. Gene ontology analysis of mutated genes revealed many biological processes, including some that have not been identified before in the context of protein secretion. Mutated genes identified in this study can be potentially used for reverse metabolic engineering, with the objective to construct efficient cell factories for protein secretion. The combined use of microfluidics screening and whole-genome sequencing to map the mutations associated with the improved phenotype can easily be adapted for other products and cell types to identify novel engineering targets, and this approach could broadly facilitate design of novel cell factories.
NASA Astrophysics Data System (ADS)
Yu, Run-lan; Liu, Jing; Tan, Jian-xi; Zeng, Wei-min; Shi, Li-juan; Gu, Guo-hua; Qin, Wen-qing; Qiu, Guan-zhou
2014-04-01
The pH value plays an important role in the bioleaching of sulphide minerals. The effect of pH values on the extracellular polysaccharide secreted by Acidithiobacillus ferrooxidans was investigated in different phases of bacterial growth during chalcopyrite bioleaching. It is found that extracellular polysaccharide secretion from the cells attached to chalcopyrite is more efficiently than that of the free cells in the bioleaching solution. Three factors, pH values, the concentration of soluble metal ions, and the bacterial growth and metabolism, affect extracellular polysaccharide secretion in the free cells, and are related to the bacterial growth phase. Extracellular polysaccharide secretion from the attached cells is mainly dependent on the pH value of the bacterial culture.
2010-06-01
child pornography, copyright infringement, or aiding and abetting in any infraction.32 26...research, but now that it is being used to share everything from porn to state secrets the trust is no longer warranted. 68 Other authors have
Massahi, Aslan; Çalık, Pınar
2016-11-07
For extracellular recombinant protein production, the efficiency of five endogenous secretion signal peptides (SPs) of Pichia pastoris, SP13 (MLSTILNIFILLLFIQASLQ), SP23 (MKILSALLLLFTLAFA), SP24 (MKVSTTKFLAVFLLVRLVCA), SP26 (MWSLFISGLLIFYPLVLG), SP34 (MRPVLSLLLLLASSVLA), selected based on their D-score which quantifies the signal peptide-ness of a given sequence segment, was investigated using recombinant human growth hormone (rhGH) as the model protein. The expression was conducted under glyceraldehyde-3-phosphate dehydrogenase promoter (PGAP). The highest secretion efficiency among endogenous SPs was obtained by SP23 followed by SP24, SP34, SP13 and SP26, respectively. The fermentation characteristics of rhGH production by the use of SP23, the most favorable endogenous SP of P.pastoris, and Saccharomyces cerevisiae α-mating factor prepro sequence (α-MF) were compared. With respect to the SP23 which is 73 amino acids shorter in length compared to α-MF, in high cell density cultures, where carbon and energy source are limited, the substitution of SP23 for α-MF seems promising. α-MF higher secretion efficiency was verified by major physicochemical properties including hydropathy index, isoelectric point, and aliphatic index. Regarding the examined endogenous SPs, there was no clear correlation between secretion efficiency and major physicochemical properties when each of these properties was considered independently. To find a correlation, factors such as protein N-terminus effect, length of the SP, secondary structure of the SP, and interactions of the selected properties should also be investigated. Copyright © 2016 Elsevier Ltd. All rights reserved.
Mauroy, Benjamin; Flaud, Patrice; Pelca, Dominique; Fausser, Christian; Merckx, Jacques; Mitchell, Barrett R.
2015-01-01
Chest physiotherapy is an empirical technique used to help secretions to get out of the lung whenever stagnation occurs. Although commonly used, little is known about the inner mechanisms of chest physiotherapy and controversies about its use are coming out regularly. Thus, a scientific validation of chest physiotherapy is needed to evaluate its effects on secretions. We setup a quasi-static numerical model of chest physiotherapy based on thorax and lung physiology and on their respective biophysics. We modeled the lung with an idealized deformable symmetric bifurcating tree. Bronchi and their inner fluids mechanics are assumed axisymmetric. Static data from the literature is used to build a model for the lung's mechanics. Secretions motion is the consequence of the shear constraints apply by the air flow. The input of the model is the pressure on the chest wall at each time, and the output is the bronchi geometry and air and secretions properties. In the limit of our model, we mimicked manual and mechanical chest physiotherapy techniques. We show that for secretions to move, air flow has to be high enough to overcome secretion resistance to motion. Moreover, the higher the pressure or the quicker it is applied, the higher is the air flow and thus the mobilization of secretions. However, pressures too high are efficient up to a point where airways compressions prevents air flow to increase any further. Generally, the first effects of manipulations is a decrease of the airway tree hydrodynamic resistance, thus improving ventilation even if secretions do not get out of the lungs. Also, some secretions might be pushed deeper into the lungs; this effect is stronger for high pressures and for mechanical chest physiotherapy. Finally, we propose and tested two a dimensional numbers that depend on lung properties and that allow to measure the efficiency and comfort of a manipulation. PMID:26300780
Savijoki, K; Kahala, M; Palva, A
1997-02-28
A secretion cassette, based on the expression and secretion signals of a S-layer protein (SlpA) from Lactobacillus brevis, was constructed. E. coli beta-lactamase (Bla) was used as the reporter protein to determine the functionality of the S-layer signals for heterologous expression and secretion in Lactococcus lactis, Lactobacillus brevis, Lactobacillus plantarum, Lactobacillus gasseri and Lactobacillus casei using a low-copy-number plasmid derived from pGK12. In all hosts tested, the bla gene was expressed under the slpA signals and all Bla activity was secreted to the culture medium. The Lb. brevis S-layer promoters were very efficiently recognized in L. lactis, Lb. brevis and Lb. plantarum, whereas in Lb. gasseri the slpA promoter region appeared to be recognized at a lower level and in Lb. casei the level of transcripts was below the detection limit. The production of Bla was mainly restricted to the exponential phase of growth. The highest yield of Bla was obtained with L. lactis and Lb. brevis. Without pH control, substantial degradation of Bla occurred during prolonged cultivations with all lactic acid bacteria (LAB) tested. When growing L. lactis and Lb. brevis under pH control, the Bla activity could be stabilized also at the stationary phase. L. lactis produced up to 80 mg/l of Bla which to our knowledge represents the highest amount of a heterologous protein secreted by LAB so far. The short production phase implied a very high rate of secretion with a calculated value of 5 x 10(5) Bla molecules/cell per h. Such a high rate was also observed with Lb. plantarum, whereas in Lb. brevis the competition between the wild type slpA gene and the secretion construct probably lowered the rate of Bla production. The results obtained indicate wide applicability of the Lb. brevis slpA signals for efficient protein production and secretion in LAB.
Different Worlds: Same Secret.
ERIC Educational Resources Information Center
Springfield City Library, MA.
The "Brightwood New Authors Project" brought together a group of ten adults from many different ethnic and educational backgrounds to share in the experience of writing and publishing a book. The prose and poetry that resulted from weekly writing workshops featured guest humanities scholars and teachers. Titles include "I Remember When I Met...";…
Rigor Made Easy: Getting Started
ERIC Educational Resources Information Center
Blackburn, Barbara R.
2012-01-01
Bestselling author and noted rigor expert Barbara Blackburn shares the secrets to getting started, maintaining momentum, and reaching your goals. Learn what rigor looks like in the classroom, understand what it means for your students, and get the keys to successful implementation. Learn how to use rigor to raise expectations, provide appropriate…
ERIC Educational Resources Information Center
Lyngstad, Idar
2014-01-01
This article is based on an interview with a Norwegian physical education (PE) teacher on the social contact she had with pupils when teaching them PE. The article examines a two-dimensional aspect of a teaching situation relating to swimming instruction in PE, especially focusing on pupils' positive experiences of learning to swim and the…
Lin-Cereghino, Geoff P.; Stark, Carolyn M.; Kim, Daniel; Chang, Jennifer; Shaheen, Nadia; Poerwanto, Hansel; Agari, Kimiko; Moua, Pachai; Low, Lauren K.; Tran, Namphuong; Huang, Amy D.; Nattestad, Maria; Oshiro, Kristin T.; Chang, John William; Chavan, Archana; Tsai, Jerry W.; Lin-Cereghino, Joan
2013-01-01
The methylotrophic yeast, Pichia pastoris, has been genetically engineered to produce many heterologous proteins for industrial and research purposes. In order to secrete proteins for easier purification from the extracellular medium, the coding sequence of recombinant proteins are initially fused to the Saccharomyces cerevisiae α-mating factor secretion signal leader. Extensive site-directed mutagenesis of the prepro region of the α-mating factor secretion signal sequence was performed in order to determine the effects of various deletions and substitutions on expression. Though some mutations clearly dampened protein expression, deletion of amino acids 57-70, corresponding to the predicted 3rd alpha helix of α-mating factor secretion signal, increased secretion of reporter proteins horseradish peroxidase and lipase at least 50% in small-scale cultures. These findings raise the possibility that the secretory efficiency of the leader can be further enhanced in the future. PMID:23454485
Identification of secreted bacterial proteins by noncanonical amino acid tagging
Mahdavi, Alborz; Szychowski, Janek; Ngo, John T.; Sweredoski, Michael J.; Graham, Robert L. J.; Hess, Sonja; Schneewind, Olaf; Mazmanian, Sarkis K.; Tirrell, David A.
2014-01-01
Pathogenic microbes have evolved complex secretion systems to deliver virulence factors into host cells. Identification of these factors is critical for understanding the infection process. We report a powerful and versatile approach to the selective labeling and identification of secreted pathogen proteins. Selective labeling of microbial proteins is accomplished via translational incorporation of azidonorleucine (Anl), a methionine surrogate that requires a mutant form of the methionyl-tRNA synthetase for activation. Secreted pathogen proteins containing Anl can be tagged by azide-alkyne cycloaddition and enriched by affinity purification. Application of the method to analysis of the type III secretion system of the human pathogen Yersinia enterocolitica enabled efficient identification of secreted proteins, identification of distinct secretion profiles for intracellular and extracellular bacteria, and determination of the order of substrate injection into host cells. This approach should be widely useful for the identification of virulence factors in microbial pathogens and the development of potential new targets for antimicrobial therapy. PMID:24347637
Gorlani, A; Hulsik, D Lutje; Adams, H; Vriend, G; Hermans, P; Verrips, T
2012-01-01
Variable domains of llama heavy-chain antibodies (VHH) are becoming a potent tool for a wide range of biotechnological and medical applications. Because of structural features typical of their single-domain nature, they are relatively easy to produce in lower eukaryotes, but it is not uncommon that some molecules have poor secretion efficiency. We therefore set out to study the production yield of VHH. We computationally identified five key residues that are crucial for folding and secretion, and we validated their importance with systematic site-directed mutations. The observation that all key residues were localised in the V segment, in proximity of the J segment of VHH, led us to study the importance of J segment in secretion efficiency. Intriguingly, we found that the use of specific J segments in VHH could strongly influence the production yield. Sequence analysis and expression experiments strongly suggested that interactions with chaperones, especially with the J segment, are a crucial aspect of the production yield of VHH.
NASA Astrophysics Data System (ADS)
Yoshino, Ken-ichiro; Fujiwara, Mikio; Nakata, Kensuke; Sumiya, Tatsuya; Sasaki, Toshihiko; Takeoka, Masahiro; Sasaki, Masahide; Tajima, Akio; Koashi, Masato; Tomita, Akihisa
2018-03-01
Quantum key distribution (QKD) allows two distant parties to share secret keys with the proven security even in the presence of an eavesdropper with unbounded computational power. Recently, GHz-clock decoy QKD systems have been realized by employing ultrafast optical communication devices. However, security loopholes of high-speed systems have not been fully explored yet. Here we point out a security loophole at the transmitter of the GHz-clock QKD, which is a common problem in high-speed QKD systems using practical band-width limited devices. We experimentally observe the inter-pulse intensity correlation and modulation pattern-dependent intensity deviation in a practical high-speed QKD system. Such correlation violates the assumption of most security theories. We also provide its countermeasure which does not require significant changes of hardware and can generate keys secure over 100 km fiber transmission. Our countermeasure is simple, effective and applicable to wide range of high-speed QKD systems, and thus paves the way to realize ultrafast and security-certified commercial QKD systems.
NASA Astrophysics Data System (ADS)
Shukla, Chitra; Thapliyal, Kishore; Pathak, Anirban
2017-12-01
Semi-quantum protocols that allow some of the users to remain classical are proposed for a large class of problems associated with secure communication and secure multiparty computation. Specifically, first-time semi-quantum protocols are proposed for key agreement, controlled deterministic secure communication and dialogue, and it is shown that the semi-quantum protocols for controlled deterministic secure communication and dialogue can be reduced to semi-quantum protocols for e-commerce and private comparison (socialist millionaire problem), respectively. Complementing with the earlier proposed semi-quantum schemes for key distribution, secret sharing and deterministic secure communication, set of schemes proposed here and subsequent discussions have established that almost every secure communication and computation tasks that can be performed using fully quantum protocols can also be performed in semi-quantum manner. Some of the proposed schemes are completely orthogonal-state-based, and thus, fundamentally different from the existing semi-quantum schemes that are conjugate coding-based. Security, efficiency and applicability of the proposed schemes have been discussed with appropriate importance.
Batista, F R; Hernández, L; Fernández, J R; Arrieta, J; Menéndez, C; Gómez, R; Támbara, Y; Pons, T
1999-01-01
beta-Fructofuranosidases share a conserved aspartic acid-containing motif (Arg-Asp-Pro; RDP) which is absent from alpha-glucopyranosidases. The role of Asp-309 located in the RDP motif of levansucrase (EC 2.4.1.10) from Acetobacter diazotrophicus SRT4 was studied by site-directed mutagenesis. Substitution of Asp-309 by Asn did not affect enzyme secretion. The kcat of the mutant levansucrase was reduced 75-fold, but its Km was similar to that of the wild-type enzyme, indicating that Asp-309 plays a major role in catalysis. The two levansucrases showed optimal activity at pH 5.0 and yielded similar product profiles. Thus the mutation D309N affected the efficiency of sucrose hydrolysis, but not the enzyme specificity. Since the RDP motif is present in a conserved position in fructosyltransferases, invertases, levanases, inulinases and sucrose-6-phosphate hydrolases, it is likely to have a common functional role in beta-fructofuranosidases. PMID:9895294
DOE Office of Scientific and Technical Information (OSTI.GOV)
Berka, Randy M.; Grigoriev, Igor V.; Otillar, Robert
2011-10-02
Thermostable enzymes and thermophilic cell factories may afford economic advantages in the production of many chemicals and biomass-based fuels. Here we describe and compare the genomes of two thermophilic fungi, Myceliophthora thermophila and Thielavia terrestris. To our knowledge, these genomes are the first described for thermophilic eukaryotes and the first complete telomere-to-telomere genomes for filamentous fungi. Genome analyses and experimental data suggest that both thermophiles are capable of hydrolyzing all major polysaccharides found in biomass. Examination of transcriptome data and secreted proteins suggests that the two fungi use shared approaches in the hydrolysis of cellulose and xylan but distinct mechanismsmore » in pectin degradation. Characterization of the biomass-hydrolyzing activity of recombinant enzymes suggests that these organisms are highly efficient in biomass decomposition at both moderate and high temperatures. Furthermore, we present evidence suggesting that aside from representing a potential reservoir of thermostable enzymes, thermophilic fungi are amenable to manipulation using classical and molecular genetics.« less
Plasticity of laccase generated by homeologous recombination in yeast.
Cusano, Angela M; Mekmouche, Yasmina; Meglecz, Emese; Tron, Thierry
2009-10-01
Laccase-encoding sequences sharing 65-71% identity were shuffledin vivo by homeologous recombination. Yeast efficiently repaired linearized plasmids containing clac1, clac2 or clac5 Trametes sp. C30 cDNAs using a clac3 PCR fragment. From transformants secreting active variants, three chimeric laccases (LAC131, LAC232 and LAC535), each resulting from double crossovers, were purified, and their apparent kinetic parameters were determined using 2,2'-azino-bis(3-ethylbenzthiazoline-6-sulphonic acid) and syringaldazine (SGZ) as substrates. At acidic pH, the apparent kinetic parameters of the chimera were not distinguishable from each other or from those obtained for the LAC3 enzyme used as reference. On the other hand, the pH tolerance of the variants was visibly extended towards alkaline pH values. Compared to the parental LAC3, a 31-fold increase in apparent k(cat) was observed for LAC131 at pH 8. This factor is one of the highest ever observed for laccase in a single mutagenesis step.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Berka, Randy M.; Grigoriev, Igor V.; Otillar, Robert
2011-05-16
Thermostable enzymes and thermophilic cell factories may afford economic advantages in the production of many chemicals and biomass-based fuels. Here we describe and compare the genomes of two thermophilic fungi, Myceliophthora thermophila and Thielavia terrestris. To our knowledge, these genomes are the first described for thermophilic eukaryotes and the first complete telomere-to-telomere genomes for filamentous fungi. Genome analyses and experimental data suggest that both thermophiles are capable of hydrolyzing all major polysaccharides found in biomass. Examination of transcriptome data and secreted proteins suggests that the two fungi use shared approaches in the hydrolysis of cellulose and xylan but distinct mechanismsmore » in pectin degradation. Characterization of the biomass-hydrolyzing activity of recombinant enzymes suggests that these organisms are highly efficient in biomass decomposition at both moderate and high temperatures. Furthermore, we present evidence suggesting that aside from representing a potential reservoir of thermostable enzymes, thermophilic fungi are amenable to manipulation using classical and molecular genetics.« less
A family of tissue-specific resistin-like molecules
Steppan, Claire M.; Brown, Elizabeth J.; Wright, Christopher M.; Bhat, Savitha; Banerjee, Ronadip R.; Dai, Charlotte Y.; Enders, Gregory H.; Silberg, Debra G.; Wen, Xiaoming; Wu, Gary D.; Lazar, Mitchell A.
2001-01-01
We have identified a family of resistin-like molecules (RELMs) in rodents and humans. Resistin is a hormone produced by fat cells. RELMα is a secreted protein that has a restricted tissue distribution with highest levels in adipose tissue. Another family member, RELMβ, is a secreted protein expressed only in the gastrointestinal tract, particularly the colon, in both mouse and human. RELMβ gene expression is highest in proliferative epithelial cells and is markedly increased in tumors, suggesting a role in intestinal proliferation. Resistin and the RELMs share a cysteine composition and other signature features. Thus, the RELMs together with resistin comprise a class of tissue-specific signaling molecules. PMID:11209052
A family of tissue-specific resistin-like molecules.
Steppan, C M; Brown, E J; Wright, C M; Bhat, S; Banerjee, R R; Dai, C Y; Enders, G H; Silberg, D G; Wen, X; Wu, G D; Lazar, M A
2001-01-16
We have identified a family of resistin-like molecules (RELMs) in rodents and humans. Resistin is a hormone produced by fat cells. RELMalpha is a secreted protein that has a restricted tissue distribution with highest levels in adipose tissue. Another family member, RELMbeta, is a secreted protein expressed only in the gastrointestinal tract, particularly the colon, in both mouse and human. RELMbeta gene expression is highest in proliferative epithelial cells and is markedly increased in tumors, suggesting a role in intestinal proliferation. Resistin and the RELMs share a cysteine composition and other signature features. Thus, the RELMs together with resistin comprise a class of tissue-specific signaling molecules.
Lee, Kai-Hui; Chiu, Pei-Ling
2013-10-01
Conventional visual cryptography (VC) suffers from a pixel-expansion problem, or an uncontrollable display quality problem for recovered images, and lacks a general approach to construct visual secret sharing schemes for general access structures. We propose a general and systematic approach to address these issues without sophisticated codebook design. This approach can be used for binary secret images in non-computer-aided decryption environments. To avoid pixel expansion, we design a set of column vectors to encrypt secret pixels rather than using the conventional VC-based approach. We begin by formulating a mathematic model for the VC construction problem to find the column vectors for the optimal VC construction, after which we develop a simulated-annealing-based algorithm to solve the problem. The experimental results show that the display quality of the recovered image is superior to that of previous papers.
Self-Chaperoning of the Type III Secretion System needle tip proteins IpaD and BipD
Johnson, Steven; Roversi, Pietro; Espina, Marianela; Olive, Andrew; Deane, Janet E.; Birket, Susan; Field, Terry; Picking, William D.; Blocker, Ariel; Galyov, Edouard E.; Picking, Wendy L.; Lea, Susan M.
2007-01-01
Bacteria expressing type III secretion systems (T3SS) have been responsible for the deaths of millions worldwide, acting as key virulence elements in diseases ranging from plague to typhoid fever. The T3SS is composed of a basal body, which traverses both bacterial membranes, and an external needle through which effector proteins are secreted. We report multiple crystal structures of two proteins that sit at the tip of the needle and are essential for virulence; IpaD from Shigella flexneri and BipD from Burkholderia pseudomallei. The structures reveal that the N-terminal domains of the molecules are intra-molecular chaperones that prevent premature oligomerization, as well as sharing structural homology with proteins involved in eukaryotic actin rearrangement. Crystal packing has allowed us to construct a model for the tip complex that is supported by mutations designed using the structure. PMID:17077085
Self-chaperoning of the type III secretion system needle tip proteins IpaD and BipD.
Johnson, Steven; Roversi, Pietro; Espina, Marianela; Olive, Andrew; Deane, Janet E; Birket, Susan; Field, Terry; Picking, William D; Blocker, Ariel J; Galyov, Edouard E; Picking, Wendy L; Lea, Susan M
2007-02-09
Bacteria expressing type III secretion systems (T3SS) have been responsible for the deaths of millions worldwide, acting as key virulence elements in diseases ranging from plague to typhoid fever. The T3SS is composed of a basal body, which traverses both bacterial membranes, and an external needle through which effector proteins are secreted. We report multiple crystal structures of two proteins that sit at the tip of the needle and are essential for virulence: IpaD from Shigella flexneri and BipD from Burkholderia pseudomallei. The structures reveal that the N-terminal domains of the molecules are intramolecular chaperones that prevent premature oligomerization, as well as sharing structural homology with proteins involved in eukaryotic actin rearrangement. Crystal packing has allowed us to construct a model for the tip complex that is supported by mutations designed using the structure.
ERIC Educational Resources Information Center
Steinkamp, Erin
2016-01-01
Valley Park Middle School (VPMS) in Valley Park, MO, has the unique designation of being a not-so-secret gem in St. Louis County. The middle school shares its campus with the elementary and high school, creating opportunities to collaborate and work together to build a school district that not only shines academically, but also focuses on…
Boys' Friendships during Adolescence: Intimacy, Desire, and Loss
ERIC Educational Resources Information Center
Way, Niobe
2013-01-01
Longitudinal, mixed method research on friendships, conducted over the past two decades with Black, Latino, Asian, and European American boys, reveals three themes: (1) the importance for boys of being able to share their secrets with their close friends; (2) the importance of close friendships for boys' mental health; and (3) the loss of but…
Launching a Wireless Laptop Program
ERIC Educational Resources Information Center
Grignano, Domenic
2007-01-01
In this article, the author, as a technology director for East Rock Magnet School in New Haven, Connecticut, a federal government test site for laptop learning, shares his secrets to a successful implementation of a wireless laptop program: (1) Build a wireless foundation; (2) Do not choose the cheapest model just because of budget; (3) A sturdy…
ERIC Educational Resources Information Center
Wilhelm, Jeffrey D.
2012-01-01
The secret to teaching may be as simple as asking students good questions--and then giving them the opportunity to find the answers. The author shares how he uses essential questions that set the class off on an inquiry. Rather than consuming information that he distributes and then repeating it on a test, students carry out their own…
Let Me Share a Secret with You! Teaching with Computers.
ERIC Educational Resources Information Center
de Vasconcelos, Maria
The author describes her experiences teaching a computer-enhanced Modern Poetry course. The author argues that using computers enhances the concept of the classroom as learning community. It was the author's experience that students' postings on the discussion board created an atmosphere that encouraged student involvement, as opposed to the…
13 Tips for Virtual World Teaching
ERIC Educational Resources Information Center
Villano, Matt
2008-01-01
Multi-user virtual environments (MUVEs) are gaining momentum as the latest and greatest learning tool in the world of education technology. How does one get started with them? How do they work? This article shares 13 secrets from immersive education experts and educators on how to have success in implementing these new tools and technologies on…
CloudSat Preps for Launch at Vandenberg Air Force Base, CA
NASA Technical Reports Server (NTRS)
2005-01-01
The CloudSat spacecraft sits encapsulated within its Boeing Delta launch vehicle dual payload attach fitting at Vandenberg Air Force Base, Calif. CloudSat will share its ride to orbit late next month with NASA's CALIPSO spacecraft. The two spacecraft are designed to reveal the secrets of clouds and aerosols.Deadly Lessons: School Shooters Tell Why. Sun-Times Exclusive Report.
ERIC Educational Resources Information Center
Chicago Sun-Times, IL.
This document represents a compilation of newspaper articles analyzing information shared by the Secret Service concerning 37 school shootings. The findings are presented to educate parents and teachers concerning what has been learned about violent students. It was determined that there is no profile of a typical youth who kills. The shooter is…
Mathematicians in Schools: Uncovering Maths' Beautiful Secrets
ERIC Educational Resources Information Center
Welch, Bronwyn
2016-01-01
Mathematics professionals are working with teachers revealing the reality and beauty that happens in the world of math and to show that this is essentially a "human endeavour," embedded in much of what people do and the ways in which they think. In this article, the author shares vignettes of primary classes working with mathematicians…
Changes at the National Geographic Society
ERIC Educational Resources Information Center
Schwille, Kathleen
2016-01-01
For more than 125 years, National Geographic has explored the planet, unlocking its secrets and sharing them with the world. For almost thirty of those years, National Geographic has been committed to K-12 educators and geographic education through its Network of Alliances. As National Geographic begins a new chapter, they remain committed to the…
Al Kindi, Mahmood A; Colella, Alex D; Chataway, Tim K; Jackson, Michael W; Wang, Jing J; Gordon, Tom P
2016-04-01
The structures of epitopes bound by autoantibodies against RNA-protein complexes have been well-defined over several decades, but little is known of the clonality, immunoglobulin (Ig) variable (V) gene usage and mutational status of the autoantibodies themselves at the level of the secreted (serum) proteome. A novel proteomic workflow is presented based on affinity purification of specific Igs from serum, high-resolution two-dimensional gel electrophoresis, and de novo and database-driven sequencing of V-region proteins by mass spectrometry. Analysis of anti-Ro52/Ro60/La proteomes in primary Sjögren's syndrome (SS) and anti-Sm and anti-ribosomal P proteomes in systemic lupus erythematosus (SLE) has revealed that these antibody responses are dominated by restricted sets of public (shared) clonotypes, consistent with common pathways of production across unrelated individuals. The discovery of shared sets of specific V-region peptides can be exploited for diagnostic biomarkers in targeted mass spectrometry platforms and for tracking and removal of pathogenic clones. Copyright © 2016 Elsevier B.V. All rights reserved.
NASA Astrophysics Data System (ADS)
Kibria, Mirza Golam; Villardi, Gabriel Porto; Ishizu, Kentaro; Kojima, Fumihide; Yano, Hiroyuki
2016-12-01
In this paper, we study inter-operator spectrum sharing and intra-operator resource allocation in shared spectrum access communication systems and propose efficient dynamic solutions to address both inter-operator and intra-operator resource allocation optimization problems. For inter-operator spectrum sharing, we present two competent approaches, namely the subcarrier gain-based sharing and fragmentation-based sharing, which carry out fair and flexible allocation of the available shareable spectrum among the operators subject to certain well-defined sharing rules, traffic demands, and channel propagation characteristics. The subcarrier gain-based spectrum sharing scheme has been found to be more efficient in terms of achieved throughput. However, the fragmentation-based sharing is more attractive in terms of computational complexity. For intra-operator resource allocation, we consider resource allocation problem with users' dissimilar service requirements, where the operator supports users with delay constraint and non-delay constraint service requirements, simultaneously. This optimization problem is a mixed-integer non-linear programming problem and non-convex, which is computationally very expensive, and the complexity grows exponentially with the number of integer variables. We propose less-complex and efficient suboptimal solution based on formulating exact linearization, linear approximation, and convexification techniques for the non-linear and/or non-convex objective functions and constraints. Extensive simulation performance analysis has been carried out that validates the efficiency of the proposed solution.
Uncoupling of Secretion From Growth in Some Hormone Secretory Tissues
2014-01-01
Context: Most syndromes with benign primary excess of a hormone show positive coupling of hormone secretion to size or proliferation in the affected hormone secretory tissue. Syndromes that lack this coupling seem rare and have not been examined for unifying features among each other. Evidence Acquisition: Selected clinical and basic features were analyzed from original reports and reviews. We examined indices of excess secretion of a hormone and indices of size of secretory tissue within the following three syndromes, each suggestive of uncoupling between these two indices: familial hypocalciuric hypercalcemia, congenital diazoxide-resistant hyperinsulinism, and congenital primary hyperaldosteronism type III (with G151E mutation of the KCNJ5 gene). Evidence Synthesis: Some unifying features among the three syndromes were different from features present among common tumors secreting the same hormone. The unifying and distinguishing features included: 1) expression of hormone excess as early as the first days of life; 2) normal size of tissue that oversecretes a hormone; 3) diffuse histologic expression in the hormonal tissue; 4) resistance to treatment by subtotal ablation of the hormone-secreting tissue; 5) causation by a germline mutation; 6) low potential of the same mutation to cause a tumor by somatic mutation; and 7) expression of the mutated molecule in a pathway between sensing of a serum metabolite and secretion of hormone regulating that metabolite. Conclusion: Some shared clinical and basic features of uncoupling of secretion from size in a hormonal tissue characterize three uncommon states of hormone excess. These features differ importantly from features of common hormonal neoplasm of that tissue. PMID:25004249
Paes, Jéssica A; Lorenzatto, Karina R; de Moraes, Sofia N; Moura, Hercules; Barr, John R; Ferreira, Henrique B
2017-02-10
Mycoplasma hyopneumoniae and Mycoplasma flocculare cohabit the porcine respiratory tract. However, M. hyopneumoniae causes the porcine enzootic pneumonia, while M. flocculare is a commensal bacterium. Comparative analyses demonstrated high similarity between these species, which includes the sharing of all predicted virulence factors. Nevertheless, studies related to soluble secretomes of mycoplasmas were little known, although they are important for bacterial-host interactions. The aim of this study was to perform a comparative analysis between the soluble secreted proteins repertoires of the pathogenic Mycoplasma hyopneumoniae and its closely related commensal Mycoplasma flocculare. For that, bacteria were cultured in medium with reduced serum concentration and secreted proteins were identified by a LC-MS/MS proteomics approach. Altogether, 62 and 26 proteins were identified as secreted by M. hyopneumoniae and M. flocculare, respectively, being just seven proteins shared between these bacteria. In M. hyopneumoniae secretome, 15 proteins described as virulence factors were found; while four putative virulence factors were identified in M. flocculare secretome. For the first time, clear differences related to virulence were found between these species, helping to elucidate the pathogenic nature of M. hyopneumoniae to swine hosts. For the first time, the secretomes of two porcine respiratory mycoplasmas, namely the pathogenic M. hyopneumoniae and the commensal M. flocculare were compared. The presented results revealed previously unknown differences between these two genetically related species, some of which are associated to the M. hyopneumoniae ability to cause porcine enzootic pneumonia. Copyright © 2016 Elsevier B.V. All rights reserved.
Oh, Chang-Sik; Carpenter, Sara C D; Hayes, Marshall L; Beer, Steven V
2010-04-01
DspA/E is a type III effector of Erwinia amylovora, the bacterial pathogen that causes fire blight disease in roseaceous plants. This effector is indispensable for disease development, and it is translocated into plant cells. A DspA/E-specific chaperone, DspB/F, is necessary for DspA/E secretion and possibly for its translocation. In this work, DspB/F-binding sites and secretion and translocation signals in the DspA/E protein were determined. Based on yeast two-hybrid assays, DspB/F was found to bind DspA/E within the first 210 amino acids of the protein. Surprisingly, both DspB/F and OrfA, the putative chaperone of Eop1, also interacted with the C-terminal 1059 amino acids of DspA/E; this suggests another chaperone-binding site. Secretion and translocation assays using serial N-terminal lengths of DspA/E fused with the active form of AvrRpt2 revealed that at least the first 109 amino acids, including the first N-terminal chaperone-binding motif and DspB/F, were required for efficient translocation of DspA/E, although the first 35 amino acids were sufficient for its secretion and the presence of DspB/F was not required. These results indicate that secretion and translocation signals are present in the N terminus of DspA/E, and that at least one DspB/F-binding motif is required for efficient translocation into plant cells.
Regulation of Effector Delivery by Type III Secretion Chaperone Proteins in Erwinia amylovora.
Castiblanco, Luisa F; Triplett, Lindsay R; Sundin, George W
2018-01-01
Type III secretion (TTS) chaperones are critical for the delivery of many effector proteins from Gram-negative bacterial pathogens into host cells, functioning in the stabilization and hierarchical delivery of the effectors to the type III secretion system (TTSS). The plant pathogen Erwinia amylovora secretes at least four TTS effector proteins: DspE, Eop1, Eop3, and Eop4. DspE specifically interacts with the TTS chaperone protein DspF, which stabilizes the effector protein in the cytoplasm and promotes its efficient translocation through the TTSS. However, the role of E. amylovora chaperones in regulating the delivery of other secreted effectors is unknown. In this study, we identified functional interactions between the effector proteins DspE, Eop1, and Eop3 with the TTS chaperones DspF, Esc1 and Esc3 in yeast. Using site-directed mutagenesis, secretion, and translocation assays, we demonstrated that the three TTS chaperones have additive roles for the secretion and translocation of DspE into plant cells whereas DspF negatively affects the translocation of Eop1 and Eop3. Collectively, these results indicate that TTS chaperone proteins exhibit a cooperative behavior to orchestrate the effector secretion and translocation dynamics in E. amylovora .
Comparison of different signal peptides for secretion of heterologous proteins in fission yeast
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kjaerulff, Soren; Jensen, Martin Roland
2005-10-28
In the fission yeast Schizosaccharomyces pombe, there are relatively few signal peptides available and most reports of their activity have not been comparative. Using sequence information from the S. pombe genome database we have identified three putative signal peptides, designated Cpy, Amy and Dpp, and compared their ability to support secretion of green fluorescent protein (GFP). In the comparison we also included the two well-described secretion signals derived from the precursors of, respectively, the Saccharomyces cerevisiae {alpha}-factor and the S. pombe P-factor. The capability of the tested signal peptides to direct secretion of GFP varied greatly. The {alpha}-factor signal didmore » not confer secretion to GFP and all the produced GFP was trapped intracellular. In contrast, the Cpy signal peptide supported efficient secretion of GFP with yields approximating 10 mg/L. We also found that the use of an attenuated version of the S. cerevisiae URA3 marker substantially increases vector copy number and expression yield in fission yeast.« less
Natarajan, Aravind; Haitjema, Charles H; Lee, Robert; Boock, Jason T; DeLisa, Matthew P
2017-05-19
The extracellular expression of recombinant proteins using laboratory strains of Escherichia coli is now routinely achieved using naturally secreted substrates, such as YebF or the osmotically inducible protein Y (OsmY), as carrier molecules. However, secretion efficiency through these pathways needs to be improved for most synthetic biology and metabolic engineering applications. To address this challenge, we developed a generalizable survival-based selection strategy that effectively couples extracellular protein secretion to antibiotic resistance and enables facile isolation of rare mutants from very large populations (i.e., 10 10-12 clones) based simply on cell growth. Using this strategy in the context of the YebF pathway, a comprehensive library of E. coli single-gene knockout mutants was screened and several gain-of-function mutations were isolated that increased the efficiency of extracellular expression without compromising the integrity of the outer membrane. We anticipate that this user-friendly strategy could be leveraged to better understand the YebF pathway and other secretory mechanisms-enabling the exploration of protein secretion in pathogenesis as well as the creation of designer E. coli strains with greatly expanded secretomes-all without the need for expensive exogenous reagents, assay instruments, or robotic automation.
Kroukamp, Heinrich; den Haan, Riaan; la Grange, Daniël C; Sibanda, Ntsako; Foulquié-Moreno, Maria R; Thevelein, Johan M; van Zyl, Willem H
2017-10-01
The yeast Saccharomyces cerevisiae has a long association with alcoholic fermentation industries and has received renewed interest as a biocatalyst for second-generation bioethanol production. Rational engineering strategies are used to create yeast strains for consolidated bioprocessing of lignocellulosic biomass. Although significant progress is made in this regard with the expression of different cellulolytic activities in yeast, cellobiohydrolase (CBH) titers remain well below ideal levels. Through classical breeding, S. cerevisiae strains with up to twofold increased CBH secretion titers is obtained in strains expressing a single gene copy. An increase of up to 3.5-fold in secreted cellobiohydrolase activity is subsequently shown for strains expressing the heterologous gene on a high copy episomal vector. To our knowledge, this is the first report of classical breeding being used to enhance heterologous protein secretion and also the most significant enhancement of CBH secretion in yeast yet reported. This enhanced secretion phenotype is specific for cellobiohydrolase I secretion, indicating that reporter protein properties might be a major determining factor for efficient protein secretion in yeast. By exploring the latent potential of different S. cerevisiae strains, the authors show that the allele pool of various strains is a valuable engineering resource to enhance secretion in yeast. © 2017 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Stewart, P.; Whitwam, R.E.; Tien, Ming
1996-03-01
A manganese peroxidase (mnp1) from Phanerochaete chrysosporium was efficiently expressed in Aspergillus oryzae. Expression was achieved by fusing the mature cDNA of mnp1 with the A. oryzae Taka amylase promoter and secretion signal. The 3{prime} untranslated region of the glucoamylase gene of Asperigillus awamori provided the terminator. The recombinant protein (rMnP) was secreted in an active form, permitting rapid detection and purification. Physical and kinetic properties of rMnP were similar to those of the native protein. The A. oryzae expression system is well suited for both mechanistic and site-directed mutagenesis studies. 34 refs., 7 figs., 1 tab.
Epithelial organization and cyst lumen expansion require efficient Sec13-Sec31-driven secretion.
Townley, Anna K; Schmidt, Katy; Hodgson, Lorna; Stephens, David J
2012-02-01
Epithelial morphogenesis is directed by interactions with the underlying extracellular matrix. Secretion of collagen and other matrix components requires efficient coat complex II (COPII) vesicle formation at the endoplasmic reticulum. Here, we show that suppression of the outer layer COPII component, Sec13, in zebrafish embryos results in a disorganized gut epithelium. In human intestinal epithelial cells (Caco-2), Sec13 depletion causes defective epithelial polarity and organization on permeable supports. Defects are seen in the ability of cells to adhere to the substrate, form a monolayer and form intercellular junctions. When embedded in a three-dimensional matrix, Sec13-depleted Caco-2 cells form cysts but, unlike controls, are defective in lumen expansion. Incorporation of primary fibroblasts within the three-dimensional culture substantially restores normal morphogenesis. We conclude that efficient COPII-dependent secretion, notably assembly of Sec13-Sec31, is required to drive epithelial morphogenesis in both two- and three-dimensional cultures in vitro, as well as in vivo. Our results provide insight into the role of COPII in epithelial morphogenesis and have implications for the interpretation of epithelial polarity and organization assays in cell culture.
Epithelial organization and cyst lumen expansion require efficient Sec13–Sec31-driven secretion
Townley, Anna K.; Schmidt, Katy; Hodgson, Lorna; Stephens, David J.
2012-01-01
Epithelial morphogenesis is directed by interactions with the underlying extracellular matrix. Secretion of collagen and other matrix components requires efficient coat complex II (COPII) vesicle formation at the endoplasmic reticulum. Here, we show that suppression of the outer layer COPII component, Sec13, in zebrafish embryos results in a disorganized gut epithelium. In human intestinal epithelial cells (Caco-2), Sec13 depletion causes defective epithelial polarity and organization on permeable supports. Defects are seen in the ability of cells to adhere to the substrate, form a monolayer and form intercellular junctions. When embedded in a three-dimensional matrix, Sec13-depleted Caco-2 cells form cysts but, unlike controls, are defective in lumen expansion. Incorporation of primary fibroblasts within the three-dimensional culture substantially restores normal morphogenesis. We conclude that efficient COPII-dependent secretion, notably assembly of Sec13–Sec31, is required to drive epithelial morphogenesis in both two- and three-dimensional cultures in vitro, as well as in vivo. Our results provide insight into the role of COPII in epithelial morphogenesis and have implications for the interpretation of epithelial polarity and organization assays in cell culture. PMID:22331354
Kohler, Petra L; Hamilton, Holly L; Cloud-Hansen, Karen; Dillard, Joseph P
2007-08-01
Type IV secretion systems require peptidoglycan lytic transglycosylases for efficient secretion, but the function of these enzymes is not clear. The type IV secretion system gene cluster of Neisseria gonorrhoeae encodes two peptidoglycan transglycosylase homologues. One, LtgX, is similar to peptidoglycan transglycosylases from other type IV secretion systems. The other, AtlA, is similar to endolysins from bacteriophages and is not similar to any described type IV secretion component. We characterized the enzymatic function of AtlA in order to examine its role in the type IV secretion system. Purified AtlA was found to degrade macromolecular peptidoglycan and to produce 1,6-anhydro peptidoglycan monomers, characteristic of lytic transglycosylase activity. We found that AtlA can functionally replace the lambda endolysin to lyse Escherichia coli. In contrast, a sensitive measure of lysis demonstrated that AtlA does not lyse gonococci expressing it or gonococci cocultured with an AtlA-expressing strain. The gonococcal type IV secretion system secretes DNA during growth. A deletion of ltgX or a substitution in the putative active site of AtlA severely decreased DNA secretion. These results indicate that AtlA and LtgX are actively involved in type IV secretion and that AtlA is not involved in lysis of gonococci to release DNA. This is the first demonstration that a type IV secretion peptidoglycanase has lytic transglycosylase activity. These data show that AtlA plays a role in type IV secretion of DNA that requires peptidoglycan breakdown without cell lysis.
Freitas, Mariella B; Queiroz, Joicy F; Dias Gomes, Carolinne I; Collares-Buzato, Carla B; Barbosa, Helena C; Boschero, Antonio C; Gonçalves, Carlos A; Pinheiro, Eliana C
2013-03-01
Susceptibility during fasting has been reported for the common vampire bat (Desmodus rotundus), to the point of untimely deaths after only 2-3 nights of fasting. To investigate the underlying physiology of this critical metabolic condition, we analyzed serum insulin levels, pancreatic islets morphometry and immunocytochemistry (ICC), static insulin secretion in pancreas fragments, and insulin signaling mechanism in male vampire bats. A glucose tolerance test (ipGTT) was also performed. Serum insulin was found to be lower in fed vampires compared to other mammals, and was significantly reduced after 24h fasting. Morphometrical analyses revealed small irregular pancreatic islets with reduced percentage of β-cell mass compared to other bats. Static insulin secretion analysis showed that glucose-stimulated insulin secretion was impaired, as insulin levels did not reach significance under high glucose concentrations, whereas the response to the amino acid leucin was preserved. Results from ipGTT showed a failure on glucose clearance, indicating glucose intolerance due to diminished pancreatic insulin secretion and/or decreased β-cell response to glucose. In conclusion, data presented here indicate lower insulinemia and impaired insulin secretion in D. rotundus, which is consistent with the limited ability to store body energy reserves, previously reported in these animals. Whether these metabolic and hormonal features are associated with their blood diet remains to be determined. The peculiar food sharing through blood regurgitation, reported to this species, might be an adaptive mechanism overcoming this metabolic susceptibility. Copyright © 2012 Elsevier Inc. All rights reserved.
The general theory of three-party quantum secret sharing protocols over phase-damping channels
NASA Astrophysics Data System (ADS)
Song, Ting-Ting; Wen, Qiao-Yan; Qin, Su-Juan; Zhang, Wei-Wei; Sun, Ying
2013-10-01
The general theory of three-party QSS protocols with the noisy quantum channels is discussed. When the particles are transmitted through the noisy quantum channels, the initial pure three-qubit tripartite entangled states would be changed into mixed states. We analyze the security of QSS protocols with the different kinds of three-qubit tripartite entangled states under phase-damping channels and figure out, for different kinds of initial states, the successful probabilities that Alice's secret can be recovered by legal agents are different. Comparing with one recent QSS protocol based on GHZ states, our scheme is secure, and has a little smaller key rate than that of the recent protocol.
Marie, Corinne; Deakin, William J; Viprey, Virginie; Kopciñska, Joanna; Golinowski, Wladyslaw; Krishnan, Hari B; Perret, Xavier; Broughton, William J
2003-09-01
The nitrogen-fixing symbiotic bacterium Rhizobium species NGR234 secretes, via a type III secretion system (TTSS), proteins called Nops (nodulation outer proteins). Abolition of TTSS-dependent protein secretion has either no effect or leads to a change in the number of nodules on selected plants. More dramatically, Nops impair nodule development on Crotalaria juncea roots, resulting in the formation of nonfixing pseudonodules. A double mutation of nopX and nopL, which code for two previously identified secreted proteins, leads to a phenotype on Pachyrhizus tuberosus differing from that of a mutant in which the TTSS is not functional. Use of antibodies and a modification of the purification protocol revealed that NGR234 secretes additional proteins in a TTSS-dependent manner. One of them was identified as NopA, a small 7-kDa protein. Single mutations in nopX and nopL were also generated to assess the involvement of each Nop in protein secretion and nodule formation. Mutation of nopX had little effect on NopL and NopA secretion but greatly affected the interaction of NGR234 with many plant hosts tested. NopL was not necessary for the secretion of any Nops but was required for efficient nodulation of some plant species. NopL may thus act as an effector protein whose recognition is dependent upon the hosts' genetic background.
Floral and vegetative cues in oil-secreting and non-oil-secreting Lysimachia species
Schäffler, I.; Balao, F.; Dötterl, S.
2012-01-01
Background and Aims Unrelated plants pollinated by the same group or guild of animals typically evolve similar floral cues due to pollinator-mediated selection. Related plant species, however, may possess similar cues either as a result of pollinator-mediated selection or as a result of sharing a common ancestor that possessed the same cues or traits. In this study, visual and olfactory floral cues in Lysimachia species exhibiting different pollination strategies were analysed and compared, and the importance of pollinators and phylogeny on the evolution of these floral cues was determined. For comparison, cues of vegetative material were examined where pollinator selection would not be expected. Methods Floral and vegetative scents and colours in floral oil- and non-floral oil-secreting Lysimachia species were studied by chemical and spectrophotometric analyses, respectively, compared between oil- and non-oil-secreting species, and analysed by phylogenetically controlled methods. Key Results Vegetative and floral scent was species specific, and variability in floral but not vegetative scent was lower in oil compared with non-oil species. Overall, oil species did not differ in their floral or vegetative scent from non-oil species. However, a correlation was found between oil secretion and six floral scent constituents specific to oil species, whereas the presence of four other floral compounds can be explained by phylogeny. Four of the five analysed oil species had bee-green flowers and the pattern of occurrence of this colour correlated with oil secretion. Non-oil species had different floral colours. The colour of leaves was similar among all species studied. Conclusions Evidence was found for correlated evolution between secretion of floral oils and floral but not vegetative visual and olfactory cues. The cues correlating with oil secretion were probably selected by Macropis bees, the specialized pollinators of oil-secreting Lysimachia species, and may have evolved in order to attract these bees. PMID:22634256
ERIC Educational Resources Information Center
Morris, Lisa
2012-01-01
Master teacher Lisa Morris invites you to share her secrets of success with writer's workshops. After years of experimenting with the workshop model, she has developed the most effective ways to apply it in the classroom, yielding higher test scores and increased student engagement. Through practical, step-by-step instruction, Morris demonstrates…
ERIC Educational Resources Information Center
Wasburn-Moses, Leah
2009-01-01
In this article, the author offers some success secrets of the stars for fitting into one's research again after the baby. The author has some experience to share, having had her first child as a high school teacher, her second as an ABD (all-but-dissertation) graduate student, and now her third as an assistant professor at a research-intensive…
The Rosenberg Trial: Uncovering the Layers of History
ERIC Educational Resources Information Center
Ragsdale, Bruce A.
2013-01-01
The trial of Julius and Ethel Rosenberg on charges of conspiring to spy for the Soviet Union remains one of the defining moments of the Cold War era. The dramatic allegations of stolen atomic secrets and networks of Communist spies riveted the public's attention. The determination of government prosecutors reflected a widely shared belief that the…
USDA-ARS?s Scientific Manuscript database
Plant class IV chitinases are composed of a carboxy-terminal chitinase domain that is attached, through a linker sequence, to a small amino-terminal domain that can be thought of as a structured peptide. While both the peptide-like domain and the chitinase domain share sequence homology throughout m...
A gatekeeper chaperone complex directs translocator secretion during Type Three Secretion
Archuleta, Tara L.; Spiller, Benjamin W.; Kubori, Tomoko
2014-11-06
Many Gram-negative bacteria use Type Three Secretion Systems (T3SS) to deliver effector proteins into host cells. These protein delivery machines are composed of cytosolic components that recognize substrates and generate the force needed for translocation, the secretion conduit, formed by a needle complex and associated membrane spanning basal body, and translocators that form the pore in the target cell. A defined order of secretion in which needle component proteins are secreted first, followed by translocators, and finally effectors, is necessary for this system to be effective. While the secreted effectors vary significantly between organisms, the ~20 individual protein components thatmore » form the T3SS are conserved in many pathogenic bacteria. One such conserved protein, referred to as either a plug or gatekeeper, is necessary to prevent unregulated effector release and to allow efficient translocator secretion. The mechanism by which translocator secretion is promoted while effector release is inhibited by gatekeepers is unknown. We present the structure of the Chlamydial gatekeeper, CopN, bound to a translocator-specific chaperone. The structure identifies a previously unknown interface between gatekeepers and translocator chaperones and reveals that in the gatekeeper-chaperone complex the canonical translocator-binding groove is free to bind translocators. Thus, structure-based mutagenesis of the homologous complex in Shigella reveals that the gatekeeper-chaperone-translocator complex is essential for translocator secretion and for the ordered secretion of translocators prior to effectors.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yokawa, Satoru; School of Pharmacy, Aichi Gakuin University, Nagoya 464-8650; Suzuki, Takahiro
We have firstly visualized glucagon secretion using a method of video-rate bioluminescence imaging. The fusion protein of proglucagon and Gaussia luciferase (PGCG-GLase) was used as a reporter to detect glucagon secretion and was efficiently expressed in mouse pancreatic α cells (αTC1.6) using a preferred human codon-optimized gene. In the culture medium of the cells expressing PGCG-GLase, luminescence activity determined with a luminometer was increased with low glucose stimulation and KCl-induced depolarization, as observed for glucagon secretion. From immunochemical analyses, PGCG-GLase stably expressed in clonal αTC1.6 cells was correctly processed and released by secretory granules. Luminescence signals of the secreted PGCG-GLase frommore » the stable cells were visualized by video-rate bioluminescence microscopy. The video images showed an increase in glucagon secretion from clustered cells in response to stimulation by KCl. The secretory events were observed frequently at the intercellular contact regions. Thus, the localization and frequency of glucagon secretion might be regulated by cell-cell adhesion. - Highlights: • The fused protein of proglucagon to Gaussia luciferase was used as a reporter. • The fusion protein was highly expressed using a preferred human-codon optimized gene. • Glucagon secretion stimulated by depolarization was determined by luminescence. • Glucagon secretion in α cells was visualized by bioluminescence imaging. • Glucagon secretion sites were localized in the intercellular contact regions.« less
Fay, Nicolas; Walker, Bradley; Swoboda, Nik; Garrod, Simon
2018-05-01
Human cognition and behavior are dominated by symbol use. This paper examines the social learning strategies that give rise to symbolic communication. Experiment 1 contrasts an individual-level account, based on observational learning and cognitive bias, with an inter-individual account, based on social coordinative learning. Participants played a referential communication game in which they tried to communicate a range of recurring meanings to a partner by drawing, but without using their conventional language. Individual-level learning, via observation and cognitive bias, was sufficient to produce signs that became increasingly effective, efficient, and shared over games. However, breaking a referential precedent eliminated these benefits. The most effective, most efficient, and most shared signs arose when participants could directly interact with their partner, indicating that social coordinative learning is important to the creation of shared symbols. Experiment 2 investigated the contribution of two distinct aspects of social interaction: behavior alignment and concurrent partner feedback. Each played a complementary role in the creation of shared symbols: Behavior alignment primarily drove communication effectiveness, and partner feedback primarily drove the efficiency of the evolved signs. In conclusion, inter-individual social coordinative learning is important to the evolution of effective, efficient, and shared symbols. Copyright © 2018 Cognitive Science Society, Inc.
Novel mechanism of gene transfection by low-energy shock wave.
Ha, Chang Hoon; Lee, Seok Cheol; Kim, Sunghyen; Chung, Jihwa; Bae, Hasuk; Kwon, Kihwan
2015-08-05
Extracorporeal shock wave (SW) therapy has been studied in the transfection of naked nucleic acids into various cell lines through the process of sonoporation, a process that affects the permeation of cell membranes, which can be an effect of cavitation. In this study, siRNAs were efficiently transfected into primary cultured cells and mouse tumor tissue via SW treatment. Furthermore SW-induced siRNA transfection was not mediated by SW-induced sonoporation, but by microparticles (MPs) secreted from the cells. Interestingly, the transfection effect of the siRNAs was transferable through the secreted MPs from human umbilical vein endothelial cell (HUVEC) culture medium after treatment with SW, into HUVECs in another culture plate without SW treatment. In this study, we suggest for the first time a mechanism of gene transfection induced by low-energy SW through secreted MPs, and show that it is an efficient physical gene transfection method in vitro and represents a safe therapeutic strategy for site-specific gene delivery in vivo.
Genetic Architecture Promotes the Evolution and Maintenance of Cooperation
Frénoy, Antoine; Taddei, François; Misevic, Dusan
2013-01-01
When cooperation has a direct cost and an indirect benefit, a selfish behavior is more likely to be selected for than an altruistic one. Kin and group selection do provide evolutionary explanations for the stability of cooperation in nature, but we still lack the full understanding of the genomic mechanisms that can prevent cheater invasion. In our study we used Aevol, an agent-based, in silico genomic platform to evolve populations of digital organisms that compete, reproduce, and cooperate by secreting a public good for tens of thousands of generations. We found that cooperating individuals may share a phenotype, defined as the amount of public good produced, but have very different abilities to resist cheater invasion. To understand the underlying genetic differences between cooperator types, we performed bio-inspired genomics analyses of our digital organisms by recording and comparing the locations of metabolic and secretion genes, as well as the relevant promoters and terminators. Association between metabolic and secretion genes (promoter sharing, overlap via frame shift or sense-antisense encoding) was characteristic for populations with robust cooperation and was more likely to evolve when secretion was costly. In mutational analysis experiments, we demonstrated the potential evolutionary consequences of the genetic association by performing a large number of mutations and measuring their phenotypic and fitness effects. The non-cooperating mutants arising from the individuals with genetic association were more likely to have metabolic deleterious mutations that eventually lead to selection eliminating such mutants from the population due to the accompanying fitness decrease. Effectively, cooperation evolved to be protected and robust to mutations through entangled genetic architecture. Our results confirm the importance of second-order selection on evolutionary outcomes, uncover an important genetic mechanism for the evolution and maintenance of cooperation, and suggest promising methods for preventing gene loss in synthetically engineered organisms. PMID:24278000
Zhu, D; Ravindranath, M H; Terasaki, P I; Miyazaki, T; Pham, T; Jucaud, V
2014-08-01
B memory cells remain in circulation and secrete alloantibodies without antigen exposure > 20 years after alloimmunization postpartum or by transplantation. These long-lived B cells are resistant to cytostatic drugs. Therapeutically, intravenous immunoglobulin (IVIg) is administered to reduce allo-human leucocyte antigen (HLA) antibodies pre- and post-transplantation, but the mechanism of reduction remains unclear. Recently, we reported that IVIg reacts with several HLA-I alleles and the HLA reactivity of IVIg is lost after its HLA-E reactivity is adsorbed out. Therefore, we have generated an anti-HLA-E monoclonal antibody that mimics the HLA-reactivity of IVIg to investigate whether this antibody suppresses IgG secretion, as does IVIg. B cells were purified from the blood of a woman in whose blood the B memory cells remained without antigen exposure > 20 years after postpartum alloimmunization. The B cells were stimulated with cytokines using a well-defined culture system. The anti-HLA-E monoclonal antibody (mAb) significantly suppressed the allo-HLA class-II IgG produced by the B cells, and that this suppression was far superior to that by IVIg. These findings were confirmed with HLA-I antibody secreted by the immortalized B cell line, developed from the blood of another alloimmunized woman. The binding affinity of the anti-HLA-E mAb for peptide sequences shared (i.e. shared epitopes) between HLA-E and other β2-microglobulin-free HLA heavy chains (open conformers) on the cell surface of B cells may act as a ligand and signal suppression of IgG production of activated B memory cells. We propose that anti-HLA-E monoclonal antibody may also be useful to suppress allo-HLA IgG production in vivo. © 2014 British Society for Immunology.
2010-01-01
Background Burkholderia pseudomallei is the causative agent of melioidosis where the highest reported incidence world wide is in the Northeast of Thailand, where saline soil and water are prevalent. Moreover, recent reports indicate a potential pathogenic role for B. pseudomallei in cystic fibrosis lung disease, where an increased sodium chloride (NaCl) concentration in airway surface liquid has been proposed. These observations raise the possibility that high salinity may represent a favorable niche for B. pseudomallei. We therefore investigated the global transcriptional response of B. pseudomallei to increased salinity using microarray analysis. Results Transcriptome analysis of B. pseudomallei under salt stress revealed several genes significantly up-regulated in the presence of 320 mM NaCl including genes associated with the bsa-derived Type III secretion system (T3SS). Microarray data were verified by reverse transcriptase-polymerase chain reactions (RT-PCR). Western blot analysis confirmed the increased expression and secretion of the invasion-associated type III secreted proteins BipD and BopE in B. pseudomallei cultures at 170 and 320 mM NaCl relative to salt-free medium. Furthermore, salt-treated B. pseudomallei exhibited greater invasion efficiency into the lung epithelial cell line A549 in a manner partly dependent on a functional Bsa system. Conclusions B. pseudomallei responds to salt stress by modulating the transcription of a relatively small set of genes, among which is the bsa locus associated with invasion and virulence. Expression and secretion of Bsa-secreted proteins was elevated in the presence of exogenous salt and the invasion efficiency was enhanced. Our data indicate that salinity has the potential to influence the virulence of B. pseudomallei. PMID:20540813
Labra, Álvaro; Arredondo-Zelada, Oscar; Flores-Herrera, Patricio; Marshall, Sergio H; Gómez, Fernando A
2016-03-01
Piscirickettsia salmonis seriously affects the Chilean salmon industry. The bacterium is phylogenetically related to Legionella pneumophila and Coxiella burnetii, sharing a Dot/Icm secretion system with them. Although it is well documented that L. pneumophila and C. burnetii secrete different virulence effectors via this Dot/Icm system in order to attenuate host cell responses, to date there have been no reported virulence effectors secreted by the Dot/Icm system of P. salmonis. Using several annotations of P. salmonis genome, here we report an in silico analyses of 4 putative Dot/Icm effectors. Three of them contain ankyrin repeat domains and the typical conserved 3D structures of this protein family. The fourth one is highly similar to one of the Dot/Icm-dependent effectors of L. pneumophila. Additionally, all the potential P. salmonis effectors contain a classical Dot/Icm secretion signal in their C-terminus, consisting of: an E-Block, a hydrophobic residue in -3 or -4 and an electronegative charge. Finally, qPCR analysis demonstrated that these proteins are overexpressed early in infection, perhaps contributing to the generation of a replicative vacuole, a key step in the neutralizing strategy proposed for the Dot/Icm system. In summary, this report identifies four Dot/Icm-dependent effectors in P. salmonis. Copyright © 2015 Elsevier Ltd. All rights reserved.
Secrets and disclosure in donor conception.
Frith, Lucy; Blyth, Eric; Crawshaw, Marilyn; van den Akker, Olga
2018-01-01
This article considers the disclosure, sharing and exchange of information on being donor conceived within families, drawing on data from a study undertaken with donor-conceived adults registered with UK Donor Link (a voluntary DNA-linking register). This paper considers the narratives of how respondents found out they were donor-conceived and what events triggered disclosure of this information. This paper then goes on to examine the role secrecy played in their family life and uses the concept of 'display' to explore how secrecy affected their relationships with their immediate and extended family. Secrets are notoriously 'leaky' and we found complex patterns of knowing and uncertainty about whom in the family knew that the person was donor-conceived. We argue that what is kept secret and from whom provides insights into the multifaceted web of social relationships that can be created by donor-conception, and how knowledge can be managed and controlled in attempts to display and maintain family narratives of biogenetic connection. © 2017 Foundation for the Sociology of Health & Illness.
Profiling Synaptic Proteins Identifies Regulators of Insulin Secretion and Lifespan
Kaplan, Joshua M.
2008-01-01
Cells are organized into distinct compartments to perform specific tasks with spatial precision. In neurons, presynaptic specializations are biochemically complex subcellular structures dedicated to neurotransmitter secretion. Activity-dependent changes in the abundance of presynaptic proteins are thought to endow synapses with different functional states; however, relatively little is known about the rules that govern changes in the composition of presynaptic terminals. We describe a genetic strategy to systematically analyze protein localization at Caenorhabditis elegans presynaptic specializations. Nine presynaptic proteins were GFP-tagged, allowing visualization of multiple presynaptic structures. Changes in the distribution and abundance of these proteins were quantified in 25 mutants that alter different aspects of neurotransmission. Global analysis of these data identified novel relationships between particular presynaptic components and provides a new method to compare gene functions by identifying shared protein localization phenotypes. Using this strategy, we identified several genes that regulate secretion of insulin-like growth factors (IGFs) and influence lifespan in a manner dependent on insulin/IGF signaling. PMID:19043554
Akeda, Yukihiro; Okayama, Kanna; Kimura, Tomomi; Dryselius, Rikard; Kodama, Toshio; Oishi, Kazunori; Iida, Tetsuya; Honda, Takeshi
2009-07-01
Vibrio parahaemolyticus causes human gastroenteritis. Genomic sequencing of this organism has revealed that it has two sets of type III secretion systems, T3SS1 and T3SS2, both of which are important for its pathogenicity. However, the mechanism of protein secretion via T3SSs is unknown. A characteristic of many effectors is that they require specific chaperones for efficient delivery via T3SSs; however, no chaperone has been experimentally identified in the T3SSs of V. parahaemolyticus. In this study, we identified candidate T3SS1-associated chaperones from genomic sequence data and examined their roles in effector secretion/translocation and binding to their cognate substrates. From these experiments, we concluded that there is a T3S-associated chaperone, VecA, for a cytotoxic T3SS1-dependent effector, VepA. Further analysis using pulldown and secretion assays characterized the chaperone-binding domain encompassing the first 30-100 amino acids and an amino terminal secretion signal encompassing the first 5-20 amino acids on VepA. These findings will provide a strategy to clarify how the T3SS1 of V. parahaemolyticus secretes its specific effectors.
Efficient generation of monoclonal antibodies from single rhesus macaque antibody secreting cells.
Meng, Weixu; Li, Leike; Xiong, Wei; Fan, Xuejun; Deng, Hui; Bett, Andrew J; Chen, Zhifeng; Tang, Aimin; Cox, Kara S; Joyce, Joseph G; Freed, Daniel C; Thoryk, Elizabeth; Fu, Tong-Ming; Casimiro, Danilo R; Zhang, Ningyan; A Vora, Kalpit; An, Zhiqiang
2015-01-01
Nonhuman primates (NHPs) are used as a preclinical model for vaccine development, and the antibody profiles to experimental vaccines in NHPs can provide critical information for both vaccine design and translation to clinical efficacy. However, an efficient protocol for generating monoclonal antibodies from single antibody secreting cells of NHPs is currently lacking. In this study we established a robust protocol for cloning immunoglobulin (IG) variable domain genes from single rhesus macaque (Macaca mulatta) antibody secreting cells. A sorting strategy was developed using a panel of molecular markers (CD3, CD19, CD20, surface IgG, intracellular IgG, CD27, Ki67 and CD38) to identify the kinetics of B cell response after vaccination. Specific primers for the rhesus macaque IG genes were designed and validated using cDNA isolated from macaque peripheral blood mononuclear cells. Cloning efficiency was averaged at 90% for variable heavy (VH) and light (VL) domains, and 78.5% of the clones (n = 335) were matched VH and VL pairs. Sequence analysis revealed that diverse IGHV subgroups (for VH) and IGKV and IGLV subgroups (for VL) were represented in the cloned antibodies. The protocol was tested in a study using an experimental dengue vaccine candidate. About 26.6% of the monoclonal antibodies cloned from the vaccinated rhesus macaques react with the dengue vaccine antigens. These results validate the protocol for cloning monoclonal antibodies in response to vaccination from single macaque antibody secreting cells, which have general applicability for determining monoclonal antibody profiles in response to other immunogens or vaccine studies of interest in NHPs.
Counterfactual quantum key distribution with high efficiency
NASA Astrophysics Data System (ADS)
Sun, Ying; Wen, Qiao-Yan
2010-11-01
In a counterfactual quantum key distribution scheme, a secret key can be generated merely by transmitting the split vacuum pulses of single particles. We improve the efficiency of the first quantum key distribution scheme based on the counterfactual phenomenon. This scheme not only achieves the same security level as the original one but also has higher efficiency. We also analyze how to achieve the optimal efficiency under various conditions.
Counterfactual quantum key distribution with high efficiency
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sun Ying; Beijing Electronic Science and Technology Institute, Beijing 100070; Wen Qiaoyan
2010-11-15
In a counterfactual quantum key distribution scheme, a secret key can be generated merely by transmitting the split vacuum pulses of single particles. We improve the efficiency of the first quantum key distribution scheme based on the counterfactual phenomenon. This scheme not only achieves the same security level as the original one but also has higher efficiency. We also analyze how to achieve the optimal efficiency under various conditions.
E-cadherin and cell adhesion: a role in architecture and function in the pancreatic islet.
Rogers, Gareth J; Hodgkin, Matthew N; Squires, Paul E
2007-01-01
The efficient secretion of insulin from beta-cells requires extensive intra-islet communication. The cell surface adhesion protein epithelial (E)-cadherin (ECAD) establishes and maintains epithelial tissues such as the islets of Langerhans. In this study, the role of ECAD in regulating insulin secretion from pseudoislets was investigated. The effect of an immuno-neutralising ECAD on gross morphology, cytosolic calcium signalling, direct cell-to-cell communication and insulin secretion was assessed by fura-2 microfluorimetry, Lucifer Yellow dye injection and insulin ELISA in an insulin-secreting model system. Antibody blockade of ECAD reduces glucose-evoked changes in [Ca(2+)](i) and insulin secretion. Neutralisation of ECAD causes a breakdown in the glucose-stimulated synchronicity of calcium oscillations between discrete regions within the pseudoislet, and the transfer of dye from an individual cell within a cell cluster is attenuated in the absence of ECAD ligation, demonstrating that gap junction communication is disrupted. The functional consequence of neutralising ECAD is a significant reduction in insulin secretion. Cell adhesion via ECAD has distinct roles in the regulation of intercellular communication between beta-cells within islets, with potential repercussions for insulin secretion.
Akeda, Yukihiro; Kodama, Toshio; Saito, Kazunobu; Iida, Tetsuya; Oishi, Kazunori; Honda, Takeshi
2011-11-01
The enteropathogen Vibrio parahaemolyticus possesses two sets of type III secretion systems, T3SS1 and T3SS2. Effector proteins secreted by these T3SSs are delivered into host cells, leading to cell death or diarrhea. However, it is not known how specific effectors are secreted through a specific T3SS when both T3SSs are expressed within bacteria. One molecule thought to determine secretion specificity is a T3SS-associated chaperone; however, no T3SS2-specific chaperone has been identified. Therefore, we screened T3SS2 chaperone candidates by a pull-down assay using T3SS2 effectors fused with glutathione-S-transferase. A secretion assay revealed that the newly identified cognate chaperone VocC for the T3SS2-specific effector VopC was required for the efficient secretion of the substrate through T3SS2. Further experiments determined the chaperone-binding domain and the amino-terminal secretion signal of the cognate effector. These findings, in addition to the previously identified T3SS1-specific chaperone, VecA, provide a strategy to clarify the specificity of effector secretion through T3SSs of V. parahaemolyticus. 2011 Federation of European Microbiological Societies. Published by Blackwell Publishing Ltd. All rights reserved.
It is the “starting over” part that is so hard
Washington, Karla; Oliver, Debra Parker; Shaunfield, Sara; Gage, L. Ashley; Mooney, Megan; Lewis, Alexandria
2013-01-01
Although hospices are required to provide caregivers with formal bereavement support when their loved one passes, most bereavement interventions lack standardization and remain untested. The Dual Processing Model of Bereavement was used as a theoretical framework for assessing the potential of a Secret Facebook Group for bereaved hospice caregivers. Online communication was analyzed and reported outcome measures were compared pre and post intervention. Bereaved caregivers shared abrupt and anticipated triggers resulting in loss-orientation and shared restoration through storytelling, advising, and encouragement. Caregiver anxiety and depression were lower post intervention. This study highlights the promise of Facebook for hospice bereavement support. PMID:24559689
Dul, J L; Argon, Y
1990-01-01
Although immunoglobulin light chains are usually secreted in association with heavy chains, free light chains can be secreted by lymphocytes. To identify the structural features of light chains that are essential for their secretion, we mutated a conserved sequence in the variable domain of a lambda I light chain. The effects of the mutations on secretion were assayed by transient expression in COS-1 cells. One mutant (AV60), which replaced Ala-60 with Val, was secreted as efficiently as wild-type lambda I by transfected COS-1 cells. This result was not surprising because secreted lambda II chains contain valine in this position. However, a second lambda I mutant (AV60FS62), which replaced Phe-62 with Ser as well as Ala-60 with Val, was not secreted. This mutant was arrested in the endoplasmic reticulum, as judged by immunofluorescence and by its association with a lumenal endoplasmic reticulum protein, immunoglobulin heavy chain binding protein (BiP). The defect in secretion was not due to gross misfolding of the lambda I chain, since cells cotransfected with AV60FS62 and an immunoglobulin heavy chain gene produced functional antigen-binding antibodies. These assembled IgM molecules were still not secreted. Hence, the replacement of Phe-62 with Ser specifically affects a determinant on the lambda I light chain that is necessary for the intracellular transport of this molecule. Images PMID:2122454
DBSecSys 2.0: a database of Burkholderia mallei and Burkholderia pseudomallei secretion systems.
Memišević, Vesna; Kumar, Kamal; Zavaljevski, Nela; DeShazer, David; Wallqvist, Anders; Reifman, Jaques
2016-09-20
Burkholderia mallei and B. pseudomallei are the causative agents of glanders and melioidosis, respectively, diseases with high morbidity and mortality rates. B. mallei and B. pseudomallei are closely related genetically; B. mallei evolved from an ancestral strain of B. pseudomallei by genome reduction and adaptation to an obligate intracellular lifestyle. Although these two bacteria cause different diseases, they share multiple virulence factors, including bacterial secretion systems, which represent key components of bacterial pathogenicity. Despite recent progress, the secretion system proteins for B. mallei and B. pseudomallei, their pathogenic mechanisms of action, and host factors are not well characterized. We previously developed a manually curated database, DBSecSys, of bacterial secretion system proteins for B. mallei. Here, we report an expansion of the database with corresponding information about B. pseudomallei. DBSecSys 2.0 contains comprehensive literature-based and computationally derived information about B. mallei ATCC 23344 and literature-based and computationally derived information about B. pseudomallei K96243. The database contains updated information for 163 B. mallei proteins from the previous database and 61 additional B. mallei proteins, and new information for 281 B. pseudomallei proteins associated with 5 secretion systems, their 1,633 human- and murine-interacting targets, and 2,400 host-B. mallei interactions and 2,286 host-B. pseudomallei interactions. The database also includes information about 13 pathogenic mechanisms of action for B. mallei and B. pseudomallei secretion system proteins inferred from the available literature or computationally. Additionally, DBSecSys 2.0 provides details about 82 virulence attenuation experiments for 52 B. mallei secretion system proteins and 98 virulence attenuation experiments for 61 B. pseudomallei secretion system proteins. We updated the Web interface and data access layer to speed-up users' search of detailed information for orthologous proteins related to secretion systems of the two pathogens. The updates of DBSecSys 2.0 provide unique capabilities to access comprehensive information about secretion systems of B. mallei and B. pseudomallei. They enable studies and comparisons of corresponding proteins of these two closely related pathogens and their host-interacting partners. The database is available at http://dbsecsys.bhsai.org .
A sliding windows approach to analyse the evolution of bank shares in the European Union
NASA Astrophysics Data System (ADS)
Ferreira, Paulo; Dionísio, Andreia; Guedes, Everaldo Freitas; Zebende, Gilney Figueira
2018-01-01
Both sub-prime and Eurozone debt crisis problems caused severe financial crisis, which affected European markets in general, but particularly the banking sector. The continuous devaluation of bank shares in the financial sector caused a great decrease in market capitalization, and in citizen and investor confidence. Panic among investors led them to sell shares, while other agents took the opportunity to buy them. Therefore, the study of bank shares is important, particularly of their efficiency. In this paper, adopting a sliding windows detrended fluctuation approach, we analyse the efficiency concept dynamically with 63 European banks (both in and outside the Eurozone). The main results show that the crisis had an effect on changing the efficiency pattern.
Shaulov, Lihi; Gershberg, Jenia; Deng, Wanyin; Finlay, B. Brett
2017-01-01
ABSTRACT The type III secretion system (T3SS) is a multiprotein complex that plays a central role in the virulence of many Gram-negative bacterial pathogens. To ensure that effector proteins are efficiently translocated into the host cell, bacteria must be able to sense their contact with the host cell. In this study, we found that EscP, which was previously shown to function as the ruler protein of the enteropathogenic Escherichia coli T3SS, is also involved in the switch from the secretion of translocator proteins to the secretion of effector proteins. In addition, we demonstrated that EscP can interact with the gatekeeper protein SepL and that the EscP-SepL complex dissociates upon a calcium concentration drop. We suggest a model in which bacterial contact with the host cell is accompanied by a drop in the calcium concentration that causes SepL-EscP complex dissociation and triggers the secretion of effector proteins. PMID:28049143
Hashim, O H; Cushley, W
1988-01-01
The effects of inhibiting selected pairs of oligosaccharide-processing activities upon the secretion of IgM and IgG molecules have been investigated. In the presence of castanospermine (CSP) plus swainsonine (SW) or deoxynojirimycin (dNM) plus deoxymannojirimycin (dMM), secretion of IgM and IgG from rat hybridoma cells was unimpaired relative to control cultures. The structures of the N-linked oligosaccharides found on the Ig heavy chains isolated from treated cells or culture supernatants were shown to be qualitatively different from those associated with control Ig by persistent sensitivity to digestion by endo H. Furthermore, the electrophoretic mobilities of mu and gamma chains on SDS-PAGE derived from treated cells were consistently slower than those of control heavy chains. IgM and IgG were also efficiently secreted when all glucosidase and mannosidase activities were blocked, and the secreted heavy chains bore endo H-sensitive oligosaccharides. The data suggest that Ig secretion from hybridomas can proceed in the absence of N-linked oligosaccharide processing. Images Figure 1 Figure 2 Figure 3 PMID:3350578
Kumar, Dhruv; New, Jacob; Vishwakarma, Vikalp; Joshi, Radhika; Enders, Jonathan; Lin, Fangchen; Dasari, Sumana; Gutierrez, Wade R; Leef, George; Ponnurangam, Sivapriya; Chavan, Hemantkumar; Ganaden, Lydia; Thornton, Mackenzie M; Dai, Hongying; Tawfik, Ossama; Straub, Jeffrey; Shnayder, Yelizaveta; Kakarala, Kiran; Tsue, Terance Ted; Girod, Douglas A; Van Houten, Bennett; Anant, Shrikant; Krishnamurthy, Partha; Thomas, Sufi Mary
2018-05-16
Despite aggressive therapies, head and neck squamous cell carcinoma (HNSCC) is associated with a less than 50% 5-year survival rate. Late stage HNSCC frequently consists of up to 80% cancer-associated fibroblasts (CAF). We previously reported that CAF-secreted hepatocyte growth factor (HGF) facilitates HNSCC progression, however very little is known about the role of CAFs in HNSCC metabolism. Here we demonstrate that CAF-secreted HGF increases extracellular lactate levels in HNSCC via upregulation of glycolysis. CAF-secreted HGF induced basic fibroblast growth factor (bFGF) secretion from HNSCC. CAFs were more efficient than HNSCC in using lactate as a carbon source. HNSCC-secreted bFGF increased mitochondrial oxidative phosphorylation (OXPHOS) and HGF secretion from CAFs. Combined inhibition of c-Met and FGFR significantly inhibited CAF-induced HNSCC growth in vitro and in vivo (p<0.001). Our cumulative findings underscore reciprocal signaling between CAF and HNSCC involving bFGF and HGF. This contributes to metabolic symbiosis and a targetable therapeutic axis involving c-Met and FGFR. Copyright ©2018, American Association for Cancer Research.
Prestigiacomo, Jennifer
2011-11-01
Getting effective stakeholder engagement, including that of payers, and creating innovative value-added services that provide alternate revenue streams beyond basic subscription services, are just a couple of the common traits of the flourishing health information exchanges profiled in the sustainability report released in August by the National eHealth Collaborative.
A strategic plan for forest research and development in the south
Richard A. Harper; Cassandra Johnson; H. Michael Rauscher; Carol Whitlock
2007-01-01
In many ways, the southern region of the United States is our nation's best kept secret. Although each is unique, the 13 southern States from Virginia to Texas share several important attributes: long growing seasons and plentiful water, close-knit communities with strong ties to the land, terrains ranging from lush wetlands to rolling hills to sheltering...
Nonclassicality thresholds for multiqubit states: Numerical analysis
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gruca, Jacek; Zukowski, Marek; Laskowski, Wieslaw
2010-07-15
States that strongly violate Bell's inequalities are required in many quantum-informational protocols as, for example, in cryptography, secret sharing, and the reduction of communication complexity. We investigate families of such states with a numerical method which allows us to reveal nonclassicality even without direct knowledge of Bell's inequalities for the given problem. An extensive set of numerical results is presented and discussed.
Morselli, Lisa L; Gamazon, Eric R; Tasali, Esra; Cox, Nancy J; Van Cauter, Eve; Davis, Lea K
2018-01-01
Over the past 20 years, a large body of experimental and epidemiologic evidence has linked sleep duration and quality to glucose homeostasis, although the mechanistic pathways remain unclear. The aim of the current study was to determine whether genetic variation influencing both sleep and glucose regulation could underlie their functional relationship. We hypothesized that the genetic regulation of electroencephalographic (EEG) activity during non-rapid eye movement sleep, a highly heritable trait with fingerprint reproducibility, is correlated with the genetic control of metabolic traits including insulin sensitivity and β-cell function. We tested our hypotheses through univariate and bivariate heritability analyses in a three-generation pedigree with in-depth phenotyping of both sleep EEG and metabolic traits in 48 family members. Our analyses accounted for age, sex, adiposity, and the use of psychoactive medications. In univariate analyses, we found significant heritability for measures of fasting insulin sensitivity and β-cell function, for time spent in slow-wave sleep, and for EEG spectral power in the delta, theta, and sigma ranges. Bivariate heritability analyses provided the first evidence for a shared genetic control of brain activity during deep sleep and fasting insulin secretion rate. © 2017 by the American Diabetes Association.
NASA Astrophysics Data System (ADS)
Wang, Jingtao; Li, Lixiang; Peng, Haipeng; Yang, Yixian
2017-02-01
In this study, we propose the concept of judgment space to investigate the quantum-secret-sharing scheme based on local distinguishability (called LOCC-QSS). Because of the proposing of this conception, the property of orthogonal mutiqudit entangled states under restricted local operation and classical communication (LOCC) can be described more clearly. According to these properties, we reveal that, in the previous (k ,n )-threshold LOCC-QSS scheme, there are two required conditions for the selected quantum states to resist the unambiguous attack: (i) their k -level judgment spaces are orthogonal, and (ii) their (k -1 )-level judgment spaces are equal. Practically, if k
Convergence of the Insulin and Serotonin Programs in the Pancreatic β-Cell
Ohta, Yasuharu; Kosaka, Yasuhiro; Kishimoto, Nina; Wang, Juehu; Smith, Stuart B.; Honig, Gerard; Kim, Hail; Gasa, Rosa M.; Neubauer, Nicole; Liou, Angela; Tecott, Laurence H.; Deneris, Evan S.; German, Michael S.
2011-01-01
OBJECTIVE Despite their origins in different germ layers, pancreatic islet cells share many common developmental features with neurons, especially serotonin-producing neurons in the hindbrain. Therefore, we tested whether these developmental parallels have functional consequences. RESEARCH DESIGN AND METHODS We used transcriptional profiling, immunohistochemistry, DNA-binding analyses, and mouse genetic models to assess the expression and function of key serotonergic genes in the pancreas. RESULTS We found that islet cells expressed the genes encoding all of the products necessary for synthesizing, packaging, and secreting serotonin, including both isoforms of the serotonin synthetic enzyme tryptophan hydroxylase and the archetypal serotonergic transcription factor Pet1. As in serotonergic neurons, Pet1 expression in islets required homeodomain transcription factor Nkx2.2 but not Nkx6.1. In β-cells, Pet1 bound to the serotonergic genes but also to a conserved insulin gene regulatory element. Mice lacking Pet1 displayed reduced insulin production and secretion and impaired glucose tolerance. CONCLUSIONS These studies demonstrate that a common transcriptional cascade drives the differentiation of β-cells and serotonergic neurons and imparts the shared ability to produce serotonin. The interrelated biology of these two cell types has important implications for the pathology and treatment of diabetes. PMID:22013016
Convergence of the insulin and serotonin programs in the pancreatic β-cell.
Ohta, Yasuharu; Kosaka, Yasuhiro; Kishimoto, Nina; Wang, Juehu; Smith, Stuart B; Honig, Gerard; Kim, Hail; Gasa, Rosa M; Neubauer, Nicole; Liou, Angela; Tecott, Laurence H; Deneris, Evan S; German, Michael S
2011-12-01
Despite their origins in different germ layers, pancreatic islet cells share many common developmental features with neurons, especially serotonin-producing neurons in the hindbrain. Therefore, we tested whether these developmental parallels have functional consequences. We used transcriptional profiling, immunohistochemistry, DNA-binding analyses, and mouse genetic models to assess the expression and function of key serotonergic genes in the pancreas. We found that islet cells expressed the genes encoding all of the products necessary for synthesizing, packaging, and secreting serotonin, including both isoforms of the serotonin synthetic enzyme tryptophan hydroxylase and the archetypal serotonergic transcription factor Pet1. As in serotonergic neurons, Pet1 expression in islets required homeodomain transcription factor Nkx2.2 but not Nkx6.1. In β-cells, Pet1 bound to the serotonergic genes but also to a conserved insulin gene regulatory element. Mice lacking Pet1 displayed reduced insulin production and secretion and impaired glucose tolerance. These studies demonstrate that a common transcriptional cascade drives the differentiation of β-cells and serotonergic neurons and imparts the shared ability to produce serotonin. The interrelated biology of these two cell types has important implications for the pathology and treatment of diabetes.
Agnus castus extracts inhibit prolactin secretion of rat pituitary cells.
Sliutz, G; Speiser, P; Schultz, A M; Spona, J; Zeillinger, R
1993-05-01
In our studies on prolactin inhibition by plant extracts we focused on the effects of extracts of Vitex agnus castus and its preparations on rat pituitary cells under basal and stimulated conditions in primary cell culture. Both extracts from Vitex agnus castus as well as synthetic dopamine agonists (Lisuride) significantly inhibit basal as well as TRH-stimulated prolactin secretion of rat pituitary cells in vitro and as a consequence inhibition of prolactin secretion could be blocked by adding a dopamine receptor blocker. Therefore because of its dopaminergic effect Agnus castus could be considered as an efficient alternative phytotherapeutic drug in the treatment of slight hyperprolactinaemia.
Finite key analysis for symmetric attacks in quantum key distribution
DOE Office of Scientific and Technical Information (OSTI.GOV)
Meyer, Tim; Kampermann, Hermann; Kleinmann, Matthias
2006-10-15
We introduce a constructive method to calculate the achievable secret key rate for a generic class of quantum key distribution protocols, when only a finite number n of signals is given. Our approach is applicable to all scenarios in which the quantum state shared by Alice and Bob is known. In particular, we consider the six state protocol with symmetric eavesdropping attacks, and show that for a small number of signals, i.e., below n{approx}10{sup 4}, the finite key rate differs significantly from the asymptotic value for n{yields}{infinity}. However, for larger n, a good approximation of the asymptotic value is found.more » We also study secret key rates for protocols using higher-dimensional quantum systems.« less
Insecurity of position-based quantum-cryptography protocols against entanglement attacks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lau, Hoi-Kwan; Lo, Hoi-Kwong
2011-01-15
Recently, position-based quantum cryptography has been claimed to be unconditionally secure. On the contrary, here we show that the existing proposals for position-based quantum cryptography are, in fact, insecure if entanglement is shared among two adversaries. Specifically, we demonstrate how the adversaries can incorporate ideas of quantum teleportation and quantum secret sharing to compromise the security with certainty. The common flaw to all current protocols is that the Pauli operators always map a codeword to a codeword (up to an irrelevant overall phase). We propose a modified scheme lacking this property in which the same cheating strategy used to underminemore » the previous protocols can succeed with a rate of at most 85%. We prove the modified protocol is secure when the shared quantum resource between the adversaries is a two- or three-level system.« less
Vitamin E Secretion by Caco-2 Monolayers to APOA1, but Not to HDL, Is Vitamer Selective12
Nicod, Nathalie; Parker, Robert S.
2013-01-01
The aim of this study was to characterize the pathways of basolateral secretion of common dietary tocopherols from polarized Caco-2 monolayers, a model of intestinal absorption. Given differences in structure and physical properties, we hypothesized that secretion may differ between different forms of vitamin E, thus potentially contribute to the selectivity seen in vivo. Monolayers were incubated apically and simultaneously with 10 μmol/L α-, γ-, and δ-tocopherol (1:1:1) in lipid micelles. Treatment with the microsomal triglyceride transfer protein inhibitor BMS201038 revealed that the triglyceride-rich particle secretory pathway (apolipoprotein B–dependent pathway) accounted for ∼80% of total tocopherol secretion, without selectivity among the three forms of vitamin E. Apolipoprotein B–independent secretion of tocopherols (and cholesterol) was greatly enhanced by the liver X receptor agonist T0901317. T0901317 induced ATP-binding cassette transporter A1 (ABCA1) protein expression and basolateral secretion of tocopherols to apolipoprotein A1. ABCA1-dependent secretion demonstrated vitamer selectivity such that efficiency of secretion of α- and γ-tocopherols exceeded that of δ-tocopherol. Basal addition of HDL stimulated vitamin E secretion but without selectivity among the three forms, whereas LDL had no effect. Basal addition of scavenger receptor class B member I (SR-BI) blocking antibody, which inhibits the interaction between SR-BI and HDL, increased basal accumulation of all tocopherols, demonstrating a role for SR-BI in cellular re-uptake of secreted vitamin E. These findings demonstrated that vitamin E and cholesterol utilize common pathways of secretion and that secretion via the ABCA1 pathway favors certain forms of vitamin E. PMID:23946344
NASA Astrophysics Data System (ADS)
Soelistijanto, B.; Muliadi, V.
2018-03-01
Diffie-Hellman (DH) provides an efficient key exchange system by reducing the number of cryptographic keys distributed in the network. In this method, a node broadcasts a single public key to all nodes in the network, and in turn each peer uses this key to establish a shared secret key which then can be utilized to encrypt and decrypt traffic between the peer and the given node. In this paper, we evaluate the key transfer delay and cost performance of DH in opportunistic mobile networks, a specific scenario of MANETs where complete end-to-end paths rarely exist between sources and destinations; consequently, the end-to-end delays in these networks are much greater than typical MANETs. Simulation results, driven by a random node movement model and real human mobility traces, showed that DH outperforms a typical key distribution scheme based on the RSA algorithm in terms of key transfer delay, measured by average key convergence time; however, DH performs as well as the benchmark in terms of key transfer cost, evaluated by total key (copies) forwards.
Banchereau, Jacques; Zurawski, Sandra; Thompson-Snipes, LuAnn; Blanck, Jean-Philippe; Clayton, Sandra; Munk, Adiel; Cao, Yanying; Wang, Zhiqing; Khandelwal, Sunaina; Hu, Jiancheng; McCoy, William H.; Palucka, Karolina A.; Reiter, Yoram; Fremont, Daved H.; Zurawski, Gerard; Colonna, Marco; Shaw, Andrey S.; Klechevsky, Eynav
2012-01-01
Human Langerhans cells (LCs) are highly efficient at priming cytolytic CD8+ T cells compared with dermal CD14+ dendritic cells (DCs). Here we show that dermal CD14+ DCs instead prime a fraction of naïve CD8+ T cells into cells sharing the properties of type 2 cytokine-secreting CD8+ T cells (TC2). Differential expression of the CD8-antagonist receptors on dermal CD14+ DCs, the Ig-like transcript (ILT) inhibitory receptors, explains the difference between the two types of DCs. Inhibition of CD8 function on LCs inhibited cytotoxic T lymphocytes (CTLs) and enhanced TC2 generation. In addition, blocking ILT2 or ILT4 on dermal CD14+ DCs enhanced the generation of CTLs and inhibited TC2 cytokine production. Lastly, addition of soluble ILT2 and ILT4 receptors inhibited CTL priming by LCs. Thus, ILT receptor expression explains the polarization of CD8+ T-cell responses by LCs vs. dermal CD14+ DCs. PMID:23112154
Multiplexed Sequence Encoding: A Framework for DNA Communication.
Zakeri, Bijan; Carr, Peter A; Lu, Timothy K
2016-01-01
Synthetic DNA has great propensity for efficiently and stably storing non-biological information. With DNA writing and reading technologies rapidly advancing, new applications for synthetic DNA are emerging in data storage and communication. Traditionally, DNA communication has focused on the encoding and transfer of complete sets of information. Here, we explore the use of DNA for the communication of short messages that are fragmented across multiple distinct DNA molecules. We identified three pivotal points in a communication-data encoding, data transfer & data extraction-and developed novel tools to enable communication via molecules of DNA. To address data encoding, we designed DNA-based individualized keyboards (iKeys) to convert plaintext into DNA, while reducing the occurrence of DNA homopolymers to improve synthesis and sequencing processes. To address data transfer, we implemented a secret-sharing system-Multiplexed Sequence Encoding (MuSE)-that conceals messages between multiple distinct DNA molecules, requiring a combination key to reveal messages. To address data extraction, we achieved the first instance of chromatogram patterning through multiplexed sequencing, thereby enabling a new method for data extraction. We envision these approaches will enable more widespread communication of information via DNA.
Quantum Authencryption with Two-Photon Entangled States for Off-Line Communicants
NASA Astrophysics Data System (ADS)
Ye, Tian-Yu
2016-02-01
In this paper, a quantum authencryption protocol is proposed by using the two-photon entangled states as the quantum resource. Two communicants Alice and Bob share two private keys in advance, which determine the generation of two-photon entangled states. The sender Alice sends the two-photon entangled state sequence encoded with her classical bits to the receiver Bob in the manner of one-step quantum transmission. Upon receiving the encoded quantum state sequence, Bob decodes out Alice's classical bits with the two-photon joint measurements and authenticates the integrity of Alice's secret with the help of one-way hash function. The proposed protocol only uses the one-step quantum transmission and needs neither a public discussion nor a trusted third party. As a result, the proposed protocol can be adapted to the case where the receiver is off-line, such as the quantum E-mail systems. Moreover, the proposed protocol provides the message authentication to one bit level with the help of one-way hash function and has an information-theoretical efficiency equal to 100 %.
Miyazaki, Tamako; Nakata, Katsushi; Nishimura, Takashi; Abe, Shintaro; Yamashita, Tetsuro; Miyazaki, Masao
2018-02-01
The small Indian mongoose (Herpestes auropunctatus) is an invasive species in Okinawa and Amami-Oshima, Japan. Major strategies for their eradication have been the use of baited traps, which suffer from decreasing efficiency with declining populations and the bycatch of native animals. To address these concerns, mongoose-specific lures are required. In this study, we aimed to identify species- and/or sex-specific compounds from anal sac secretions of small Indian mongooses. Volatile compounds emitted from male and female mongoose anal sac secretions were analyzed by thermal desorption-gas chromatography-mass spectrometry. In addition to several fatty acids, 2-phenylethanol was identified as a minor compound, which is uncommon in mammalian secretions but a dominant odorant in roses. Female samples emitted higher levels of 2-phenylethanol than male samples did. These findings indicate that 2-phenylethanol is a female-specific volatile compound of anal sac secretions in small Indian mongooses, and it may be useful as an ingredient of mongoose-specific scent lures.
Heterologous Protein Secretion in Lactobacilli with Modified pSIP Vectors
Karlskås, Ingrid Lea; Maudal, Kristina; Axelsson, Lars; Rud, Ida; Eijsink, Vincent G. H.; Mathiesen, Geir
2014-01-01
We describe new variants of the modular pSIP-vectors for inducible gene expression and protein secretion in lactobacilli. The basic functionality of the pSIP system was tested in Lactobacillus strains representing 14 species using pSIP411, which harbors the broad-host-range Lactococcus lactis SH71rep replicon and a β-glucuronidase encoding reporter gene. In 10 species, the inducible gene expression system was functional. Based on these results, three pSIP vectors with different signal peptides were modified by replacing their narrow-host-range L. plantarum 256rep replicon with SH71rep and transformed into strains of five different species of Lactobacillus. All recombinant strains secreted the target protein NucA, albeit with varying production levels and secretion efficiencies. The Lp_3050 derived signal peptide generally resulted in the highest levels of secreted NucA. These modified pSIP vectors are useful tools for engineering a wide variety of Lactobacillus species. PMID:24614815
Anti-Noise Bidirectional Quantum Steganography Protocol with Large Payload
NASA Astrophysics Data System (ADS)
Qu, Zhiguo; Chen, Siyi; Ji, Sai; Ma, Songya; Wang, Xiaojun
2018-06-01
An anti-noise bidirectional quantum steganography protocol with large payload protocol is proposed in this paper. In the new protocol, Alice and Bob enable to transmit classical information bits to each other while teleporting secret quantum states covertly. The new protocol introduces the bidirectional quantum remote state preparation into the bidirectional quantum secure communication, not only to expand secret information from classical bits to quantum state, but also extract the phase and amplitude values of secret quantum state for greatly enlarging the capacity of secret information. The new protocol can also achieve better imperceptibility, since the eavesdropper can hardly detect the hidden channel or even obtain effective secret quantum states. Comparing with the previous quantum steganography achievements, due to its unique bidirectional quantum steganography, the new protocol can obtain higher transmission efficiency and better availability. Furthermore, the new algorithm can effectively resist quantum noises through theoretical analysis. Finally, the performance analysis proves the conclusion that the new protocol not only has good imperceptibility, high security, but also large payload.
Anti-Noise Bidirectional Quantum Steganography Protocol with Large Payload
NASA Astrophysics Data System (ADS)
Qu, Zhiguo; Chen, Siyi; Ji, Sai; Ma, Songya; Wang, Xiaojun
2018-03-01
An anti-noise bidirectional quantum steganography protocol with large payload protocol is proposed in this paper. In the new protocol, Alice and Bob enable to transmit classical information bits to each other while teleporting secret quantum states covertly. The new protocol introduces the bidirectional quantum remote state preparation into the bidirectional quantum secure communication, not only to expand secret information from classical bits to quantum state, but also extract the phase and amplitude values of secret quantum state for greatly enlarging the capacity of secret information. The new protocol can also achieve better imperceptibility, since the eavesdropper can hardly detect the hidden channel or even obtain effective secret quantum states. Comparing with the previous quantum steganography achievements, due to its unique bidirectional quantum steganography, the new protocol can obtain higher transmission efficiency and better availability. Furthermore, the new algorithm can effectively resist quantum noises through theoretical analysis. Finally, the performance analysis proves the conclusion that the new protocol not only has good imperceptibility, high security, but also large payload.
Zeelenberg, Ingrid S; Ostrowski, Matias; Krumeich, Sophie; Bobrie, Angélique; Jancic, Carolina; Boissonnas, Alexandre; Delcayre, Alain; Le Pecq, Jean-Bernard; Combadière, Béhazine; Amigorena, Sebastian; Théry, Clotilde
2008-02-15
Expression of non-self antigens by tumors can induce activation of T cells in vivo, although this activation can lead to either immunity or tolerance. CD8+ T-cell activation can be direct (if the tumor expresses MHC class I molecules) or indirect (after the capture and cross-presentation of tumor antigens by dendritic cells). The modes of tumor antigen capture by dendritic cells in vivo remain unclear. Here we examine the immunogenicity of the same model antigen secreted by live tumors either in association with membrane vesicles (exosomes) or as a soluble protein. We have artificially addressed the antigen to secreted vesicles by coupling it to the factor VIII-like C1C2 domain of milk fat globule epidermal growth factor-factor VIII (MFG-E8)/lactadherin. We show that murine fibrosarcoma tumor cells that secrete vesicle-bound antigen grow slower than tumors that secrete soluble antigen in immunocompetent, but not in immunodeficient, host mice. This growth difference is due to the induction of a more potent antigen-specific antitumor immune response in vivo by the vesicle-bound than by the soluble antigen. Finally, in vivo secretion of the vesicle-bound antigen either by tumors or by vaccination with naked DNA protects against soluble antigen-secreting tumors. We conclude that the mode of secretion can determine the immunogenicity of tumor antigens and that manipulation of the mode of antigen secretion may be used to optimize antitumor vaccination protocols.
Krtková, Jana; Thomas, Elizabeth B; Alas, Germain C M; Schraner, Elisabeth M; Behjatnia, Habib R; Hehl, Adrian B; Paredez, Alexander R
2016-08-23
Encystation of the common intestinal parasite Giardia lamblia involves the production, trafficking, and secretion of cyst wall material (CWM). However, the molecular mechanism responsible for the regulation of these sequential processes remains elusive. Here, we examined the role of GlRac, Giardia's sole Rho family GTPase, in the regulation of endomembrane organization and cyst wall protein (CWP) trafficking. Localization studies indicated that GlRac is associated with the endoplasmic reticulum (ER) and the Golgi apparatus-like encystation-specific vesicles (ESVs). Constitutive GlRac signaling increased levels of the ER marker PDI2, induced ER swelling, reduced overall CWP1 production, and promoted the early maturation of ESVs. Quantitative analysis of cells expressing constitutively active hemagglutinin (HA)-tagged GlRac (HA-Rac(CA)) revealed fewer but larger ESVs than control cells. Consistent with the phenotype of premature maturation of ESVs in HA-Rac(CA)-expressing cells, constitutive GlRac signaling resulted in increased CWP1 secretion and, conversely, morpholino depletion of GlRac blocked CWP1 secretion. Wild-type cells unexpectedly secreted large quantities of CWP1 into the medium, and free CWP1 was used cooperatively during cyst formation. These results, in part, could account for the previously reported observation that G. lamblia encysts more efficiently at high cell densities. These studies of GlRac show that it regulates encystation at several levels, and our findings support its coordinating role as a regulator of CWP trafficking and secretion. The central role of GlRac in regulating membrane trafficking and the cytoskeleton, both of which are essential to Giardia parasitism, further suggests its potential as a novel target for drug development to treat giardiasis. The encystation process is crucial for the transmission of giardiasis and the life cycle of many protists. Encystation for Giardia lamblia involves the assembly of a protective cyst wall via sequential production, trafficking, and secretion of cyst wall material. However, the regulatory pathways that coordinate cargo maturation and secretion remain unknown. Here, we asked whether the signaling activities of G. lamblia's single Rho family GTPase, GlRac, might have a regulatory role in the encystation process. We show that GlRac localizes to endomembranes and its signaling activities regulate the production of cyst wall protein 1 (CWP1), the maturation of encystation-specific vesicles (ESVs), and secretion of CWP1. We also show that secreted CWP1 is available for the development of cysts at the population level, a finding that in part could explain why Giardia encystation proceeds more efficiently at high cell densities. Copyright © 2016 Krtková et al.
Comprehensive Study on Wastages of Supply Chain Information Sharing in Automotive Industries
NASA Astrophysics Data System (ADS)
Sendhil Kumar, R.; Pugazhendhi, S.; Muralidharan, C.; Murali, S.
2017-03-01
A supply chain is a very extensive concept, which encompasses many problems and features when it comes to controlling. Now a day’s lean concept is a very common method to several areas, such as service sectors and manufacturing. Applying the lean concept to supply chain management is a very popular study part, it has attracted many industrial practices and researchers with different applications. Information sharing and technology remain one of the key factors of integrating the supply chain members. Current scenario the competition is no longer between the competing companies, but it happens between the supply chains. So the efficiency of the supply chain is very important. And the effective sharing of information can enhance the supply chain efficiency through minimizing the inventories and Information sharing can increase supply chain efficiency by reducing inventories and stabilizing the production. This paper describes and discusses about the seven deadly wastes of supply chain information with the comparative principle of Toyota production system (TPS) principle approach. How the TPS can be applied to supply chain information sharing And lean tool of 5S concept possibility improve the information sharing.
Aggregation and lack of secretion of most newly synthesized proinsulin in non-beta-cell lines.
Zhu, Yong Lian; Abdo, Alexander; Gesmonde, Joan F; Zawalich, Kathleen C; Zawalich, Walter; Dannies, Priscilla S
2004-08-01
Myoblasts transfected with HB10D insulin secrete more hormone than those transfected with wild-type insulin, as published previously, indicating that production of wild-type insulin is not efficient in these cells. The ability of non-beta-cells to produce insulin was examined in several cell lines. In clones of neuroendocrine GH(4)C(1) cells stably transfected with proinsulin, two thirds of (35)S-proinsulin was degraded within 3 h of synthesis, whereas (35)S-prolactin was stable. In transiently transfected neuroendocrine AtT20 cells, half of (35)S-proinsulin was degraded within 3 h after synthesis, whereas (35)S-GH was stable. In transiently transfected fibroblast COS cells, (35)S-proinsulin was stable for longer, but less than 10% was secreted 8 h after synthesis. Proinsulin formed a concentrated patch detected by immunofluorescence in transfected cells that did not colocalize with calreticulin or BiP, markers for the endoplasmic reticulum, but did colocalize with membrin, a marker for the cis-medial Golgi complex. Proinsulin formed a Lubrol-insoluble aggregate within 30 min after synthesis in non-beta-cells but not in INS-1E cells, a beta-cell line that normally produces insulin. More than 45% of (35)S-HB10D proinsulin was secreted from COS cells 3 h after synthesis, and this mutant formed less Lubrol-insoluble aggregate in the cells than did wild-type hormone. These results indicate that proinsulin production from these non-beta-cells is not efficient and that proinsulin aggregates in their secretory pathways. Factors in the environment of the secretory pathway of beta-cells may prevent aggregation of proinsulin to allow efficient production.
Krijgsheld, Pauline; Nitsche, Benjamin M; Post, Harm; Levin, Ana M; Müller, Wally H; Heck, Albert J R; Ram, Arthur F J; Altelaar, A F Maarten; Wösten, Han A B
2013-04-05
Aspergillus niger is a cell factory for the production of enzymes. This fungus secretes proteins in the central part and at the periphery of the colony. The sporulating zone of the colony overlapped with the nonsecreting subperipheral zone, indicating that sporulation inhibits protein secretion. Indeed, strain ΔflbA that is affected early in the sporulation program secreted proteins throughout the colony. In contrast, the ΔbrlA strain that initiates but not completes sporulation did not show altered spatial secretion. The secretome of 5 concentric zones of xylose-grown ΔflbA colonies was assessed by quantitative proteomics. In total 138 proteins with a signal sequence for secretion were identified in the medium of ΔflbA colonies. Of these, 18 proteins had never been reported to be part of the secretome of A. niger, while 101 proteins had previously not been identified in the culture medium of xylose-grown wild type colonies. Taken together, inactivation of flbA results in spatial changes in secretion and in a more complex secretome. The latter may be explained by the fact that strain ΔflbA has a thinner cell wall compared to the wild type, enabling efficient release of proteins. These results are of interest to improve A. niger as a cell factory.
The Secret to Great Coaching: Inquiry Method Helps Teachers Take Ownership of Their Learning
ERIC Educational Resources Information Center
Foltos, Les
2014-01-01
A common question raised by new coaches is: When can I share my experience and expertise with teachers I am coaching to help them improve? It is a logical question. Many coaches know that they were chosen for the role in part because their peers respect them as a teacher. They know the instructional strategies they have used give them credibility…
Immune Modulation by Human Secreted RNases at the Extracellular Space.
Lu, Lu; Li, Jiarui; Moussaoui, Mohammed; Boix, Ester
2018-01-01
The ribonuclease A superfamily is a vertebrate-specific family of proteins that encompasses eight functional members in humans. The proteins are secreted by diverse innate immune cells, from blood cells to epithelial cells and their levels in our body fluids correlate with infection and inflammation processes. Recent studies ascribe a prominent role to secretory RNases in the extracellular space. Extracellular RNases endowed with immuno-modulatory and antimicrobial properties can participate in a wide variety of host defense tasks, from performing cellular housekeeping to maintaining body fluid sterility. Their expression and secretion are induced in response to a variety of injury stimuli. The secreted proteins can target damaged cells and facilitate their removal from the focus of infection or inflammation. Following tissue damage, RNases can participate in clearing RNA from cellular debris or work as signaling molecules to regulate the host response and contribute to tissue remodeling and repair. We provide here an overall perspective on the current knowledge of human RNases' biological properties and their role in health and disease. The review also includes a brief description of other vertebrate family members and unrelated extracellular RNases that share common mechanisms of action. A better knowledge of RNase mechanism of actions and an understanding of their physiological roles should facilitate the development of novel therapeutics.
Central Interleukin-1β Suppresses the Nocturnal Secretion of Melatonin
Herman, A. P.; Bochenek, J.; Król, K.; Krawczyńska, A.; Antushevich, H.; Pawlina, B.; Herman, A.; Romanowicz, K.; Tomaszewska-Zaremba, D.
2016-01-01
In vertebrates, numerous processes occur in a rhythmic manner. The hormonal signal reliably reflecting the environmental light conditions is melatonin. Nocturnal melatonin secretion patterns could be disturbed in pathophysiological states, including inflammation, Alzheimer's disease, and depression. All of these states share common elements in their aetiology, including the overexpression of interleukin- (IL-) 1β in the central nervous system. Therefore, the present study was designed to determine the effect of the central injection of exogenous IL-1β on melatonin release and on the expression of the enzymes of the melatonin biosynthetic pathway in the pineal gland of ewe. It was found that intracerebroventricular injections of IL-1β (50 µg/animal) suppressed (P < 0.05) nocturnal melatonin secretion in sheep regardless of the photoperiod. This may have resulted from decreased (P < 0.05) synthesis of the melatonin intermediate serotonin, which may have resulted, at least partially, from a reduced expression of tryptophan hydroxylase. IL-1β also inhibited (P < 0.05) the expression of the melatonin rhythm enzyme arylalkylamine-N-acetyltransferase and hydroxyindole-O-methyltransferase. However, the ability of IL-1β to affect the expression of these enzymes was dependent upon the photoperiod. Our study may shed new light on the role of central IL-1β in the aetiology of disruptions in melatonin secretion. PMID:27212805
Okano, Kenji; Zhang, Qiao; Shinkawa, Satoru; Yoshida, Shogo; Tanaka, Tsutomu; Fukuda, Hideki; Kondo, Akihiko
2009-01-01
In order to achieve direct and efficient fermentation of optically pure D-lactic acid from raw corn starch, we constructed L-lactate dehydrogenase gene (ldhL1)-deficient Lactobacillus plantarum and introduced a plasmid encoding Streptococcus bovis 148 alpha-amylase (AmyA). The resulting strain produced only D-lactic acid from glucose and successfully expressed amyA. With the aid of secreting AmyA, direct D-lactic acid fermentation from raw corn starch was accomplished. After 48 h of fermentation, 73.2 g/liter of lactic acid was produced with a high yield (0.85 g per g of consumed sugar) and an optical purity of 99.6%. Moreover, a strain replacing the ldhL1 gene with an amyA-secreting expression cassette was constructed. Using this strain, direct D-lactic acid fermentation from raw corn starch was accomplished in the absence of selective pressure by antibiotics. This is the first report of direct D-lactic acid fermentation from raw starch.
Okano, Kenji; Zhang, Qiao; Shinkawa, Satoru; Yoshida, Shogo; Tanaka, Tsutomu; Fukuda, Hideki; Kondo, Akihiko
2009-01-01
In order to achieve direct and efficient fermentation of optically pure d-lactic acid from raw corn starch, we constructed l-lactate dehydrogenase gene (ldhL1)-deficient Lactobacillus plantarum and introduced a plasmid encoding Streptococcus bovis 148 α-amylase (AmyA). The resulting strain produced only d-lactic acid from glucose and successfully expressed amyA. With the aid of secreting AmyA, direct d-lactic acid fermentation from raw corn starch was accomplished. After 48 h of fermentation, 73.2 g/liter of lactic acid was produced with a high yield (0.85 g per g of consumed sugar) and an optical purity of 99.6%. Moreover, a strain replacing the ldhL1 gene with an amyA-secreting expression cassette was constructed. Using this strain, direct d-lactic acid fermentation from raw corn starch was accomplished in the absence of selective pressure by antibiotics. This is the first report of direct d-lactic acid fermentation from raw starch. PMID:19011066
In Vitro Comparison of Adipokine Export Signals.
Sharafi, Parisa; Kocaefe, Y Çetin
2016-01-01
Mammalian cells are widely used for recombinant protein production in research and biotechnology. Utilization of export signals significantly facilitates production and purification processes. 35 years after the discovery of the mammalian export machinery, there still are obscurities regarding the efficiency of the export signals. The aim of this study was the comparative evaluation of the efficiency of selected export signals using adipocytes as a cell model. Adipocytes have a large capacity for protein secretion including several enzymes, adipokines, and other signaling molecules, providing a valid system for a quantitative evaluation. Constructs that expressed N-terminal fusion export signals were generated to express Enhanced Green Fluorescence Protein (EGFP) as a reporter for quantitative and qualitative evaluation. Furthermore, fluorescent microscopy was used to trace the intracellular traffic of the reporter. The export efficiency of six selected proteins secreted from adipocytes was evaluated. Quantitative comparison of intracellular and exported fractions of the recombinant constructs demonstrated a similar efficiency among the studied sequences with minor variations. The export signal of Retinol Binding Protein (RBP4) exhibited the highest efficiency. This study presents the first quantitative data showing variations among export signals, in adipocytes which will help optimization of recombinant protein distribution.
A Secure and Efficient Audit Mechanism for Dynamic Shared Data in Cloud Storage
2014-01-01
With popularization of cloud services, multiple users easily share and update their data through cloud storage. For data integrity and consistency in the cloud storage, the audit mechanisms were proposed. However, existing approaches have some security vulnerabilities and require a lot of computational overheads. This paper proposes a secure and efficient audit mechanism for dynamic shared data in cloud storage. The proposed scheme prevents a malicious cloud service provider from deceiving an auditor. Moreover, it devises a new index table management method and reduces the auditing cost by employing less complex operations. We prove the resistance against some attacks and show less computation cost and shorter time for auditing when compared with conventional approaches. The results present that the proposed scheme is secure and efficient for cloud storage services managing dynamic shared data. PMID:24959630
A secure and efficient audit mechanism for dynamic shared data in cloud storage.
Kwon, Ohmin; Koo, Dongyoung; Shin, Yongjoo; Yoon, Hyunsoo
2014-01-01
With popularization of cloud services, multiple users easily share and update their data through cloud storage. For data integrity and consistency in the cloud storage, the audit mechanisms were proposed. However, existing approaches have some security vulnerabilities and require a lot of computational overheads. This paper proposes a secure and efficient audit mechanism for dynamic shared data in cloud storage. The proposed scheme prevents a malicious cloud service provider from deceiving an auditor. Moreover, it devises a new index table management method and reduces the auditing cost by employing less complex operations. We prove the resistance against some attacks and show less computation cost and shorter time for auditing when compared with conventional approaches. The results present that the proposed scheme is secure and efficient for cloud storage services managing dynamic shared data.
An Efficient Quantum Somewhat Homomorphic Symmetric Searchable Encryption
NASA Astrophysics Data System (ADS)
Sun, Xiaoqiang; Wang, Ting; Sun, Zhiwei; Wang, Ping; Yu, Jianping; Xie, Weixin
2017-04-01
In 2009, Gentry first introduced an ideal lattices fully homomorphic encryption (FHE) scheme. Later, based on the approximate greatest common divisor problem, learning with errors problem or learning with errors over rings problem, FHE has developed rapidly, along with the low efficiency and computational security. Combined with quantum mechanics, Liang proposed a symmetric quantum somewhat homomorphic encryption (QSHE) scheme based on quantum one-time pad, which is unconditional security. And it was converted to a quantum fully homomorphic encryption scheme, whose evaluation algorithm is based on the secret key. Compared with Liang's QSHE scheme, we propose a more efficient QSHE scheme for classical input states with perfect security, which is used to encrypt the classical message, and the secret key is not required in the evaluation algorithm. Furthermore, an efficient symmetric searchable encryption (SSE) scheme is constructed based on our QSHE scheme. SSE is important in the cloud storage, which allows users to offload search queries to the untrusted cloud. Then the cloud is responsible for returning encrypted files that match search queries (also encrypted), which protects users' privacy.
Wu, D Z; Yuan, J Y; Shi, H L; Hu, Z B
2008-01-01
Background and purpose: The protoberberine alkaloid berberine has been reported to inhibit colonic Cl− secretion. However, it is not known if other protoberberine alkaloids share these effects. We have therefore selected another protoberberine alkaloid, palmatine, to assess its effects on active ion transport across rat colonic epithelium. Experimental approach: Rat colonic mucosa was mounted in Ussing chambers and short circuit current (I SC), apical Cl− current and basolateral K+ current were recorded. Intracellular cAMP content was determined by an enzyme immunoassay. Intracellular Ca2+ concentration was measured with Fura-2 AM. Key results: Palmatine inhibited carbachol-induced Ca2+-activated Cl− secretion and the carbachol-induced increase of intracellular Ca2+ concentration. Palmatine also inhibited cAMP-activated Cl− secretion induced by prostaglandin E2 (PGE2) or forskolin. Palmatine prevented the elevation of intracellular cAMP by forskolin. Determination of apical Cl− currents showed that palmatine suppressed the forskolin-stimulated, apical cAMP-activated Cl− current but not the carbachol-stimulated apical Ca2+-activated Cl− current. Following permeabilization of apical membranes with nystatin, we found that palmatine inhibited a carbachol-stimulated basolateral K+ current that was sensitive to charybdotoxin and resistant to chromanol 293B. However, the forskolin-stimulated basolateral K+ current inhibited by palmatine was specifically blocked by chromanol 293B and not by charybdotoxin. Conclusions and implications: Palmatine attenuated Ca2+-activated Cl− secretion through inhibiting basolateral charybdotoxin-sensitive, SK4 K+ channels, whereas it inhibited cAMP-activated Cl− secretion by inhibiting apical CFTR Cl− channels and basolateral chromanol 293B-sensitive, KvLQT1 K+ channels. PMID:18204477
Reversible integer wavelet transform for blind image hiding method
Bibi, Nargis; Mahmood, Zahid; Akram, Tallha; Naqvi, Syed Rameez
2017-01-01
In this article, a blind data hiding reversible methodology to embed the secret data for hiding purpose into cover image is proposed. The key advantage of this research work is to resolve the privacy and secrecy issues raised during the data transmission over the internet. Firstly, data is decomposed into sub-bands using the integer wavelets. For decomposition, the Fresnelet transform is utilized which encrypts the secret data by choosing a unique key parameter to construct a dummy pattern. The dummy pattern is then embedded into an approximated sub-band of the cover image. Our proposed method reveals high-capacity and great imperceptibility of the secret embedded data. With the utilization of family of integer wavelets, the proposed novel approach becomes more efficient for hiding and retrieving process. It retrieved the secret hidden data from the embedded data blindly, without the requirement of original cover image. PMID:28498855
Native structure of a type IV secretion system core complex essential for Legionella pathogenesis.
Kubori, Tomoko; Koike, Masafumi; Bui, Xuan Thanh; Higaki, Saori; Aizawa, Shin-Ichi; Nagai, Hiroki
2014-08-12
Bacterial type IV secretion systems are evolutionarily related to conjugation systems and play a pivotal role in infection by delivering numerous virulence factors into host cells. Using transmission electron microscopy, we report the native molecular structure of the core complex of the Dot/Icm type IV secretion system encoded by Legionella pneumophila, an intracellular human pathogen. The biochemically isolated core complex, composed of at least five proteins--DotC, DotD, DotF, DotG, and DotH--has a ring-shaped structure. Intriguingly, morphologically distinct premature complexes are formed in the absence of DotG or DotF. Our data suggest that DotG forms a central channel spanning inner and outer membranes. DotF, a component dispensable for type IV secretion, plays a role in efficient embedment of DotG into the functional core complex. These results highlight a common scheme for the biogenesis of transport machinery.
Full-field implementation of a perfect eavesdropper on a quantum cryptography system.
Gerhardt, Ilja; Liu, Qin; Lamas-Linares, Antía; Skaar, Johannes; Kurtsiefer, Christian; Makarov, Vadim
2011-06-14
Quantum key distribution (QKD) allows two remote parties to grow a shared secret key. Its security is founded on the principles of quantum mechanics, but in reality it significantly relies on the physical implementation. Technological imperfections of QKD systems have been previously explored, but no attack on an established QKD connection has been realized so far. Here we show the first full-field implementation of a complete attack on a running QKD connection. An installed eavesdropper obtains the entire 'secret' key, while none of the parameters monitored by the legitimate parties indicate a security breach. This confirms that non-idealities in physical implementations of QKD can be fully practically exploitable, and must be given increased scrutiny if quantum cryptography is to become highly secure.
Position-based quantum cryptography over untrusted networks
NASA Astrophysics Data System (ADS)
Nadeem, Muhammad
2014-08-01
In this article, we propose quantum position verification (QPV) schemes where all the channels are untrusted except the position of the prover and distant reference stations of verifiers. We review and analyze the existing QPV schemes containing some pre-shared data between the prover and verifiers. Most of these schemes are based on non-cryptographic assumptions, i.e. quantum/classical channels between the verifiers are secure. It seems impractical in an environment fully controlled by adversaries and would lead to security compromise in practical implementations. However, our proposed formula for QPV is more robust, secure and according to the standard assumptions of cryptography. Furthermore, once the position of the prover is verified, our schemes establish secret keys in parallel and can be used for authentication and secret communication between the prover and verifiers.
Diverse C-Terminal Sequences Involved in Flavobacterium johnsoniae Protein Secretion
Kulkarni, Surashree S.; Zhu, Yongtao; Brendel, Colton J.
2017-01-01
ABSTRACT Flavobacterium johnsoniae and many related bacteria secrete proteins across the outer membrane using the type IX secretion system (T9SS). Proteins secreted by T9SSs have amino-terminal signal peptides for export across the cytoplasmic membrane by the Sec system and carboxy-terminal domains (CTDs) targeting them for secretion across the outer membrane by the T9SS. Most but not all T9SS CTDs belong to the family TIGR04183 (type A CTDs). We functionally characterized diverse CTDs for secretion by the F. johnsoniae T9SS. Attachment of the CTDs from F. johnsoniae RemA, AmyB, and ChiA to the foreign superfolder green fluorescent protein (sfGFP) that had a signal peptide at the amino terminus resulted in secretion across the outer membrane. In each case, approximately 80 to 100 amino acids from the extreme carboxy termini were needed for efficient secretion. Several type A CTDs from distantly related members of the phylum Bacteroidetes functioned in F. johnsoniae, supporting the secretion of sfGFP by the F. johnsoniae T9SS. F. johnsoniae SprB requires the T9SS for secretion but lacks a type A CTD. It has a conserved C-terminal domain belonging to the family TIGR04131, which we refer to as a type B CTD. The CTD of SprB was required for its secretion, but attachment of C-terminal regions of SprB of up to 1,182 amino acids to sfGFP failed to result in secretion. Additional features outside the C-terminal region of SprB may be required for its secretion. IMPORTANCE Type IX protein secretion systems (T9SSs) are common in but limited to members of the phylum Bacteroidetes. Most proteins that are secreted by T9SSs have conserved carboxy-terminal domains that belong to the protein domain family TIGR04183 (type A CTDs) or TIGR04131 (type B CTDs). Here, we identify features of T9SS CTDs of F. johnsoniae that are required for protein secretion and demonstrate that type A CTDs from distantly related members of the phylum function with the F. johnsoniae T9SS to secrete the foreign protein sfGFP. In contrast, type B CTDs failed to target sfGFP for secretion, suggesting a more complex association with the T9SS. PMID:28396348
Spencer, Robert L; Chun, Lauren E; Hartsock, Matthew J; Woodruff, Elizabeth R
2018-04-01
Glucocorticoid hormones are a powerful mammalian systemic hormonal signal that exerts regulatory effects on almost every cell and system of the body. Glucocorticoids act in a circadian and stress-directed manner to aid in adaptation to an ever-changing environment. Circadian glucocorticoid secretion provides for a daily waxing and waning influence on target cell function. In addition, the daily circadian peak of glucocorticoid secretion serves as a timing signal that helps entrain intrinsic molecular clock phase in tissue cells distributed throughout the body. Stress-induced glucocorticoid secretion also modulates the state of these same cells in response to both physiological and psychological stressors. We review the strong functional interrelationships between glucocorticoids and the circadian system, and discuss how these interactions optimize the appropriate cellular and systems response to stress throughout the day. We also discuss clinical implications of this dual aspect of glucocorticoid signaling, especially for conditions of circadian and HPA axis dysregulation. Copyright © 2018 Elsevier Inc. All rights reserved.
Macias, R I; Monte, M J; El-Mir, M Y; Villanueva, G R; Marin, J J
1998-09-01
Rat liver uptake and bile output of the cytostatic complex cis-diammineplatinum(II)-chlorocholylglycinate (Bamet-R2) were studied. Up to 100 microM, Bamet-R2 uptake by rat hepatocytes in primary culture followed saturation kinetics (Vmax = 0.65 +/- 0.12 nmol/5 min per mg protein; K(M) = 45.2 +/- 10.7 microM). Bamet-R2 uptake was lower than that of cholylglycinate (CG) but higher than that of cisplatin. Replacement of 116 mM NaCl by 116 mM choline chloride did not significantly reduce Bamet-R2 uptake. Addition of 500 microM CG, cholic acid, estrone sulfate, or ouabain to 50 microM Bamet-R2-containing incubation media inhibited Bamet-R2 uptake. No liver biotransformation of Bamet-R2 occurred, as indicated by HPLC analysis of bile collected from anesthetized rats after intravenous administration of the drug. Bamet-R2 uptake and secretion into bile by isolated rat livers exceeded those of cisplatin but were lower than those of CG. Differences between Bamet-R2 and CG were more marked for bile output than for liver uptake. Thus, higher Bamet-R2 than CG or cisplatin liver content was found. Co-administration of Bamet-R2 and CG revealed that CG induced a slight reduction in Bamet-R2 uptake and a marked inhibition in Bamet-R2 bile output. By contrast, Bamet-R2 had no effect on CG on either liver uptake or bile output. In sum, the present data indicate that Bamet-R2 is efficiently taken up and secreted into bile by the rat liver by mechanisms shared in part by natural bile acids.
Guérin, Jeremy; Bigot, Sarah; Schneider, Robert; Buchanan, Susan K.; Jacob-Dubuisson, Françoise
2017-01-01
Initially identified in pathogenic Gram-negative bacteria, the two-partner secretion (TPS) pathway, also known as Type Vb secretion, mediates the translocation across the outer membrane of large effector proteins involved in interactions between these pathogens and their hosts. More recently, distinct TPS systems have been shown to secrete toxic effector domains that participate in inter-bacterial competition or cooperation. The effects of these systems are based on kin vs. non-kin molecular recognition mediated by specific immunity proteins. With these new toxin-antitoxin systems, the range of TPS effector functions has thus been extended from cytolysis, adhesion, and iron acquisition, to genome maintenance, inter-bacterial killing and inter-bacterial signaling. Basically, a TPS system is made up of two proteins, the secreted TpsA effector protein and its TpsB partner transporter, with possible additional factors such as immunity proteins for protection against cognate toxic effectors. Structural studies have indicated that TpsA proteins mainly form elongated β helices that may be followed by specific functional domains. TpsB proteins belong to the Omp85 superfamily. Open questions remain on the mechanism of protein secretion in the absence of ATP or an electrochemical gradient across the outer membrane. The remarkable dynamics of the TpsB transporters and the progressive folding of their TpsA partners at the bacterial surface in the course of translocation are thought to be key elements driving the secretion process. PMID:28536673
Application of Quantum Gauss-Jordan Elimination Code to Quantum Secret Sharing Code
NASA Astrophysics Data System (ADS)
Diep, Do Ngoc; Giang, Do Hoang; Phu, Phan Huy
2017-12-01
The QSS codes associated with a MSP code are based on finding an invertible matrix V, solving the system vATMB (s a) = s. We propose a quantum Gauss-Jordan Elimination Procedure to produce such a pivotal matrix V by using the Grover search code. The complexity of solving is of square-root order of the cardinal number of the unauthorized set √ {2^{|B|}}.
Application of Quantum Gauss-Jordan Elimination Code to Quantum Secret Sharing Code
NASA Astrophysics Data System (ADS)
Diep, Do Ngoc; Giang, Do Hoang; Phu, Phan Huy
2018-03-01
The QSS codes associated with a MSP code are based on finding an invertible matrix V, solving the system vATMB (s a)=s. We propose a quantum Gauss-Jordan Elimination Procedure to produce such a pivotal matrix V by using the Grover search code. The complexity of solving is of square-root order of the cardinal number of the unauthorized set √ {2^{|B|}}.
Information Operations: Putting the ’I’ Back Into Dime
2006-02-01
Texas Early Warning Center 9. Create New York Corporate Warning Network 10. Digital Marshall Plan using residual capability in abandoned satellites... us , and that all raw information—secret, unclassified, operational, logistic—must be brought together across distributed “pits” that are able to...is overt, using methods that do not compromise the integrity or impartiality of the UN, when the information can be shared and become widely known
Yeo, Tien Ee Dominic; Chu, Tsz Hang
2017-09-01
Social media present opportunities and challenges for sexual health communication among young people. This study is one of the first to examine the actual use of Facebook for peer communication of sexual health and intimate relations. Content analysis of 2186 anonymous posts in a "sex secrets" Facebook page unofficially affiliated with a Hong Kong University shows gender balance among posters, inclusiveness of sexual minorities, and frequent sharing of personal experiences in storytelling or advice seeking. The findings illuminate young people's health concerns regarding condom use, avoiding pain, birth control, sexually transmitted infections, and body appearance. Relational concerns found entailed sexual practices, expectations, and needs-predominantly within dating relationships and include not wanting to have sex. Supportive communication among users was prevalent. A majority of posts involved advice solicitation in the form of request for opinion or information (30.38%), request for advice (13.68%), situation comparison (5.40%), or problem disclosure (9.97%). Comments to the advice-seeking posts were mostly supportive (69.49%); nonsupportive responses (unsolicited messages and gratuitous humor) were concentrated with ambiguous advice solicitations. These findings hold implications for understanding self-disclosure of intimate concerns within social networks, and attuning sexual health intervention on social media to young people's actual needs and advice preferences.
Device-independent secret-key-rate analysis for quantum repeaters
NASA Astrophysics Data System (ADS)
Holz, Timo; Kampermann, Hermann; Bruß, Dagmar
2018-01-01
The device-independent approach to quantum key distribution (QKD) aims to establish a secret key between two or more parties with untrusted devices, potentially under full control of a quantum adversary. The performance of a QKD protocol can be quantified by the secret key rate, which can be lower bounded via the violation of an appropriate Bell inequality in a setup with untrusted devices. We study secret key rates in the device-independent scenario for different quantum repeater setups and compare them to their device-dependent analogon. The quantum repeater setups under consideration are the original protocol by Briegel et al. [Phys. Rev. Lett. 81, 5932 (1998), 10.1103/PhysRevLett.81.5932] and the hybrid quantum repeater protocol by van Loock et al. [Phys. Rev. Lett. 96, 240501 (2006), 10.1103/PhysRevLett.96.240501]. For a given repeater scheme and a given QKD protocol, the secret key rate depends on a variety of parameters, such as the gate quality or the detector efficiency. We systematically analyze the impact of these parameters and suggest optimized strategies.
HTLV-1-induced leukotriene B4 secretion by T cells promotes T cell recruitment and virus propagation
Percher, Florent; Curis, Céline; Pérès, Eléonore; Artesi, Maria; Rosewick, Nicolas; Jeannin, Patricia; Gessain, Antoine; Gout, Olivier; Mahieux, Renaud; Ceccaldi, Pierre-Emmanuel; Van den Broeke, Anne; Duc Dodon, Madeleine; Afonso, Philippe V.
2017-01-01
The human T-lymphotropic virus type 1 (HTLV-1) is efficiently transmitted through cellular contacts. While the molecular mechanisms of viral cell-to-cell propagation have been extensively studied in vitro, those facilitating the encounter between infected and target cells remain unknown. In this study, we demonstrate that HTLV-1-infected CD4 T cells secrete a potent chemoattractant, leukotriene B4 (LTB4). LTB4 secretion is dependent on Tax-induced transactivation of the pla2g4c gene, which encodes the cytosolic phospholipase A2 gamma. Inhibition of LTB4 secretion or LTB4 receptor knockdown on target cells reduces T-cell recruitment, cellular contact formation and virus propagation in vitro. Finally, blocking the synthesis of LTB4 in a humanized mouse model of HTLV-1 infection significantly reduces proviral load. This results from a decrease in the number of infected clones while their expansion is not impaired. This study shows the critical role of LTB4 secretion in HTLV-1 transmission both in vitro and in vivo. PMID:28639618
Yin, Yuan; Cai, Xing; Chen, Xi; Liang, Hongwei; Zhang, Yujing; Li, Jing; Wang, Zuoyun; Chen, Xiulan; Zhang, Wen; Yokoyama, Seiji; Wang, Cheng; Li, Liang; Li, Limin; Hou, Dongxia; Dong, Lei; Xu, Tao; Hiroi, Takachika; Yang, Fuquan; Ji, Hongbin; Zhang, Junfeng; Zen, Ke; Zhang, Chen-Yu
2014-01-01
An increased population of CD4+CD25highFoxp3+ regulatory T cells (Tregs) in the tumor-associated microenvironment plays an important role in cancer immune evasion. However, the underlying mechanism remains unclear. Here we observed an increased secretion of miR-214 in various types of human cancers and mouse tumor models. Tumor-secreted miR-214 was sufficiently delivered into recipient T cells by microvesicles (MVs). In targeted mouse peripheral CD4+ T cells, tumor-derived miR-214 efficiently downregulated phosphatase and tensin homolog (PTEN) and promoted Treg expansion. The miR-214-induced Tregs secreted higher levels of IL-10 and promoted tumor growth in nude mice. Furthermore, in vivo studies indicated that Treg expansion mediated by cancer cell-secreted miR-214 resulted in enhanced immune suppression and tumor implantation/growth in mice. The MV delivery of anti-miR-214 antisense oligonucleotides (ASOs) into mice implanted with tumors blocked Treg expansion and tumor growth. Our study reveals a novel mechanism through which cancer cell actively manipulates immune response via promoting Treg expansion. PMID:25223704
Katagiri, Tomohiro; Kobayashi, Minoru; Yoshimura, Michio; Morinibu, Akiyo; Itasaka, Satoshi; Hiraoka, Masahiro; Harada, Hiroshi
2018-01-01
Hypoxic and stroma-rich microenvironments, characteristic features of pancreatic cancers, are strongly associated with a poor prognosis. However, whether and how hypoxia increases stromal compartments remain largely unknown. Here, we investigated the potential importance of a master regulator of the cellular adaptive response to hypoxia, hypoxia-inducible factor-1 (HIF-1), in the formation of stroma-rich microenvironments of pancreatic tumors. We found that pancreatic cancer cells secreted more Sonic hedgehog protein (SHH) under hypoxia by upregulating its expression and efficiency of secretion in a HIF-1-dependent manner. Recombinant SHH, which was confirmed to activate the hedgehog signaling pathway, accelerated the growth of fibroblasts in a dose-dependent manner. The SHH protein secreted from pancreatic cancer cells under hypoxic conditions promoted the growth of fibroblasts by stimulating their Sonic hedgehog signaling pathway. These results suggest that the increased secretion of SHH by HIF-1 is potentially responsible for the formation of detrimental and stroma-rich microenvironments in pancreatic cancers, therefore providing a rational basis to target it in cancer therapy. PMID:29535824
Rizzo, M R; Barbieri, M; Grella, R; Passariello, N; Barone, M; Paolisso, G
2004-02-01
To compare the effect of Repaglinide vs Glimepiride on glucose- and meal-induced insulin secretion and on meal-test induced postprandial glucose excursions. After 2 weeks washout period, a 3-Month randomised, cross-over parallel group trial of R (1 mg x 2/die) vs G (2 mg/die) in 14 patients with type 2 diabetes "naive" in diet treatment was made. Both R and G significantly but similarly lowered fasting glucose levels and improved fasting plasma insulin levels vs baseline. Hyperglycemic clamp showed that both 1st (129.15 +/- 23.6 vs 106.90 +/- 18.6 pmol/L; p=0.01) and 2nd phase (189.42 +/- 34.4 vs 144.21 +/- 37.3 pmol/L; p=0.003) B-cell response to glucose as well as area under the curve (52.07 +/- 10.86 vs 39.54 +/- 10.27 micromol/L x 120'; p=0.005) were greater in R than G groups. Insulin action (4.0 +/- 1.1 vs 3.2 +/- 0.9 mg x Kg x 60'/microU/mL; p=0.046) was also improved by R than G administration. In the meal test, R therapy produced a more rapId induction of insulin secretion during the first part. In fact, the mean rise in insulin secretion peaked at 45 min in R (p=0.001 vs G) and at 60 min in G (p=0.001 vs R). Consequently, glucose spike at 60 min was higher in G group compared to glucose spike at 45 min in R group (p=0.002). Our study demonstrates that R is more efficient that G on improving glucose- and meal- induced insulin secretion as well as on controlling for postprandial glucose excursion.
NASA Technical Reports Server (NTRS)
Stadler, H. L.
1984-01-01
Oil is still a problem for the U.S. and its allies. Transportation uses 61 percent of U.S. oil and its share is increasing, so more efficient technology should be concentrated there. Trucks' share of oil use is increasing because they are already much more efficient than autos. The primary truck opportunities are streamlining, more efficient engines, and shifting freight to railroads. More efficient engines are possible using ceramics to allow elimination of cooling systems and better use of waste exhaust heat. A 60 percent improvement seems possible if ceramics can be made tough enough and durable enough.
Enabling the MLSpOC (Multi-Level Space Operations Center) of the Future
NASA Astrophysics Data System (ADS)
Missal, D.
2012-09-01
The Intelligence Reform and Terrorism Prevention Act, passed by Congress in 2004, established the expectation that the "vast intelligence enterprise" of the United States would become more unified, coordinated, and effective. This law charged the intelligence community and government agencies to integrate foreign intelligence and domestic US intelligence components to reduce gaps in understanding threats to our national security and to improve our reaction. This intelligence strategy — designed to provide more comprehensive and accurate intelligence analysis—substantially increases requirements for secure data sharing capabilities. An information system must be Certified & Accredited (C&A) by the appropriate Accreditation Authority in accordance with each Authority's prescribed compliance requirements and governance. Cross-Domain Solutions (CDSs) can provide the ability to share data between multiple operating domains (e.g. among users on Top Secret and Secret networks). However, sharing sensitive data across security domains and networks has been impeded by both technical and cultural challenges. A viable CDS requires a tremendous investment for initial C&A and many solutions are limited with respect to the integration of an organization's applications. As a result, most of today's highly secured systems have been designed to restrict access to entire user populations rather than implement data sharing on the basis of mandatory access controls and an individual's need-to-know. Most CDSs today are based on one-way replication through data transfer guards that copy data from one network to another. This model inherently builds in additional and extensive Operations and Maintenance (O&M) costs. Oracle's National Security Group challenged its top engineers and security architects to engineer the first Cross-Domain database providing a practical and robust solution to the Cross-Domain security problem. The result is the MLSpOC, which is deployed, fielded, and accredited today at multiple sites both CONUS and OCONUS. It is designed to assist information systems developers achieve DCID 6/3 Protection Level 4 or 5 (PL4 or PL5) or DoD SABI C&A for SECRET-to-UNCLASSIFIED systems (PL3). The product is on the DoD/DNI Unified Cross-domain Management Office's (UCDMO) Baseline of accredited solutions, and is the only solution on the Baseline which the Government considers to be an "All-in-One" approach to the Cross-domain Security challenge. Our solution is also the only PL-4 Cloud in existence and that is deployed and operational in the entire world today (at DIA). The Space marketplace is a very unique cross-domain challenge, as a need exists for Unclassified SSA Data Sharing at a deeper and more fundamental level than anywhere else in the IC or DoD. For instance, certain Agencies and/or Programs have a requirement to share information with Partner Nations that are not considered to be "friendly" (e.g. China). Our Solution is the ONLY solution in the world today that's achieved C&A, and that is uniquely positioned to enable the Multi-level Space Operations Center (MLSpOC) of the Future.
Variations in gastric acid secretion during periods of fasting between two species of shark.
Papastamatiou, Yannis P; Lowe, Christopher G
2005-06-01
Vertebrates differ in their regulation of gastric acid secretion during periods of fasting, yet it is unknown why these differences occur. Elasmobranch fishes are the earliest known vertebrates to develop an acid secreting stomach and as such may make a good comparative model for determining the causative factors behind these differences. We measured gastric pH and temperature continuously during periods of fasting in captive free-swimming nurse sharks (Ginglymostoma cirratum) using autonomous pH/temperature data-loggers. All nurse sharks secreted strong gastric acids (minimum pH 0.4) after feeding; however, for most of the sharks, pH increased to 8.2-8.7, 2-3 days after feeding. Half of the sharks also exhibited periodic oscillations in pH when the stomach was empty that ranged from 1.1 to 8.7 (acid secretion ceased for 11.3 +/- 4.3 h day(-1)). This is in contrast to the gastric pH changes observed from leopard sharks (Triakis semifasciata) in a previous study, where the stomach remains acidic during fasting. The leopard shark is a relatively active, more frequently feeding predator, and continuous acid secretion may increase digestive efficiency. In contrast, the nurse shark is less active and is thought to feed less frequently. Periodic cessation of acid secretion may be an energy conserving mechanism used by animals that feed infrequently and experience extended periods of fasting.
Basanta, Antonio; Gómez-Sala, Beatriz; Sánchez, Jorge; Diep, Dzung B.; Herranz, Carmen; Hernández, Pablo E.; Cintas, Luis M.
2010-01-01
In this work, we report the expression and secretion of the leaderless two-peptide (EntL50A and EntL50B) bacteriocin enterocin L50 from Enterococcus faecium L50 by the methylotrophic yeast Pichia pastoris X-33. The bacteriocin structural genes entL50A and entL50B were fused to the Saccharomyces cerevisiae gene region encoding the mating pheromone α-factor 1 secretion signal (MFα1s) and cloned, separately and together (entL50AB), into the P. pastoris expression and secretion vector pPICZαA, which contains the methanol-inducible alcohol oxidase promoter (PAOX1) to express the fusion genes. After transfer into the yeast, the recombinant plasmids were integrated into the genome, resulting in three bacteriocinogenic yeast strains able to produce and secrete the individual bacteriocin peptides EntL50A and EntL50B separately and together. The secretion was efficiently directed by MFα1s through the Sec system, and the precursor peptides were found to be correctly processed to form mature and active bacteriocin peptides. The present work describes for the first time the heterologous expression and secretion of a two-peptide non-pediocin-like bacteriocin by a yeast. PMID:20348300
Engineering Escherichia coli into a protein delivery system for mammalian cells.
Reeves, Analise Z; Spears, William E; Du, Juan; Tan, Kah Yong; Wagers, Amy J; Lesser, Cammie F
2015-05-15
Many Gram-negative pathogens encode type 3 secretion systems, sophisticated nanomachines that deliver proteins directly into the cytoplasm of mammalian cells. These systems present attractive opportunities for therapeutic protein delivery applications; however, their utility has been limited by their inherent pathogenicity. Here, we report the reengineering of a laboratory strain of Escherichia coli with a tunable type 3 secretion system that can efficiently deliver heterologous proteins into mammalian cells, thereby circumventing the need for virulence attenuation. We first introduced a 31 kB region of Shigella flexneri DNA that encodes all of the information needed to form the secretion nanomachine onto a plasmid that can be directly propagated within E. coli or integrated into the E. coli chromosome. To provide flexible control over type 3 secretion and protein delivery, we generated plasmids expressing master regulators of the type 3 system from either constitutive or inducible promoters. We then constructed a Gateway-compatible plasmid library of type 3 secretion sequences to enable rapid screening and identification of sequences that do not perturb function when fused to heterologous protein substrates and optimized their delivery into mammalian cells. Combining these elements, we found that coordinated expression of the type 3 secretion system and modified target protein substrates produces a nonpathogenic strain that expresses, secretes, and delivers heterologous proteins into mammalian cells. This reengineered system thus provides a highly flexible protein delivery platform with potential for future therapeutic applications.
Chen, Jun; Vestergaard, Mike; Jensen, Thomas Glasdam; Shen, Jing; Dufva, Martin; Solem, Christian; Jensen, Peter Ruhdal
2017-05-30
Efficient screening technologies aim to reduce both the time and the cost required for identifying rare mutants possessing a phenotype of interest in a mutagenized population. In this study, we combined a mild mutagenesis strategy with high-throughput screening based on microfluidic droplet technology to identify Lactococcus lactis variants secreting vitamin B 2 (riboflavin). Initially, we used a roseoflavin-resistant mutant of L. lactis strain MG1363, JC017, which secreted low levels of riboflavin. By using fluorescence-activated droplet sorting, several mutants that secreted riboflavin more efficiently than JC017 were readily isolated from the mutagenesis library. The screening was highly efficient, and candidates with as few as 1.6 mutations per million base pairs (Mbp) were isolated. The genetic characterization revealed that riboflavin production was triggered by mutations inhibiting purine biosynthesis, which is surprising since the purine nucleotide GTP is a riboflavin precursor. Purine starvation in the mutants induced overexpression of the riboflavin biosynthesis cluster ribABGH When the purine starvation was relieved by purine supplementation in the growth medium, the outcome was an immediate downregulation of the riboflavin biosynthesis cluster and a reduction in riboflavin production. Finally, by applying the new isolates in milk fermentation, the riboflavin content of milk (0.99 mg/liter) was improved to 2.81 mg/liter, compared with 0.66 mg/liter and 1.51 mg/liter by using the wild-type strain and the original roseoflavin-resistant mutant JC017, respectively. The results obtained demonstrate how powerful classical mutagenesis can be when combined with droplet-based microfluidic screening technology for obtaining microorganisms with useful attributes. IMPORTANCE The food industry prefers to use classical approaches, e.g., random mutagenesis followed by screening, to improve microorganisms used in food production, as the use of recombinant DNA technologies is still not widely accepted. Although modern automated screening platforms are widely accessible, screening remains as a bottleneck in strain development, especially when a mild mutagenesis approach is applied to reduce the chance of accumulating unintended mutations, which may cause unwanted phenotypic changes. Here, we incorporate a droplet-based high-throughput screening method into the strain development process and readily capture L. lactis variants with more efficient vitamin secretion from low-error-rate mutagenesis libraries. This study shows that useful mutants showing strong phenotypes but without extensive mutations can be identified with efficient screening technologies. It is therefore possible to avoid accumulating detrimental mutations while enriching beneficial ones through iterative mutagenesis screening. Due to the low mutation rates, the genetic determinants are also readily identified. Copyright © 2017 Chen et al.
Lindeberg, M; Collmer, A
1992-01-01
Many extracellular proteins produced by Erwinia chrysanthemi require the out gene products for transport across the outer membrane. In a previous report (S. Y. He, M. Lindeberg, A. K. Chatterjee, and A. Collmer, Proc. Natl. Acad. Sci. USA 88:1079-1083, 1991) cosmid pCPP2006, sufficient for secretion of Erwinia chrysanthemi extracellular proteins by Escherichia coli, was partially sequenced, revealing four out genes sharing high homology with pulH through pulK from Klebsiella oxytoca. The nucleotide sequence of eight additional out genes reveals homology with pulC through pulG, pulL, pulM, pulO, and other genes involved in secretion by various gram-negative bacteria. Although signal sequences and hydrophobic regions are generally conserved between Pul and Out proteins, four out genes contain unique inserts, a pulN homolog is not present, and outO appears to be transcribed separately from outC through outM. The sequenced region was subcloned, and an additional 7.6-kb region upstream was identified as being required for secretion in E. coli. out gene homologs were found on Erwinia carotovora cosmid clone pAKC651 but were not detected in E. coli. The outC-through-outM operon is weakly induced by polygalacturonic acid and strongly expressed in the early stationary phase. The out and pul genes are highly similar in sequence, hydropathic properties, and overall arrangement but differ in both transcriptional organization and the nature of their induction. Images PMID:1429461
NASA Astrophysics Data System (ADS)
Cajueiro, Daniel O.; Tabak, Benjamin M.
2004-11-01
In this paper, the efficient market hypothesis is tested for China, Hong Kong and Singapore by means of the long memory dependence approach. We find evidence suggesting that Hong Kong is the most efficient market followed by Chinese A type shares and Singapore and finally by Chinese B type shares, which suggests that liquidity and capital restrictions may play a role in explaining results of market efficiency tests.
[Pathogenetic correction of postoperative inflammation in modern rhinosurgery].
Kim, I A; Nosulia, E V
2010-01-01
This study included 20 patients presenting with polypous rhinosinusitis examined before and after endoscopic intervention in the nasal cavity and paranasal sinuses. Nitric oxide (NO) content in nasal secretion and polypoid tissue was estimated from the concentration of nitrates that, together with nitrites, are the final products of oxidation of nitric oxide and serve as markers of endogenous NO. Nitrates in the nasal secretion, endonasal mucosa, and polypous tissue were determined by the ionometric technique. Their content was additionally measured in 12 subjects without polypous rhinosinusitis. The nasal secretion and polypous tissue of PRS patients were found to contain nitrates at a higher concentration compared with healthy subjects. Nitrate concentrations in the nasal secretion and polypous tissue of PRS patients were not significantly different. Mean saccharine transport time in the nasal cavity of the patients with an elevated level of nitrates in the nasal secretion was significantly higher than in PRS patients with the lowered nitrate levels. It means that high concentrations of nitric oxide markers in the nasal secretion and polypous tissue of the patients with polypous rhinosinusitis have negative effect on the efficiency of mucociliary transport. In addition, results of the study confirm the possibility of anti-inflammatory therapy with Erespal (fenspirid) for the correction of inflammatory changes during the postoperative period.
Näntö-Salonen, K; Koskinen, P; Sonninen, P; Toppari, J
1999-01-01
We describe a 12-y-old boy with excessive growth hormone and prolactin secretion presumably due to diffuse somatotroph hyperplasia. Until mid-puberty, his growth rate was under reasonable control, with high-dose octreotide injections every 8 h combined with a dopamine agonist. As his growth velocity started to increase, the efficacy of continuous s.c. octreotide infusion on GH secretion was tested. Similar total daily doses (600 microg) of octreotide were administered either by incremental s.c. injections at 8 h intervals, or by continuous s.c. infusion, two-thirds of the amount during night-time to control the presumed high nocturnal growth hormone (GH) peaks of the pubertal growth spurt. An overnight GH profile showed inadequate suppression of GH levels by incremental injections, while continuous s.c. infusion efficiently brought down the GH secretion. Another somatostatin analogue, lanreotide as a single depot injection was not effective. A 6-mo trial on the s.c. infusion regimen significantly reduced growth hormone secretion (as judged by IGF-I and IGFBP3 concentrations), and normalized growth velocity overcoming the pubertal growth spurt. It also caused a decrease in the pituitary size in magnetic resonance images. We conclude that the efficacy of octreotide infusion in suppressing GH secretion is superior to incremental injections with the same dose.
Buszewska-Forajta, M; Siluk, D; Daghir-Wojtkowiak, E; Sejda, A; Staśkowiak, D; Biernat, W; Kaliszan, R
2015-12-24
Grasshopper, belonging to Chorthippus sp., is a widespread insect inhabiting Polish territory. According to folk knowledge and folk tales, the grasshopper abdominal secretion was used by villagers of Central and South-West Poland as a natural drug accelerating the wound healing process. In the reported study the hypothesis about beneficial properties of grasshopper abdominal secretion on hard to heal wounds was verified. The study was carried out with the use of a murine model (mice C57BL/6). In order to verify the beneficial properties of grasshopper abdominal secretion, the wounds of 8mm in diameter were formed on one side of each tested mouse. The influence of ethanolic extract of insects' secretion on healing process was evaluated in comparison to ethanolic solution of allantoin and 30% aqueous solution of ethanol (medium). The observation was carried out over a 14 day period. Finally the statistical analysis (ANOVA) was carried out to highlight the differences in wound healing rate between applied preparations. Moreover, qualitative composition of grasshoppers' secretion was studied with the use of GC/MS technique. During the first three days of observation, wounds treated with allantoin were healed with higher efficiency in comparison to ethanol and insect secretion preparations. The trend of healing changed from the 4th day of observation. Wounds treated with grasshoppers' abdominal secretion were closuring faster than wounds treated with allantoin or ethanol. In this part of observation, in the case of allantoin and ethanol application, the wound healing efficiency was similar. Since the 9th day of experiment the measurement of wounds size was problematic, due to crust formation. Finally at the 14th day of the study, wounds were totally healed. Morphological study enabled to observe all the phases of healing. In the 5th and 8th day, the infiltration of neutrophils and mononuclear cells in dermis was observed, which is characteristic for inflammatory phase of wound healing. On the 8th day of experiments, granulation of the tissue was clearly observed in the tested groups. Reepithelialization phase was observed from the 5th to 14th day, when the wound was totally healed. The analytical approach enabled to identify 38 compounds of hydrophobic or hydrophilic character. Among them, 6 amino acids, 14 organic acids and their derivatives, one sterol, 4 hydrocarbons, 5 carbohydrates, 2 inorganic acids, 4 alcohols, one diamine and one nucleoside were identified. The obtained results enabled to recognize the composition of grasshopper abdominal secretion. Some of the identified compounds possess therapeutic properties described in the literature. The performed in vivo study proved that application of insects secretion accelerates the healing process. The obtained results positively verified the scientific hypothesis based on ethnopharmacological premises about the beneficial properties of grasshopper abdominal secretion on wound healing process. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.
Yoon, Bo-Young; Song, Saemee; Lee, Kangseok; Ha, Nam-Chul
2012-01-01
The Hly translocator complex of Escherichia coli catalyzes type I secretion of the toxin hemolysin A (HlyA). In this complex, HlyB is an inner membrane ABC (ATP Binding Cassette)-type transporter, TolC is an outer membrane channel protein, and HlyD is a periplasmic adaptor anchored in the inner membrane that bridges HlyB to TolC. This tripartite organization is reminiscent of that of drug efflux systems such as AcrA-AcrB-TolC and MacA-MacB-TolC of E. coli. We have previously shown the crucial role of conserved residues located at the hairpin tip region of AcrA and MacA adaptors during assembly of their cognate systems. In this study, we investigated the role of the putative tip region of HlyD using HlyD mutants with single amino acid substitutions at the conserved positions. In vivo and in vitro data show that all mutations abolished HlyD binding to TolC and resulted in the absence of HlyA secretion. Together, our results suggest that, similarly to AcrA and MacA, HlyD interacts with TolC in a tip-to-tip manner. A general model in which these conserved interactions induce opening of TolC during drug efflux and type I secretion is discussed. PMID:22792337
Domozych, David S.; Fujimoto, Chelsea; LaRue, Therese
2013-01-01
Polar expansion is a widespread phenomenon in plants spanning all taxonomic groups from the Charophycean Green Algae to pollen tubes in Angiosperms and Gymnosperms. Current data strongly suggests that many common features are shared amongst cells displaying polar growth mechanics including changes to the structural features of localized regions of the cell wall, mobilization of targeted secretion mechanisms, employment of the actin cytoskeleton for directing secretion and in many cases, endocytosis and coordinated interaction of multiple signal transduction mechanisms prompted by external biotic and abiotic cues. The products of polar expansion perform diverse functions including delivery of male gametes to the egg, absorption, anchorage, adhesion and photo-absorption efficacy. A comparative analysis of polar expansion dynamics is provided with special emphasis on those found in early divergent plants. PMID:27137370
Images Encryption Method using Steganographic LSB Method, AES and RSA algorithm
NASA Astrophysics Data System (ADS)
Moumen, Abdelkader; Sissaoui, Hocine
2017-03-01
Vulnerability of communication of digital images is an extremely important issue nowadays, particularly when the images are communicated through insecure channels. To improve communication security, many cryptosystems have been presented in the image encryption literature. This paper proposes a novel image encryption technique based on an algorithm that is faster than current methods. The proposed algorithm eliminates the step in which the secrete key is shared during the encryption process. It is formulated based on the symmetric encryption, asymmetric encryption and steganography theories. The image is encrypted using a symmetric algorithm, then, the secret key is encrypted by means of an asymmetrical algorithm and it is hidden in the ciphered image using a least significant bits steganographic scheme. The analysis results show that while enjoying the faster computation, our method performs close to optimal in terms of accuracy.
Hu, Shulong J; Calippe, Bertrand; Lavalette, Sophie; Roubeix, Christophe; Montassar, Fadoua; Housset, Michael; Levy, Olivier; Delarasse, Cecile; Paques, Michel; Sahel, José-Alain; Sennlaub, Florian; Guillonneau, Xavier
2015-05-06
Photoreceptor degeneration in age-related macular degeneration (AMD) is associated with an infiltration and chronic accumulation of mononuclear phagocytes (MPs). We have previously shown that Cx3cr1-deficient mice develop age- and stress- related subretinal accumulation of MPs, which is associated with photoreceptor degeneration. Cx3cr1-deficient MPs have been shown to increase neuronal apoptosis through IL-1β in neuroinflammation of the brain. The reason for increased IL-1β secretion from Cx3cr1-deficient MPs, and whether IL-1β is responsible for increased photoreceptor apoptosis in Cx3cr1-deficient mice, has not been elucidated. Here we show that Cx3cr1-deficient MPs express increased surface P2X7 receptor (P2RX7), which stimulates IL-1β maturation and secretion. P2RX7 and IL-1β inhibition efficiently blunted Cx3cr1-MP-dependent photoreceptor apoptosis in a monocyte/retina coculture system and in light-induced subretinal inflammation of Cx3cr1-deficient mice in vivo. Our results provide an explanation for increased CX3CR1-dependent IL-1β secretion and suggest that IL-1β or P2RX7 inhibition can help inhibit the inflammation-associated photoreceptor cell loss in late AMD, including geographic atrophy, for which no efficient treatment currently exists. Copyright © 2015 the authors 0270-6474/15/356987-10$15.00/0.
Sharing water and benefits in transboundary river basins
NASA Astrophysics Data System (ADS)
Arjoon, Diane; Tilmant, Amaury; Herrmann, Markus
2016-06-01
The equitable sharing of benefits in transboundary river basins is necessary to solve disputes among riparian countries and to reach a consensus on basin-wide development and management activities. Benefit-sharing arrangements must be collaboratively developed to be perceived not only as efficient, but also as equitable in order to be considered acceptable to all riparian countries. The current literature mainly describes what is meant by the term benefit sharing in the context of transboundary river basins and discusses this from a conceptual point of view, but falls short of providing practical, institutional arrangements that ensure maximum economic welfare as well as collaboratively developed methods for encouraging the equitable sharing of benefits. In this study, we define an institutional arrangement that distributes welfare in a river basin by maximizing the economic benefits of water use and then sharing these benefits in an equitable manner using a method developed through stakeholder involvement. We describe a methodology in which (i) a hydrological model is used to allocate scarce water resources, in an economically efficient manner, to water users in a transboundary basin, (ii) water users are obliged to pay for water, and (iii) the total of these water charges is equitably redistributed as monetary compensation to users in an amount determined through the application of a sharing method developed by stakeholder input, thus based on a stakeholder vision of fairness, using an axiomatic approach. With the proposed benefit-sharing mechanism, the efficiency-equity trade-off still exists, but the extent of the imbalance is reduced because benefits are maximized and redistributed according to a key that has been collectively agreed upon by the participants. The whole system is overseen by a river basin authority. The methodology is applied to the Eastern Nile River basin as a case study. The described technique not only ensures economic efficiency, but may also lead to more equitable solutions in the sharing of benefits in transboundary river basins because the definition of the sharing rule is not in question, as would be the case if existing methods, such as game theory, were applied, with their inherent definitions of fairness.
Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks
NASA Astrophysics Data System (ADS)
Lederer, Christian; Mader, Roland; Koschuch, Manuel; Großschädl, Johann; Szekely, Alexander; Tillich, Stefan
Wireless Sensor Networks (WSNs) are playing a vital role in an ever-growing number of applications ranging from environmental surveillance over medical monitoring to home automation. Since WSNs are often deployed in unattended or even hostile environments, they can be subject to various malicious attacks, including the manipulation and capture of nodes. The establishment of a shared secret key between two or more individual nodes is one of the most important security services needed to guarantee the proper functioning of a sensor network. Despite some recent advances in this field, the efficient implementation of cryptographic key establishment for WSNs remains a challenge due to the resource constraints of small sensor nodes such as the MICAz mote. In this paper we present a lightweight implementation of the elliptic curve Diffie-Hellman (ECDH) key exchange for ZigBee-compliant sensor nodes equipped with an ATmega128 processor running the TinyOS operating system. Our implementation uses a 192-bit prime field specified by the NIST as underlying algebraic structure and requires only 5.20 ·106 clock cycles to compute a scalar multiplication if the base point is fixed and known a priori. A scalar multiplication using a random base point takes about 12.33 ·106 cycles. Our results show that a full ECDH key exchange between two MICAz motes consumes an energy of 57.33 mJ (including radio communication), which is significantly better than most previously reported ECDH implementations on comparable platforms.
Nassal, M; Rieger, A
1993-01-01
Hepatitis B virus, the prototypic member of the Hepadnaviridae, is a small enveloped DNA virus that replicates via reverse transcription. Efficient usage of its compact 3.2-kb genome is exemplified by the pre-C/C gene from which two proteins with largely overlapping primary sequences but distinctly different properties are synthesized: the self-assembling core protein p21c (hepatitis B core antigen [HbcAg]) and the secretory, nonparticulate protein p17e (hepatitis B e antigen [HbeAg]). Mature p17e carries a 10-amino-acid N-terminal extension with a Cys residue (Cys-7). Using transient transfection of a human liver cell line with constructs expressing wild-type p17 or a series of Cys mutants of p17, we show that Cys-7 forms an intramolecular S-S bond to Cys61, which in assembly-competent core proteins is available for intermolecular disulfide bonds between two neighboring subunits. Removal of the Cys-7/Cys61 bond by mutating either residue has differential effects: in the absence of Cys-7, secretion is relatively efficient and independent of Cys61; however, the molecules are exported as homodimers exhibiting both HBe and HBc antigenicity. In the absence of Cys61, the nonpaired Cys-7 interferes with secretion efficiency. The amino acid sequence flanking Cys-7 also contributes to the formation of the proper intramolecular S-S bond. These results suggest that the Cys-7/Cys61 bond imposes on p17e a conformation that is critical for its secretion and distinct biophysical and antigenic properties. This mechanism adds selective disulfide formation to the repertoire of hepatitis B virus for efficient use of its tiny genome. Images PMID:8510224
Genuine multipartite Einstein-Podolsky-Rosen steering.
He, Q Y; Reid, M D
2013-12-20
We develop the concept of genuine N-partite Einstein-Podolsky-Rosen (EPR) steering. This nonlocality is the natural multipartite extension of the original EPR paradox. Useful properties emerge that are not guaranteed for genuine multipartite entangled states. In particular, there is a close link with the task of one-sided, device-independent quantum secret sharing. We derive inequalities to demonstrate multipartite EPR steering for Greenberger-Horne-Zeilinger and Gaussian continuous variable states in loophole-free scenarios.
Genuine Multipartite Einstein-Podolsky-Rosen Steering
NASA Astrophysics Data System (ADS)
He, Q. Y.; Reid, M. D.
2013-12-01
We develop the concept of genuine N-partite Einstein-Podolsky-Rosen (EPR) steering. This nonlocality is the natural multipartite extension of the original EPR paradox. Useful properties emerge that are not guaranteed for genuine multipartite entangled states. In particular, there is a close link with the task of one-sided, device-independent quantum secret sharing. We derive inequalities to demonstrate multipartite EPR steering for Greenberger-Horne-Zeilinger and Gaussian continuous variable states in loophole-free scenarios.
Entangled state quantum cryptography: eavesdropping on the ekert protocol
Naik; Peterson; White; Berglund; Kwiat
2000-05-15
Using polarization-entangled photons from spontaneous parametric down-conversion, we have implemented Ekert's quantum cryptography protocol. The near-perfect correlations of the photons allow the sharing of a secret key between two parties. The presence of an eavesdropper is continually checked by measuring Bell's inequalities. We investigated several possible eavesdropper strategies, including pseudo-quantum-nondemolition measurements. In all cases, the eavesdropper's presence was readily apparent. We discuss a procedure to increase her detectability.
The Virginia Slims identity crisis: an inside look at tobacco industry marketing to women.
Toll, B A; Ling, P M
2005-06-01
Because no prior studies have comprehensively analysed previously secret tobacco industry documents describing marketing female brands, the Virginia Slims brand was studied to explore how Philip Morris and competitors develop and adapt promotional campaigns targeting women. Analysis of previously secret tobacco industry documents. The majority of the documents used were from Philip Morris. The key to Virginia Slims advertising was creating an aspirational image which women associated with the brand. Virginia Slims co-opted women's liberation slogans to build a modern female image from 1968 through to the 1980s, and its market share grew from 0.24% to 3.16% during that time period. Ironically, the feminist image that worked very well for the brand was also the reason for its subsequent problems. Philip Morris experienced unprecedented losses in market share in the early 1990s, with a decline in market share for four consecutive years from 3.16% to 2.26%; they attributed this decline to both the fact that the brand's feminist image no longer appealed to young women aged 18-24 years, and increased competition from more contemporary and lower priced competitors. Throughout the 1990s, attempts to reacquire young women while retaining Virginia Slims loyal (now older) smokers were made using a "King Size" line extension, new slogans, and loyalty building promotions. Tobacco advertisers initially created distinct female brands with aspirational images; continued appeal to young women was critical for long term growth. The need for established brands to evolve to maintain relevance to young women creates an opportunity for tobacco counter-marketing, which should undermine tobacco brand imagery and promote aspirational smoke-free lifestyle images. Young women age 18-24 are extremely valuable to the tobacco industry and should be a focus for tobacco control programmes.
NASA Astrophysics Data System (ADS)
Satoh, Hitoshi; Niki, Noboru; Eguchi, Kenji; Ohmatsu, Hironobu; Kaneko, Masahiro; Kakinuma, Ryutaru; Moriyama, Noriyuki
2011-03-01
We have developed the teleradiology network system with a new information security solution that provided with web medical image conference system. In the teleradiology network system, the security of information network is very important subjects. We are studying the secret sharing scheme as a method safely to store or to transmit the confidential medical information used with the teleradiology network system. The confidential medical information is exposed to the risk of the damage and intercept. Secret sharing scheme is a method of dividing the confidential medical information into two or more tallies. Individual medical information cannot be decoded by using one tally at all. Our method has the function of RAID. With RAID technology, if there is a failure in a single tally, there is redundant data already copied to other tally. Confidential information is preserved at an individual Data Center connected through internet because individual medical information cannot be decoded by using one tally at all. Therefore, even if one of the Data Centers is struck and information is damaged, the confidential medical information can be decoded by using the tallies preserved at the data center to which it escapes damage. We can safely share the screen of workstation to which the medical image of Data Center is displayed from two or more web conference terminals at the same time. Moreover, Real time biometric face authentication system is connected with Data Center. Real time biometric face authentication system analyzes the feature of the face image of which it takes a picture in 20 seconds with the camera and defends the safety of the medical information. We propose a new information transmission method and a new information storage method with a new information security solution.
Secretins revealed: structural insights into the giant gated outer membrane portals of bacteria.
Majewski, Dorothy D; Worrall, Liam J; Strynadka, Natalie Cj
2018-03-23
The acquisition and evolution of customized and often highly complex secretion systems allows Gram-negative bacteria to efficiently passage large macromolecules across both inner and outer membranes and, in some cases, that of the infected host. Essential to the virulence and ultimate survival of the many pathogenic species that encode them, secretion systems export a wide variety of effector proteins and DNA as well as the downstream extracellular filaments of the secretion apparatus themselves. Although these customized secretion systems differ in their cytosolic and inner membrane components, several commonly rely on the secretin family of giant pores to allow these large substrates to traverse the outer membrane. Recently, several near-atomic resolution cryo-EM secretin structures have unveiled the first insights into the unique structural motifs required for outer membrane localization, assembly, hallmark ultrastable nature, spontaneous membrane insertion, and mechanism of action-including the requisite central gating needed to prevent deleterious passage of periplasmic contents to the extracellular space. Copyright © 2018. Published by Elsevier Ltd.
Fast and simple high-capacity quantum cryptography with error detection
Lai, Hong; Luo, Ming-Xing; Pieprzyk, Josef; Zhang, Jun; Pan, Lei; Li, Shudong; Orgun, Mehmet A.
2017-01-01
Quantum cryptography is commonly used to generate fresh secure keys with quantum signal transmission for instant use between two parties. However, research shows that the relatively low key generation rate hinders its practical use where a symmetric cryptography component consumes the shared key. That is, the security of the symmetric cryptography demands frequent rate of key updates, which leads to a higher consumption of the internal one-time-pad communication bandwidth, since it requires the length of the key to be as long as that of the secret. In order to alleviate these issues, we develop a matrix algorithm for fast and simple high-capacity quantum cryptography. Our scheme can achieve secure private communication with fresh keys generated from Fibonacci- and Lucas- valued orbital angular momentum (OAM) states for the seed to construct recursive Fibonacci and Lucas matrices. Moreover, the proposed matrix algorithm for quantum cryptography can ultimately be simplified to matrix multiplication, which is implemented and optimized in modern computers. Most importantly, considerably information capacity can be improved effectively and efficiently by the recursive property of Fibonacci and Lucas matrices, thereby avoiding the restriction of physical conditions, such as the communication bandwidth. PMID:28406240
Fast and simple high-capacity quantum cryptography with error detection.
Lai, Hong; Luo, Ming-Xing; Pieprzyk, Josef; Zhang, Jun; Pan, Lei; Li, Shudong; Orgun, Mehmet A
2017-04-13
Quantum cryptography is commonly used to generate fresh secure keys with quantum signal transmission for instant use between two parties. However, research shows that the relatively low key generation rate hinders its practical use where a symmetric cryptography component consumes the shared key. That is, the security of the symmetric cryptography demands frequent rate of key updates, which leads to a higher consumption of the internal one-time-pad communication bandwidth, since it requires the length of the key to be as long as that of the secret. In order to alleviate these issues, we develop a matrix algorithm for fast and simple high-capacity quantum cryptography. Our scheme can achieve secure private communication with fresh keys generated from Fibonacci- and Lucas- valued orbital angular momentum (OAM) states for the seed to construct recursive Fibonacci and Lucas matrices. Moreover, the proposed matrix algorithm for quantum cryptography can ultimately be simplified to matrix multiplication, which is implemented and optimized in modern computers. Most importantly, considerably information capacity can be improved effectively and efficiently by the recursive property of Fibonacci and Lucas matrices, thereby avoiding the restriction of physical conditions, such as the communication bandwidth.
Fast and simple high-capacity quantum cryptography with error detection
NASA Astrophysics Data System (ADS)
Lai, Hong; Luo, Ming-Xing; Pieprzyk, Josef; Zhang, Jun; Pan, Lei; Li, Shudong; Orgun, Mehmet A.
2017-04-01
Quantum cryptography is commonly used to generate fresh secure keys with quantum signal transmission for instant use between two parties. However, research shows that the relatively low key generation rate hinders its practical use where a symmetric cryptography component consumes the shared key. That is, the security of the symmetric cryptography demands frequent rate of key updates, which leads to a higher consumption of the internal one-time-pad communication bandwidth, since it requires the length of the key to be as long as that of the secret. In order to alleviate these issues, we develop a matrix algorithm for fast and simple high-capacity quantum cryptography. Our scheme can achieve secure private communication with fresh keys generated from Fibonacci- and Lucas- valued orbital angular momentum (OAM) states for the seed to construct recursive Fibonacci and Lucas matrices. Moreover, the proposed matrix algorithm for quantum cryptography can ultimately be simplified to matrix multiplication, which is implemented and optimized in modern computers. Most importantly, considerably information capacity can be improved effectively and efficiently by the recursive property of Fibonacci and Lucas matrices, thereby avoiding the restriction of physical conditions, such as the communication bandwidth.
NASA Astrophysics Data System (ADS)
Bartkiewicz, Karol; Chimczak, Grzegorz
2018-01-01
We describe a direct method to experimentally determine local two-qubit invariants by performing interferometric measurements on multiple copies of a given two-qubit state. We use this framework to analyze two different kinds of two-qubit invariants of Makhlin and Jing et al. These invariants allow us to fully reconstruct any two-qubit state up to local unitaries. We demonstrate that measuring three invariants is sufficient to find, e.g., the optimal Bell inequality violation. These invariants can be measured with local or nonlocal measurements. We show that the nonlocal strategy that follows from Makhlin's invariants is more resource efficient than local strategy following from the invariants of Jing et al. To measure all of the Makhlin's invariants directly one needs to use both two-qubit singlets and three-qubit W -state projections on multiple copies of the two-qubit state. This problem is equivalent to a coordinate system handedness measurement. We demonstrate that these three-qubit measurements can be performed by utilizing Hong-Ou-Mandel interference, which gives significant speedup in comparison to the classical handedness measurement. Finally, we point to potential applications of our results in quantum secret sharing.
Horizontal Gene Transfers in Mycoplasmas (Mollicutes).
Citti, C; Dordet-Frisoni, E; Nouvel, L X; Kuo, C H; Baranowski, E
2018-04-12
The class Mollicutes (trivial name "mycoplasma") is composed of wall-less bacteria with reduced genomes whose evolution was long thought to be only driven by gene losses. Recent evidences of massive horizontal gene transfer (HGT) within and across species provided a new frame to understand the successful adaptation of these minimal bacteria to a broad range of hosts. Mobile genetic elements are being identified in a growing number of mycoplasma species, but integrative and conjugative elements (ICEs) are emerging as pivotal in HGT. While sharing common traits with other bacterial ICEs, such as their chromosomal integration and the use of a type IV secretion system to mediate horizontal dissemination, mycoplasma ICEs (MICEs) revealed unique features: their chromosomal integration is totally random and driven by a DDE recombinase related to the Mutator-like superfamily. Mycoplasma conjugation is not restricted to ICE transmission, but also involves the transfer of large chromosomal fragments that generates progenies with mosaic genomes, nearly every position of chromosome being mobile. Mycoplasmas have thus developed efficient ways to gain access to a considerable reservoir of genetic resources distributed among a vast number of species expanding the concept of minimal cell to the broader context of flowing information.
Multiplexed Sequence Encoding: A Framework for DNA Communication
Zakeri, Bijan; Carr, Peter A.; Lu, Timothy K.
2016-01-01
Synthetic DNA has great propensity for efficiently and stably storing non-biological information. With DNA writing and reading technologies rapidly advancing, new applications for synthetic DNA are emerging in data storage and communication. Traditionally, DNA communication has focused on the encoding and transfer of complete sets of information. Here, we explore the use of DNA for the communication of short messages that are fragmented across multiple distinct DNA molecules. We identified three pivotal points in a communication—data encoding, data transfer & data extraction—and developed novel tools to enable communication via molecules of DNA. To address data encoding, we designed DNA-based individualized keyboards (iKeys) to convert plaintext into DNA, while reducing the occurrence of DNA homopolymers to improve synthesis and sequencing processes. To address data transfer, we implemented a secret-sharing system—Multiplexed Sequence Encoding (MuSE)—that conceals messages between multiple distinct DNA molecules, requiring a combination key to reveal messages. To address data extraction, we achieved the first instance of chromatogram patterning through multiplexed sequencing, thereby enabling a new method for data extraction. We envision these approaches will enable more widespread communication of information via DNA. PMID:27050646
Physical Layer Secret-Key Generation Scheme for Transportation Security Sensor Network
Yang, Bin; Zhang, Jianfeng
2017-01-01
Wireless Sensor Networks (WSNs) are widely used in different disciplines, including transportation systems, agriculture field environment monitoring, healthcare systems, and industrial monitoring. The security challenge of the wireless communication link between sensor nodes is critical in WSNs. In this paper, we propose a new physical layer secret-key generation scheme for transportation security sensor network. The scheme is based on the cooperation of all the sensor nodes, thus avoiding the key distribution process, which increases the security of the system. Different passive and active attack models are analyzed in this paper. We also prove that when the cooperative node number is large enough, even when the eavesdropper is equipped with multiple antennas, the secret-key is still secure. Numerical results are performed to show the efficiency of the proposed scheme. PMID:28657588
Physical Layer Secret-Key Generation Scheme for Transportation Security Sensor Network.
Yang, Bin; Zhang, Jianfeng
2017-06-28
Wireless Sensor Networks (WSNs) are widely used in different disciplines, including transportation systems, agriculture field environment monitoring, healthcare systems, and industrial monitoring. The security challenge of the wireless communication link between sensor nodes is critical in WSNs. In this paper, we propose a new physical layer secret-key generation scheme for transportation security sensor network. The scheme is based on the cooperation of all the sensor nodes, thus avoiding the key distribution process, which increases the security of the system. Different passive and active attack models are analyzed in this paper. We also prove that when the cooperative node number is large enough, even when the eavesdropper is equipped with multiple antennas, the secret-key is still secure. Numerical results are performed to show the efficiency of the proposed scheme.
The cytotoxic T lymphocyte immune synapse at a glance.
Dieckmann, Nele M G; Frazer, Gordon L; Asano, Yukako; Stinchcombe, Jane C; Griffiths, Gillian M
2016-08-01
The immune synapse provides an important structure for communication with immune cells. Studies on immune synapses formed by cytotoxic T lymphocytes (CTLs) highlight the dynamic changes and specialised mechanisms required to facilitate focal signalling and polarised secretion in immune cells. In this Cell Science at a Glance article and the accompanying poster, we illustrate the different steps that reveal the specialised mechanisms used to focus secretion at the CTL immune synapse and allow CTLs to be such efficient and precise serial killers. © 2016. Published by The Company of Biologists Ltd.
[The use of monosodium glutamate in the combined therapy of patients with atrophic gastritis].
Kochetkov, A M; Shlygin, G K; Loranskaia, T I; Vasilevskaia, L S; Kondrashev, S Iu
1992-01-01
Monosodium glutamate (MSG) taken per os has been found to stimulate gastric secretion provoked by pentagastrin. MSG gave rise to a marked elevation of endogenic gastrin levels both in experimental animals and atrophic gastritis patients. Thirty-six patients with secretory gastric insufficiency received MSG as an additive to their food during combined therapy of their disease. The preparation proved to be well-tolerated, good stimulant of gastric secretion, efficient in digestion improvement. MSG is recommended as an adjuvant in combined therapy of atrophic gastritis.
Wang, Huizhen; Larson, Melissa; Jablonka-Shariff, Albina; Pearl, Christopher A; Miller, William L; Conn, P Michael; Boime, Irving; Kumar, T Rajendra
2014-04-15
FSH and luteinizing hormone (LH) are secreted constitutively or in pulses, respectively, from pituitary gonadotropes in many vertebrates, and regulate ovarian function. The molecular basis for this evolutionarily conserved gonadotropin-specific secretion pattern is not understood. Here, we show that the carboxyterminal heptapeptide in LH is a gonadotropin-sorting determinant in vivo that directs pulsatile secretion. FSH containing this heptapeptide enters the regulated pathway in gonadotropes of transgenic mice, and is released in response to gonadotropin-releasing hormone, similar to LH. FSH released from the LH secretory pathway rescued ovarian defects in Fshb-null mice as efficiently as constitutively secreted FSH. Interestingly, the rerouted FSH enhanced ovarian follicle survival, caused a dramatic increase in number of ovulations, and prolonged female reproductive lifespan. Furthermore, the rerouted FSH vastly improved the in vivo fertilization competency of eggs, their subsequent development in vitro and when transplanted, the ability to produce offspring. Our study demonstrates the feasibility to fine-tune the target tissue responses by modifying the intracellular trafficking and secretory fate of a pituitary trophic hormone. The approach to interconvert the secretory fate of proteins in vivo has pathophysiological significance, and could explain the etiology of several hormone hyperstimulation and resistance syndromes.
Efficient Text Encryption and Hiding with Double-Random Phase-Encoding
Sang, Jun; Ling, Shenggui; Alam, Mohammad S.
2012-01-01
In this paper, a double-random phase-encoding technique-based text encryption and hiding method is proposed. First, the secret text is transformed into a 2-dimensional array and the higher bits of the elements in the transformed array are used to store the bit stream of the secret text, while the lower bits are filled with specific values. Then, the transformed array is encoded with double-random phase-encoding technique. Finally, the encoded array is superimposed on an expanded host image to obtain the image embedded with hidden data. The performance of the proposed technique, including the hiding capacity, the recovery accuracy of the secret text, and the quality of the image embedded with hidden data, is tested via analytical modeling and test data stream. Experimental results show that the secret text can be recovered either accurately or almost accurately, while maintaining the quality of the host image embedded with hidden data by properly selecting the method of transforming the secret text into an array and the superimposition coefficient. By using optical information processing techniques, the proposed method has been found to significantly improve the security of text information transmission, while ensuring hiding capacity at a prescribed level. PMID:23202003
MatureP: prediction of secreted proteins with exclusive information from their mature regions.
Orfanoudaki, Georgia; Markaki, Maria; Chatzi, Katerina; Tsamardinos, Ioannis; Economou, Anastassios
2017-06-12
More than a third of the cellular proteome is non-cytoplasmic. Most secretory proteins use the Sec system for export and are targeted to membranes using signal peptides and mature domains. To specifically analyze bacterial mature domain features, we developed MatureP, a classifier that predicts secretory sequences through features exclusively computed from their mature domains. MatureP was trained using Just Add Data Bio, an automated machine learning tool. Mature domains are predicted efficiently with ~92% success, as measured by the Area Under the Receiver Operating Characteristic Curve (AUC). Predictions were validated using experimental datasets of mutated secretory proteins. The features selected by MatureP reveal prominent differences in amino acid content between secreted and cytoplasmic proteins. Amino-terminal mature domain sequences have enhanced disorder, more hydroxyl and polar residues and less hydrophobics. Cytoplasmic proteins have prominent amino-terminal hydrophobic stretches and charged regions downstream. Presumably, secretory mature domains comprise a distinct protein class. They balance properties that promote the necessary flexibility required for the maintenance of non-folded states during targeting and secretion with the ability of post-secretion folding. These findings provide novel insight in protein trafficking, sorting and folding mechanisms and may benefit protein secretion biotechnology.
Efficient Access Control in Multimedia Social Networks
NASA Astrophysics Data System (ADS)
Sachan, Amit; Emmanuel, Sabu
Multimedia social networks (MMSNs) have provided a convenient way to share multimedia contents such as images, videos, blogs, etc. Contents shared by a person can be easily accessed by anybody else over the Internet. However, due to various privacy, security, and legal concerns people often want to selectively share the contents only with their friends, family, colleagues, etc. Access control mechanisms play an important role in this situation. With access control mechanisms one can decide the persons who can access a shared content and who cannot. But continuously growing content uploads and accesses, fine grained access control requirements (e.g. different access control parameters for different parts in a picture), and specific access control requirements for multimedia contents can make the time complexity of access control to be very large. So, it is important to study an efficient access control mechanism suitable for MMSNs. In this chapter we present an efficient bit-vector transform based access control mechanism for MMSNs. The proposed approach is also compatible with other requirements of MMSNs, such as access rights modification, content deletion, etc. Mathematical analysis and experimental results show the effectiveness and efficiency of our proposed approach.
Immune profiling of plasma and cervical secretions using recycling immunoaffinity chromatography.
Castle, Philip E; Phillips, Terry M; Hildesheim, Allan; Herrero, Rolando; Bratti, M Concepcion; Rodríguez, Ana Cecilia; Morera, Lidia Ana; Pfeiffer, Ruth; Hutchinson, Martha L; Pinto, Ligia A; Schiffman, Mark
2003-12-01
Small volumes of cervical secretions have limited measurements of immunity at the cervix, which may be important to studies of human papillomavirus (HPV). We report the use of recycling immunoaffinity chromatography to efficiently study immune profiles in cervical secretions. Frozen pairs of plasma and cervical secretions (collected on ophthalmic sponges) were selected randomly from women with normal cervical cytology (n = 50) participating in a natural history study of HPV in Guanacaste, Costa Rica. Single 25- micro l aliquots of plasma and (diluted) cervical secretions were assayed for interleukin (IL) -1 beta, -2, -4, -6, -8, -10, -12, -13, -15, IFN-alpha, -beta, -gamma, tumor necrosis factor-alpha, -beta, RANTES (regulated on activation normal T-cell express and secreted), MCP-1 (monocyte chemoattractant protein), -2, -3, macrophage inflammatory protein-1 alpha, -1 beta (regulated on activation normal T-cell express and secreted), macrophage colony-stimulating factor, IgG, IgA, and cyclooxygenase 2. All of the specimens were tested as blind replicates, and refrozen plasma was retested 4 months later. To evaluate the reproducibility of the repeat measurements and to examine the correlation between plasma and cervical secretions, we calculated kappa values with 95% confidence intervals among categorized analyte values and Spearman correlation coefficients (rho) among detectable, continuous analyte values. Measurements of all of the analytes in either plasma or cervical secretions were highly reproducible, with all of the kappa > or = 0.78 (70% above 0.90), and all of the rho > or = 0.88 (96% above 0.90). Only IL-1 beta (kappa = 0.60 and rho = 0.82) and IL-6 (kappa = 0.50 and rho = 0.78) levels were strongly correlated between plasma and cervical secretions. IFN-gamma, tumor necrosis factor-beta, RANTES, MCP-1, MCP -2, macrophage inflammatory protein-1 alpha, and macrophage colony-stimulating factor levels were especially poorly correlated between plasma and cervical secretions (kappa < or = 0.25 and rho < or = 0.25). We conclude that recycling immunoaffinity chromatography is a reproducible method of measuring immune profiles from biological specimens, and immune profiles are not well correlated between plasma and cervical secretions, perhaps necessitating cervical collections to study cervix-specific immunity in HPV natural history studies.
Das, Ashok Kumar; Goswami, Adrijit
2013-06-01
Connected health care has several applications including telecare medicine information system, personally controlled health records system, and patient monitoring. In such applications, user authentication can ensure the legality of patients. In user authentication for such applications, only the legal user/patient himself/herself is allowed to access the remote server, and no one can trace him/her according to transmitted data. Chang et al. proposed a uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care (Chang et al., J Med Syst 37:9902, 2013). Their scheme uses the user's personal biometrics along with his/her password with the help of the smart card. The user's biometrics is verified using BioHashing. Their scheme is efficient due to usage of one-way hash function and exclusive-or (XOR) operations. In this paper, we show that though their scheme is very efficient, their scheme has several security weaknesses such as (1) it has design flaws in login and authentication phases, (2) it has design flaws in password change phase, (3) it fails to protect privileged insider attack, (4) it fails to protect the man-in-the middle attack, and (5) it fails to provide proper authentication. In order to remedy these security weaknesses in Chang et al.'s scheme, we propose an improvement of their scheme while retaining the original merit of their scheme. We show that our scheme is efficient as compared to Chang et al.'s scheme. Through the security analysis, we show that our scheme is secure against possible attacks. Further, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to ensure that our scheme is secure against passive and active attacks. In addition, after successful authentication between the user and the server, they establish a secret session key shared between them for future secure communication.
NASA Astrophysics Data System (ADS)
Farouk, Ahmed; Zakaria, Magdy; Megahed, Adel; Omara, Fatma A.
2015-11-01
In this paper, we generalize a secured direct communication process between N users with partial and full cooperation of quantum server. So, N - 1 disjointed users u1, u2, …, uN-1 can transmit a secret message of classical bits to a remote user uN by utilizing the property of dense coding and Pauli unitary transformations. The authentication process between the quantum server and the users are validated by EPR entangled pair and CNOT gate. Afterwards, the remained EPR will generate shared GHZ states which are used for directly transmitting the secret message. The partial cooperation process indicates that N - 1 users can transmit a secret message directly to a remote user uN through a quantum channel. Furthermore, N - 1 users and a remote user uN can communicate without an established quantum channel among them by a full cooperation process. The security analysis of authentication and communication processes against many types of attacks proved that the attacker cannot gain any information during intercepting either authentication or communication processes. Hence, the security of transmitted message among N users is ensured as the attacker introduces an error probability irrespective of the sequence of measurement.
Farouk, Ahmed; Zakaria, Magdy; Megahed, Adel; Omara, Fatma A
2015-11-18
In this paper, we generalize a secured direct communication process between N users with partial and full cooperation of quantum server. So, N - 1 disjointed users u1, u2, …, uN-1 can transmit a secret message of classical bits to a remote user uN by utilizing the property of dense coding and Pauli unitary transformations. The authentication process between the quantum server and the users are validated by EPR entangled pair and CNOT gate. Afterwards, the remained EPR will generate shared GHZ states which are used for directly transmitting the secret message. The partial cooperation process indicates that N - 1 users can transmit a secret message directly to a remote user uN through a quantum channel. Furthermore, N - 1 users and a remote user uN can communicate without an established quantum channel among them by a full cooperation process. The security analysis of authentication and communication processes against many types of attacks proved that the attacker cannot gain any information during intercepting either authentication or communication processes. Hence, the security of transmitted message among N users is ensured as the attacker introduces an error probability irrespective of the sequence of measurement.
NASA Astrophysics Data System (ADS)
Abulkasim, Hussein; Hamad, Safwat; Elhadad, Ahmed
2018-02-01
In the Comment made by Gao (2018 Phys. Scr. 93 027002), it has been shown that the multiparty case in our proposed scheme in Abulkasim et al (2016 Phys. Scr. 91 085101) is not secure, where Bob and Charlie can deduce Alice’s unitary operations without being detected. This reply shows a simple modification of the multiparty case to prevent the dishonest agents from performing this kind of attack.
Secret Sharing Schemes and Advanced Encryption Standard
2015-09-01
commutative . Definition 1.2.2. [3, pp. 167] The most general algebraic structure, ring < R,+, · >, is a set R together with two binary operations + and...Abstract Algebra, 7th ed. Pearson Education India , 2003. [4] A. Herschfeld, “The equation 2x− 3y = d,” Bulletin of the American Mathematical Society, vol...R.Balasubramaniam and R. Thangadurai, Eds. India : Ra- manujan Mathematical Society, pp. xxii–xlvii, 2009. [6] R. Stroeker and R. Tijdeman, “Diophantine
Hussain, Hirra; Fisher, David I; Abbott, W Mark; Roth, Robert G; Dickson, Alan J
2017-10-01
Certain recombinant proteins are deemed "difficult to express" in mammalian expression systems requiring significant cell and/or process engineering to abrogate expression bottlenecks. With increasing demand for the production of recombinant proteins in mammalian cells, low protein yields can have significant consequences for industrial processes. To investigate the molecular mechanisms that restrict expression of recombinant proteins, naturally secreted model proteins were analyzed from the tissue inhibitors of metalloproteinase (TIMP) protein family. In particular, TIMP-2 and TIMP-3 were subjected to detailed study. TIMP proteins share significant sequence homology (∼50% identity and ∼70% similarity in amino acid sequence). However, they show marked differences in secretion in mammalian expression systems despite this extensive sequence homology. Using these two proteins as models, this study characterized the molecular mechanisms responsible for poor recombinant protein production. Our results reveal that both TIMP-2 and TIMP-3 are detectable at mRNA and protein level within the cell but only TIMP-2 is secreted effectively into the extracellular medium. Analysis of protein localization and the nature of intracellular protein suggest TIMP-3 is severely limited in its post-translational processing. To overcome this challenge, modification of the TIMP-3 sequence to include a furin protease-cleavable pro-sequence resulted in secretion of the modified TIMP-3 protein, however, incomplete processing was observed. Based on the TIMP-3 data, the protein engineering approach was optimized and successfully applied in combination with cell engineering, the overexpression of furin, to another member of the TIMP protein family (the poorly expressed TIMP-4). Use of the described protein engineering strategy resulted in successful secretion of poorly (TIMP-4) and non-secreted (TIMP-3) targets, and presents a novel strategy to enhance the production of "difficult" recombinant targets. Biotechnol. Bioeng. 2017;114: 2348-2359. © 2017 Wiley Periodicals, Inc. © 2017 Wiley Periodicals, Inc.
Enhanced diffie-hellman algorithm for reliable key exchange
NASA Astrophysics Data System (ADS)
Aryan; Kumar, Chaithanya; Vincent, P. M. Durai Raj
2017-11-01
The Diffie -Hellman is one of the first public-key procedure and is a certain way of exchanging the cryptographic keys securely. This concept was introduced by Ralph Markel and it is named after Whitfield Diffie and Martin Hellman. Sender and Receiver make a common secret key in Diffie-Hellman algorithm and then they start communicating with each other over the public channel which is known to everyone. A number of internet services are secured by Diffie -Hellman. In Public key cryptosystem, the sender has to trust while receiving the public key of the receiver and vice-versa and this is the challenge of public key cryptosystem. Man-in-the-Middle attack is very much possible on the existing Diffie-Hellman algorithm. In man-in-the-middle attack, the attacker exists in the public channel, the attacker receives the public key of both sender and receiver and sends public keys to sender and receiver which is generated by his own. This is how man-in-the-middle attack is possible on Diffie-Hellman algorithm. Denial of service attack is another attack which is found common on Diffie-Hellman. In this attack, the attacker tries to stop the communication happening between sender and receiver and attacker can do this by deleting messages or by confusing the parties with miscommunication. Some more attacks like Insider attack, Outsider attack, etc are possible on Diffie-Hellman. To reduce the possibility of attacks on Diffie-Hellman algorithm, we have enhanced the Diffie-Hellman algorithm to a next level. In this paper, we are extending the Diffie -Hellman algorithm by using the concept of the Diffie -Hellman algorithm to get a stronger secret key and that secret key is further exchanged between the sender and the receiver so that for each message, a new secret shared key would be generated. The second secret key will be generated by taking primitive root of the first secret key.
Kuenzel, Heike E; Steiger, Axel; Held, Katja; Antonijevic, Irina A; Frieboes, Ralf-Michael; Murck, Harald
2005-07-01
Sarizotan is a 5-HT(1A) agonist with high affinity to D(3) and D(4) receptors. In animal experiments, the drug shows a strong anti-cataleptic effect and suppresses effectively dyskinesias in animal models of L: -dopa-induced dyskinesia and of tardive dyskinesia. Data from an open pilot study in patients with Parkinson's disease show clear indication of a treatment effect against L: -dopa-induced dyskinesia. CNS-active drugs are known to modulate sleep electroencephalogram (EEG) and sleep-related hormone secretion. 5-HT(1A) agonists suppress rapid-eye movement (REM) sleep and enhance the secretion of ACTH, cortisol, prolactin and growth hormone (GH) at daytime. We hypothesised that sarizotan shares these effects. Furthermore, we were interested in the influence of sarizotan on leptin, which participates in the regulation of the energy balance and is enhanced after various psychoactive drugs. Ten healthy male subjects were investigated twice in a double-blind, placebo-controlled crossover design. Sleep EEG and nocturnal hormone secretion of ACTH, cortisol, prolactin, GH and leptin were examined after oral administration of either placebo or 20 mg of sarizotan at night. After administration of sarizotan, a significant reduction of REM sleep and total sleep time in conventional sleep EEG and a significant reduction of sigma- and theta-power in spectral analysis were observed. The main effect on nocturnal hormone secretion was a significant elevation of prolactin and of ACTH in the first half of the night. While REM sleep was suppressed, the endocrine effects of 20 mg sarizotan at night were weak. Its sleep-endocrine profile is comparable to the effects provoked by selective 5-HT reuptake inhibitors.
[Rice endogenous nitrogen fixing and growth promoting bacterium Herbaspirillum seropedicae DX35].
Wang, Xiucheng; Cao, Yanhua; Tang, Xue; Ma, Xiaotong; Gao, Jusheng; Zhang, Xiaoxia
2014-03-04
To screen efficient nitrogen fixation endophytes from rice and to analyze their growth-promoting properties. We isolated strains from the roots of rice in the field where it has a rice-rice-green manure rotation system for 30 years. Efficient strains were screened by acetylene reduction assay. Phylogenetic analysis is based on 16S rRNA gene, nifH gene and the composition of fatty acid. In addition, we also detected the ability of indole acetic acid secretion through the Salkowski colorimetric method, measured the production of siderophore through the blue plate assay and detected phosphate solubilization, to analyze the growth-promoting properties. A total of 48 strains were isolated, in which DX35 has the highest nitrogenase activity. It belongs to Herbaspirillum seropedicae after identification. Its nitrogenase activity (181.21 nmol C2H4/(mg protein x h)) was 10 times as much as the reference strain Azotobacter chroococcum ACCC10006. In addition, it also can secrete siderophore and solubilize phosphorus. Strain DX35, belonging to Herbaspirillum seropedicae, is an efficient nitrogen fixation endophytes.
Chattopadhyay, Saurabh; Kessler, Sean P; Colucci, Juliana Almada; Yamashita, Michifumi; Senanayake, Preenie deS; Sen, Ganes C
2014-01-01
Angiotensin-converting enzyme (ACE) regulates normal blood pressure and fluid homeostasis through its action in the renin-angiotensin-system (RAS). Ace-/- mice are smaller in size, have low blood pressure and defective kidney structure and functions. All of these defects are cured by transgenic expression of somatic ACE (sACE) in vascular endothelial cells of Ace-/- mice. sACE is expressed on the surface of vascular endothelial cells and undergoes a natural cleavage secretion process to generate a soluble form in the body fluids. Both the tissue-bound and the soluble forms of ACE are enzymatically active, and generate the vasoactive octapeptide Angiotensin II (Ang II) with equal efficiency. To assess the relative physiological roles of the secreted and the cell-bound forms of ACE, we expressed, in the vascular endothelial cells of Ace-/- mice, the ectodomain of sACE, which corresponded to only the secreted form of ACE. Our results demonstrated that the secreted form of ACE could normalize kidney functions and RAS integrity, growth and development of Ace-/- mice, but not their blood pressure. This study clearly demonstrates that the secreted form of ACE cannot replace the tissue-bound ACE for maintaining normal blood pressure; a suitable balance between the tissue-bound and the soluble forms of ACE is essential for maintaining all physiological functions of ACE.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Matzuk, M.M.; Krieger, M.; Corless, C.L.
1987-09-01
Human chorionic gonadotropin (hCG) is a member of a family of heterodimeric glycoprotein hormones that have a common ..cap alpha.. subunit but differ in their hormone-specific ..beta..-subunits. The ..beta.. subunit of hCG (hCG..beta..) is unique among the ..beta.. subunits in that it contains four mucin-like O-linked oligosaccharides attached to a carboxyl-terminal extension. To study the effects of O-glycosylation on the secretion and assembly of hCG, expression vectors containing either hCG..beta.. gene alone or together with the hCG..cap alpha.. gene were transfected into a mutant Chinese hamster ovary cell line, 1d1D, which exhibits a reversible defect in O-glycosylation. The results revealmore » that hCG..beta.. can be secreted normally in the absence of its O-linked oligosaccharides. hCG..beta.. devoid of O-linked carbohydrate can also combine efficiently with hCG..cap alpha.. and be secreted as an intact dimer. The authors conclude that in Chinese hamster ovary cells, the hCG..beta.. O-linked chains play no role in the assembly and secretion of hCG. The normal and O-linked oligosaccharide-deficient forms of hCG secreted by these cells should prove useful in examining the role of O-linked chains on the biological function of hCG.« less
Chattopadhyay, Saurabh; Kessler, Sean P.; Colucci, Juliana Almada; Yamashita, Michifumi; Senanayake, Preenie deS; Sen, Ganes C.
2014-01-01
Angiotensin-converting enzyme (ACE) regulates normal blood pressure and fluid homeostasis through its action in the renin-angiotensin-system (RAS). Ace-/- mice are smaller in size, have low blood pressure and defective kidney structure and functions. All of these defects are cured by transgenic expression of somatic ACE (sACE) in vascular endothelial cells of Ace-/- mice. sACE is expressed on the surface of vascular endothelial cells and undergoes a natural cleavage secretion process to generate a soluble form in the body fluids. Both the tissue-bound and the soluble forms of ACE are enzymatically active, and generate the vasoactive octapeptide Angiotensin II (Ang II) with equal efficiency. To assess the relative physiological roles of the secreted and the cell-bound forms of ACE, we expressed, in the vascular endothelial cells of Ace-/- mice, the ectodomain of sACE, which corresponded to only the secreted form of ACE. Our results demonstrated that the secreted form of ACE could normalize kidney functions and RAS integrity, growth and development of Ace-/- mice, but not their blood pressure. This study clearly demonstrates that the secreted form of ACE cannot replace the tissue-bound ACE for maintaining normal blood pressure; a suitable balance between the tissue-bound and the soluble forms of ACE is essential for maintaining all physiological functions of ACE. PMID:24475296
TNF-α potentiates uric acid-induced interleukin-1β (IL-1β) secretion in human neutrophils.
Yokose, Kohei; Sato, Shuzo; Asano, Tomoyuki; Yashiro, Makiko; Kobayashi, Hiroko; Watanabe, Hiroshi; Suzuki, Eiji; Sato, Chikako; Kozuru, Hideko; Yatsuhashi, Hiroshi; Migita, Kiyoshi
2018-05-01
Monosodium urate (MSU) has been shown to promote interleukin-1β (IL-1β) secretion in human monocytes, but the priming signals for NOD-like receptor family pyrin domain containing 3 (NLRP3) inflammasome pathway remains elusive. In this study, we investigated the role of Tumor necrosis factor-alpha (TNF-α) on MSU-mediated IL-1β induction in human neutrophils. Human neutrophils were stimulated with MSU, in the presence or absence of TNF-α priming. The cellular supernatants were analyzed for IL-1β, IL-18, and caspase-1 by enzyme-linked immunosorbent assay (ELISA) methods. Pro-IL-1β mRNA expressions in human neutrophils were analyzed by real-time PCR method. TNF-α stimulation induced pro-IL-1β mRNA expression; however, MSU stimulation did not induce pro-IL-1β mRNA expression in human neutrophils. TNF-α alone or MSU stimulation did not result in efficient IL-1β secretion in human neutrophils, whereas in TNF-α-primed neutrophils, MSU stimulation resulted in a marked IL-1β and IL-18 secretion. TNF-α-primed neutrophils secreted cleaved caspase-1 (p20), in response to MSU stimulation. Our data demonstrate that priming of human neutrophils with TNF-α promotes uric acid-mediated IL-1β secretion in the absence of microbial stimulation. These findings provide insights into the neutrophils-mediated inflammatory processes in gouty arthritis.
What should the management of incest pregnancies be? An ethical view presented via three cases.
Yuksel, B; Kilic, S; Akin Su, F; Tasdemir, N; Uzunlar, O; Mollamahmutoglu, L
2008-01-01
Incest is a taboo and a neglected social problem. Especially in the adolescent population, which is a very sensitive period of development, it becomes harder for the patients to share their secret with either legal or health authorities. Sometimes pregnancy becomes the only vehicle to uncover this secret. There is a contradiction whether their pregnancies should continue or not. Some authors believe abortion is the best choice for the victim to pull herself together, whereas others advocate that it is just another trauma that will not solve the problem but merely hide it. In this report, three paternal incest cases and their pregnancies will be presented. The aim is not only to discuss the different points of view regarding the management of these pregnancies but also to make the clinicians think about the different choices before making a decision.
Dynamic Regulation of Ero1α and Peroxiredoxin 4 Localization in the Secretory Pathway*
Kakihana, Taichi; Araki, Kazutaka; Vavassori, Stefano; Iemura, Shun-ichiro; Cortini, Margherita; Fagioli, Claudio; Natsume, Tohru; Sitia, Roberto; Nagata, Kazuhiro
2013-01-01
In the early secretory compartment (ESC), a network of chaperones and enzymes assists oxidative folding of nascent proteins. Ero1 flavoproteins oxidize protein disulfide isomerase (PDI), generating H2O2 as a byproduct. Peroxiredoxin 4 (Prx4) can utilize luminal H2O2 to oxidize PDI, thus favoring oxidative folding while limiting oxidative stress. Interestingly, neither ER oxidase contains known ER retention signal(s), raising the question of how cells prevent their secretion. Here we show that the two proteins share similar intracellular localization mechanisms. Their secretion is prevented by sequential interactions with PDI and ERp44, two resident proteins of the ESC-bearing KDEL-like motifs. PDI binds preferentially Ero1α, whereas ERp44 equally retains Ero1α and Prx4. The different binding properties of Ero1α and Prx4 increase the robustness of ER redox homeostasis. PMID:23979138
Zheden, Vanessa; Kovalev, Alexander; Gorb, Stanislav N; Klepal, Waltraud
2015-02-06
Dosima fascicularis is the only barnacle which can drift autonomously at the water surface with a foam-like cement float. The cement secreted by the animal contains numerous gas-filled cells of different size. When several individuals share one float, their size and not their number is crucial for the production of both volume and mass of the float. The gas content within the cells of the foam gives positive static buoyancy to the whole float. The volume of the float, the gas volume and the positive static buoyancy are positively correlated. The density of the cement float without gas is greater than that of seawater. This study shows that the secreted cement consists of more than 90% water and the gas volume is on average 18.5%. Our experiments demonstrate that the intact foam-like cement float is sealed to the surrounding water.
Zheden, Vanessa; Kovalev, Alexander; Gorb, Stanislav N.; Klepal, Waltraud
2015-01-01
Dosima fascicularis is the only barnacle which can drift autonomously at the water surface with a foam-like cement float. The cement secreted by the animal contains numerous gas-filled cells of different size. When several individuals share one float, their size and not their number is crucial for the production of both volume and mass of the float. The gas content within the cells of the foam gives positive static buoyancy to the whole float. The volume of the float, the gas volume and the positive static buoyancy are positively correlated. The density of the cement float without gas is greater than that of seawater. This study shows that the secreted cement consists of more than 90% water and the gas volume is on average 18.5%. Our experiments demonstrate that the intact foam-like cement float is sealed to the surrounding water. PMID:25657839
Structure of the uncleaved ectodomain of the paramyxovirus (hPIV3) fusion protein
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yin, Hsien-Sheng; Paterson, Reay G.; Wen, Xiaolin
2010-03-08
Class I viral fusion proteins share common mechanistic and structural features but little sequence similarity. Structural insights into the protein conformational changes associated with membrane fusion are based largely on studies of the influenza virus hemagglutinin in pre- and postfusion conformations. Here, we present the crystal structure of the secreted, uncleaved ectodomain of the paramyxovirus, human parainfluenza virus 3 fusion (F) protein, a member of the class I viral fusion protein group. The secreted human parainfluenza virus 3 F forms a trimer with distinct head, neck, and stalk regions. Unexpectedly, the structure reveals a six-helix bundle associated with the postfusionmore » form of F, suggesting that the anchor-minus ectodomain adopts a conformation largely similar to the postfusion state. The transmembrane anchor domains of F may therefore profoundly influence the folding energetics that establish and maintain a metastable, prefusion state.« less
NASA Astrophysics Data System (ADS)
Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing
2015-09-01
In this paper, a novel image encryption system with fingerprint used as a secret key is proposed based on the phase retrieval algorithm and RSA public key algorithm. In the system, the encryption keys include the fingerprint and the public key of RSA algorithm, while the decryption keys are the fingerprint and the private key of RSA algorithm. If the users share the fingerprint, then the system will meet the basic agreement of asymmetric cryptography. The system is also applicable for the information authentication. The fingerprint as secret key is used in both the encryption and decryption processes so that the receiver can identify the authenticity of the ciphertext by using the fingerprint in decryption process. Finally, the simulation results show the validity of the encryption scheme and the high robustness against attacks based on the phase retrieval technique.
NASA Astrophysics Data System (ADS)
Colbeck, Roger; Kent, Adrian
2006-03-01
Alice is a charismatic quantum cryptographer who believes her parties are unmissable; Bob is a (relatively) glamorous string theorist who believes he is an indispensable guest. To prevent possibly traumatic collisions of self-perception and reality, their social code requires that decisions about invitation or acceptance be made via a cryptographically secure variable-bias coin toss (VBCT). This generates a shared random bit by the toss of a coin whose bias is secretly chosen, within a stipulated range, by one of the parties; the other party learns only the random bit. Thus one party can secretly influence the outcome, while both can save face by blaming any negative decisions on bad luck. We describe here some cryptographic VBCT protocols whose security is guaranteed by quantum theory and the impossibility of superluminal signaling, setting our results in the context of a general discussion of secure two-party computation. We also briefly discuss other cryptographic applications of VBCT.
Secret Forwarding of Events over Distributed Publish/Subscribe Overlay Network.
Yoon, Young; Kim, Beom Heyn
2016-01-01
Publish/subscribe is a communication paradigm where loosely-coupled clients communicate in an asynchronous fashion. Publish/subscribe supports the flexible development of large-scale, event-driven and ubiquitous systems. Publish/subscribe is prevalent in a number of application domains such as social networking, distributed business processes and real-time mission-critical systems. Many publish/subscribe applications are sensitive to message loss and violation of privacy. To overcome such issues, we propose a novel method of using secret sharing and replication techniques. This is to reliably and confidentially deliver decryption keys along with encrypted publications even under the presence of several Byzantine brokers across publish/subscribe overlay networks. We also propose a framework for dynamically and strategically allocating broker replicas based on flexibly definable criteria for reliability and performance. Moreover, a thorough evaluation is done through a case study on social networks using the real trace of interactions among Facebook users.
Secret Forwarding of Events over Distributed Publish/Subscribe Overlay Network
Kim, Beom Heyn
2016-01-01
Publish/subscribe is a communication paradigm where loosely-coupled clients communicate in an asynchronous fashion. Publish/subscribe supports the flexible development of large-scale, event-driven and ubiquitous systems. Publish/subscribe is prevalent in a number of application domains such as social networking, distributed business processes and real-time mission-critical systems. Many publish/subscribe applications are sensitive to message loss and violation of privacy. To overcome such issues, we propose a novel method of using secret sharing and replication techniques. This is to reliably and confidentially deliver decryption keys along with encrypted publications even under the presence of several Byzantine brokers across publish/subscribe overlay networks. We also propose a framework for dynamically and strategically allocating broker replicas based on flexibly definable criteria for reliability and performance. Moreover, a thorough evaluation is done through a case study on social networks using the real trace of interactions among Facebook users. PMID:27367610
Cognitive approaches for patterns analysis and security applications
NASA Astrophysics Data System (ADS)
Ogiela, Marek R.; Ogiela, Lidia
2017-08-01
In this paper will be presented new opportunities for developing innovative solutions for semantic pattern classification and visual cryptography, which will base on cognitive and bio-inspired approaches. Such techniques can be used for evaluation of the meaning of analyzed patterns or encrypted information, and allow to involve such meaning into the classification task or encryption process. It also allows using some crypto-biometric solutions to extend personalized cryptography methodologies based on visual pattern analysis. In particular application of cognitive information systems for semantic analysis of different patterns will be presented, and also a novel application of such systems for visual secret sharing will be described. Visual shares for divided information can be created based on threshold procedure, which may be dependent on personal abilities to recognize some image details visible on divided images.
Robert, S; Van Huynegem, K; Gysemans, C; Mathieu, C; Rottiers, P; Steidler, L
2015-01-01
Type 1 diabetes (T1D) is a chronic autoimmune disease characterised by excessive immune reactions against auto-antigens of pancreatic β-cells. Restoring auto-antigen tolerance remains the superior therapeutic strategy. Oral auto-antigen administration uses the tolerogenic nature of the gut-associated immune system to induce antigen-specific tolerance. However, due to gastric degradation, proper mucosal product delivery often imposes a challenge. Recombinant Lactococcus lactis have proven to be effective and safe carriers for gastrointestinal delivery of therapeutic products: L. lactis secreting diabetes-associated auto-antigens in combination with interleukin (IL)-10 have demonstrated therapeutic efficacy in a well-defined mouse model for T1D. Here, we describe the construction of recombinant L. lactis secreting the 65 kDa isoform of glutamic acid decarboxylase (GAD65) and tyrosine phosphatase-like protein ICA512 (IA-2), two major T1D-related auto-antigens. Attempts to secrete full size human GAD65 and IA-2 protein by L. lactis were unsuccessful. Trimming of GAD65 and IA-2 was investigated to optimise antigen secretion while maintaining sufficient bacterial growth. GAD65370-575 and IA-2635-979 showed to be efficiently secreted by recombinant L. lactis. Antigen secretion was verified by immunoblotting. Plasmid-derived GAD65 and IA-2 expression was combined in single strains with human IL-10 expression, a desired combination to allow tolerance induction. This study reports the generation of recombinant L. lactis secreting two major diabetes-related auto-antigens: human GAD65 and IA-2, by themselves or combined with the anti-inflammatory cytokine human IL-10. Prohibitive sequence obstacles hampering antigen secretion were resolved by trimming the full size proteins.
Kavitha, S; Adish Kumar, S; Yogalakshmi, K N; Kaliappan, S; Rajesh Banu, J
2013-12-01
In this study, the effect of Ethylene diamine tetra acetic acid (EDTA) on Extracellular polymeric substance (EPS) removal tailed with bacterial enzymatic pretreatment on aerobic digestion of activated sludge was studied. In order to enhance the accessibility of sludge to the enzyme secreting bacteria; the extracellular polymeric substances were removed using EDTA. EDTA efficiently removed the EPS with limited cell lysis and enhanced the sludge enzyme activity at its lower concentration of 0.2 g/g SS. The sludge was then subjected to bacterial pretreatment to enhance the aerobic digestion. In aerobic digestion the best results in terms of Suspended solids (SS) reduction (48.5%) and COD (Chemical oxygen demand) solubilization (47.3%) was obtained in experimental reactor than in control. These results imply that aerobic digestion can be enhanced efficiently through bacterial pretreatment of EPS removed sludge. Copyright © 2013 Elsevier Ltd. All rights reserved.
Eugster, Philippe J; Salamin, Karine; Grouzmann, Eric; Monod, Michel
2015-12-01
Prolyl endopeptidases are key enzymes in the digestion of proline-rich proteins. Fungal extracts rich in prolyl endopeptidases produced by a species such as Aspergillus oryzae used in food fermentation would be of particular interest for the development of an oral enzyme therapy product in patients affected by intolerance to gluten. Two major A. oryzae secreted prolyl endopeptidases of the MEROPS S28 peptidase family, AoS28A and AoS28B, were identified when this fungus was grown at acidic pH in a medium containing soy meal protein or wheat gliadin as the sole source of nitrogen. AoS28B was produced by 12 reference A. oryzae strains used in food fermentation. AoS28A was secreted by six of these 12 strains. This protease is the orthologue of the previously characterized Aspergillus fumigatus (AfuS28) and Aspergillus niger (AN-PEP) prolyl endopeptidases which are encoded by genes with a similar intron-exon structure. Large amounts of secreted AoS28A and AoS28B were obtained by gene overexpression in A. oryzae. AoS28A and AoS28B are endoproteases able to cleave N-terminally blocked proline substrates. Both enzymes very efficiently digested the proline-rich 33-mer of gliadin, the most representative immunotoxic peptide deriving from gliadin, with some differences in terms of specificity and optimal pH. Digestion of the gliadin peptide in short peptides with both enzymes was found to occur from its N terminus.
Collaborative patient-provider communication and uptake of adolescent vaccines.
Moss, Jennifer L; Reiter, Paul L; Rimer, Barbara K; Brewer, Noel T
2016-06-01
Recommendations from healthcare providers are one of the most consistent correlates of adolescent vaccination, but few studies have investigated other elements of patient-provider communication and their relevance to uptake. We examined competing hypotheses about the relationship of patient-driven versus provider-driven communication styles with vaccination. We gathered information about vaccine uptake from healthcare provider-verified data in the 2010 National Immunization Survey-Teen for tetanus, diphtheria, and pertussis (Tdap) booster, meningococcal vaccine, and human papillomavirus (HPV) vaccine (initiation among females) for adolescents ages 13-17. We categorized communication style in parents' conversations with healthcare providers about vaccines, based on parents' reports (of whether a provider recommended a vaccine and, if so, if conversations were informed, shared, or efficient) (N = 9021). Most parents reported either no provider recommendation (Tdap booster: 35%; meningococcal vaccine: 46%; and HPV vaccine: 31%) or reported a provider recommendation and shared patient-provider communication (43%, 38%, and 49%, respectively). Provider recommendations were associated with increased odds of vaccination (all ps < 0.001). In addition, more provider-driven communication styles were associated with higher rates of uptake for meningococcal vaccine (efficient style: 82% vs. shared style: 77% vs. informed style: 68%; p < 0.001 for shared vs. informed) and HPV vaccine (efficient style: 90% vs. shared style: 70% vs. informed style: 33%; p < 0.05 for all comparisons). Efficient communication styles were used rarely (≤2% across vaccines) but were highly effective for encouraging meningococcal and HPV vaccination. Intervention studies are needed to confirm that efficient communication approaches increase HPV vaccination among adolescents. Copyright © 2016 Elsevier Ltd. All rights reserved.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kusabuka, Hotaka; Fujiwara, Kento; Tokunaga, Yusuke
Adoptive immunotherapy using chimeric antigen receptor-expressing T (CAR-T) cells has attracted attention as an efficacious strategy for cancer treatment. To prove the efficacy and safety of CAR-T cell therapy, the elucidation of immunological mechanisms underlying it in mice is required. Although a retroviral vector (Rv) is mainly used for the introduction of CAR to murine T cells, gene transduction efficiency is generally less than 50%. The low transduction efficiency causes poor precision in the functional analysis of CAR-T cells. We attempted to improve the Rv gene transduction protocol to more efficiently generate functional CAR-T cells by optimizing the period ofmore » pre-cultivation and antibody stimulation. In the improved protocol, gene transduction efficiency to murine T cells was more than 90%. In addition, almost all of the prepared murine T cells expressed CAR after puromycin selection. These CAR-T cells had antigen-specific cytotoxic activity and secreted multiple cytokines by antigen stimulation. We believe that our optimized gene transduction protocol for murine T cells contributes to the advancement of T cell biology and development of immunotherapy using genetically engineered T cells. - Highlights: • We established highly efficient gene transduction protocols for murine T cells. • CD8{sup +} CAR-T cells had antigen-specific cytotoxic activity. • CD4{sup +} CAR-T cells secreted multiple cytokines by antigen stimulation. • This finding can contribute to the development of T-cell biology and immunotherapy.« less
Calcium-dependent transferrin receptor recycling in bovine chromaffin cells.
Knight, Derek E
2002-04-01
The release of regulated secretory granules is known to be calcium dependent. To examine the Ca2+-dependence of other exocytic fusion events, transferrin recycling in bovine chromaffin cells was examined. Internalised 125I-transferrin was released constitutively from cells with a half-time of about 7 min. Secretagogues that triggered catecholamine secretion doubled the rate of 125I-transferrin release, the time courses of the two triggered secretory responses being similar. The triggered 125I-transferrin release came from recycling endosomes rather than from sorting endosomes or a triggered secretory vesicle pool. Triggered 125I-transferrin release, like catecholamine secretion from the same cells, was calcium dependent but the affinities for calcium were very different. The extracellular calcium concentrations that gave rise to half-maximal evoked secretion were 0.1 mm for 125I-transferrin and 1.0 mm for catecholamine, and the intracellular concentrations were 0.1 microm and 1 microm, respectively. There was significant 125I-transferrin recycling in the virtual absence of intracellular Ca2+, but the rate increased when Ca2+ was raised above 1 nm, and peaked at 1 microm when the rate had doubled. Botulinum toxin type D blocked both transferrin recycling and catecholamine secretion. These results indicate that a major component of the vesicular transport required for the constitutive recycling of transferrin in quiescent cells is calcium dependent and thus under physiological control, and also that some of the molecular machinery involved in transferrin recycling/fusion processes is shared with that for triggered neurosecretion.
ERIC Educational Resources Information Center
Yang, Tung-Mou
2011-01-01
Information sharing and integration has long been considered an important approach for increasing organizational efficiency and performance. With advancements in information and communication technologies, sharing and integrating information across organizations becomes more attractive and practical to organizations. However, achieving…
Okazaki, Fumiyoshi; Aoki, Jun-ichi; Tabuchi, Soichiro; Tanaka, Tsutomu; Ogino, Chiaki; Kondo, Akihiko
2012-10-01
We have constructed a filamentous fungus Aspergillus oryzae that secretes a llama variable heavy-chain antibody fragment (V(HH)) that binds specifically to epidermal growth factor receptor (EGFR) in a culture medium. A major improvement in yield was achieved by fusing the V(HH) with a Taka-amylase A signal sequence (sTAA) and a segment of 28 amino acids from the N-terminal region of Rhizopus oryzae lipase (N28). The yields of secreted, immunologically active anti-EGFR V(HH) reached 73.8 mg/1 in a Sakaguchi flask. The V(HH) fragments were released from the sTAA or N28 proteins by an indigenous A. oryzae protease during cultivation. The purified recombinant V(HH) fragment was specifically recognized and could bind to the EGFR with a high affinity.
Insulin-secreting non-islet cells are resistant to autoimmune destruction.
Lipes, M A; Cooper, E M; Skelly, R; Rhodes, C J; Boschetti, E; Weir, G C; Davalli, A M
1996-01-01
Transgenic nonobese diabetic mice were created in which insulin expression was targeted to proopiomelanocortin-expressing pituitary cells. Proopiomelanocortin-expressing intermediate lobe pituitary cells efficiently secrete fully processed, mature insulin via a regulated secretory pathway, similar to islet beta cells. However, in contrast to the insulin-producing islet beta cells, the insulin-producing intermediate lobe pituitaries are not targeted or destroyed by cells of the immune system. Transplantation of the transgenic intermediate lobe tissues into diabetic nonobese diabetic mice resulted in the restoration of near-normoglycemia and the reversal of diabetic symptoms. The absence of autoimmunity in intermediate lobe pituitary cells engineered to secrete bona fide insulin raises the potential of these cell types for beta-cell replacement therapy for the treatment of insulin-dependent diabetes mellitus. Images Fig. 1 Fig. 2 Fig. 3 Fig. 4 PMID:8710916
Butler, Mark H; Harper, James M; Seedall, Ryan B
2009-01-01
A critical and potentially polarizing decision in treating infidelity is whether facilitating partner disclosure or accommodating nondisclosure is most beneficial following private disclosure of infidelity to the therapist. Given couple distress and volatility following disclosure, understandably some therapists judge accommodating an infidelity secret both efficient and compassionate. Employing Western ethics and an attachment/intimacy lens, we consider ethical, pragmatic, and attachment intimacy implications of accommodating infidelity secrets. Issues bearing on the decision to facilitate disclosure or accommodate nondisclosure include (a) relationship ethics and pragmatics; (b) attachment and intimacy consequences; and (c) prospects for healing. We conclude that facilitating voluntary disclosure of infidelity, although difficult and demanding, represents the most ethical action with the best prospects for renewed and vital attachment intimacy.
van Anken, Eelco; Pena, Florentina; Hafkemeijer, Nicole; Christis, Chantal; Romijn, Edwin P.; Grauschopf, Ulla; Oorschot, Viola M. J.; Pertel, Thomas; Engels, Sander; Ora, Ari; Lástun, Viorica; Glockshuber, Rudi; Klumperman, Judith; Heck, Albert J. R.; Luban, Jeremy; Braakman, Ineke
2009-01-01
Plasma cells daily secrete their own mass in antibodies, which fold and assemble in the endoplasmic reticulum (ER). To reach these levels, cells require pERp1, a novel lymphocyte-specific small ER-resident protein, which attains expression levels as high as BiP when B cells differentiate into plasma cells. Although pERp1 has no homology with known ER proteins, it does contain a CXXC motif typical for oxidoreductases. In steady state, the CXXC cysteines are locked by two parallel disulfide bonds with a downstream C(X)6C motif, and pERp1 displays only modest oxidoreductase activity. pERp1 emerged as a dedicated folding factor for IgM, associating with both heavy and light chains and promoting assembly and secretion of mature IgM. PMID:19805154
Effects of turning and through lane sharing on traffic performance at intersections
NASA Astrophysics Data System (ADS)
Li, Xiang; Sun, Jian-Qiao
2016-02-01
Turning vehicles strongly influence traffic flows at intersections. Effective regulation of turning vehicles is important to achieve better traffic performance. This paper studies the impact of lane sharing and turning signals on traffic performance at intersections by using cellular automata. Both right-turn and left-turn lane sharing are studied. Interactions between vehicles and pedestrians are considered. The transportation efficiency, road safety and energy economy are the traffic performance metrics. Extensive simulations are carried out to study the traffic performance indices. It is observed that shared turning lanes and permissive left-turn signal improve the transportation efficiency and reduce the fuel consumption in most cases, but the safety is usually sacrificed. It is not always beneficial for the through vehicles when they are allowed to be in the turning lanes.
Orfi, Z.; Waczek, F.; Baska, F.; Szabadkai, I.; Torka, R.; Hartmann, J.; Orfi, L.; Ullrich, A.
2017-01-01
According to clinical data, some tyrosine kinase inhibitors (TKIs) possess antidiabetic effects. Several proposed mechanisms were assigned to them, however their mode of action is not clear. Our hypothesis was that they directly stimulate insulin release in beta cells. In our screening approach we demonstrated that some commercially available TKIs and many novel synthesized analogues were able to induce insulin secretion in RIN-5AH beta cells. Our aim was to find efficient, more selective and less toxic compounds. Out of several hits, we chose members from a compound family with quinoline core structure for further investigation. Here we present the studies done with these novel compounds and reveal structure activity relationships and mechanism of action. One of the most potent compounds (compound 9) lost its affinity to kinases, but efficiently increased calcium influx. In the presence of calcium channel inhibitors, the insulinotropic effect was attenuated or completely abrogated. While the quinoline TKI, bosutinib substantially inhibited tyrosine phosphorylation, compound 9 had no such effect. Molecular docking studies further supported our data. We confirmed that some TKIs possess antidiabetic effects, moreover, we present a novel compound family developed from the TKI, bosutinib and optimized for the modulation of insulin secretion. PMID:28272433
Jackman, Robert W; Floro, Jess; Yoshimine, Rei; Zitin, Brian; Eiampikul, Maythita; El-Jack, Kahlid; Seto, Danielle N; Kandarian, Susan C
2017-01-01
Cachexia is strongly associated with a poor prognosis in cancer patients but the biological trigger is unknown and therefore no therapeutics exist. The loss of skeletal muscle is the most deleterious aspect of cachexia and it appears to depend on secretions from tumor cells. Models for studying wasting in cell culture consist of experiments where skeletal muscle cells are incubated with medium conditioned by tumor cells. This has led to candidates for cachectic factors but some of the features of cachexia in vivo are not yet well-modeled in cell culture experiments. Mouse myotube atrophy measured by myotube diameter in response to medium conditioned by mouse colon carcinoma cells (C26) is consistently less than what is seen in muscles of mice bearing C26 tumors with moderate to severe cachexia. One possible reason for this discrepancy is that in vivo the C26 tumor and skeletal muscle share a circulatory system exposing the muscle to tumor factors in a constant and increasing way. We have applied Transwell®-adapted cell culture conditions to more closely simulate conditions found in vivo where muscle is exposed to the ongoing kinetics of constant tumor secretion of active factors. C26 cells were incubated on a microporous membrane (a Transwell® insert) that constitutes the upper compartment of wells containing plated myotubes. In this model, myotubes are exposed to a constant supply of cancer cell secretions in the medium but without direct contact with the cancer cells, analogous to a shared circulation of muscle and cancer cells in tumor-bearing animals. The results for myotube diameter support the idea that the use of Transwell® inserts serves as a more physiological model of the muscle wasting associated with cancer cachexia than the bolus addition of cancer cell conditioned medium. The Transwell® model supports the notion that the dose and kinetics of cachectic factor delivery to muscle play a significant role in the extent of pathology.
A market-based approach to share water and benefits in transboundary river basins
NASA Astrophysics Data System (ADS)
Arjoon, Diane; Tilmant, Amaury; Herrmann, Markus
2016-04-01
The equitable sharing of benefits in transboundary river basins is necessary to reach a consensus on basin-wide development and management activities. Benefit sharing arrangements must be collaboratively developed to be perceived as efficient, as well as equitable, in order to be considered acceptable to all riparian countries. The current literature falls short of providing practical, institutional arrangements that ensure maximum economic welfare as well as collaboratively developed methods for encouraging the equitable sharing of benefits. In this study we define an institutional arrangement that distributes welfare in a river basin by maximizing the economic benefits of water use and then sharing these benefits in an equitable manner using a method developed through stakeholder involvement. In this methodology (i) a hydro-economic model is used to efficiently allocate scarce water resources to water users in a transboundary basin, (ii) water users are obliged to pay for water, and (iii) the total of these water charges are equitably redistributed as monetary compensation to users. The amount of monetary compensation, for each water user, is determined through the application of a sharing method developed by stakeholder input, based on a stakeholder vision of fairness, using an axiomatic approach. The whole system is overseen by a river basin authority. The methodology is applied to the Eastern Nile River basin as a case study. The technique ensures economic efficiency and may lead to more equitable solutions in the sharing of benefits in transboundary river basins because the definition of the sharing rule is not in question, as would be the case if existing methods, such as game theory, were applied, with their inherent definitions of fairness.
Efficient quantum dialogue without information leakage
NASA Astrophysics Data System (ADS)
Yin, Ai-Han; Tang, Zhi-Hui; Chen, Dong
2015-02-01
A two-step quantum dialogue scheme is put forward with a class of three-qubit W state and quantum dense coding. Each W state can carry three bits of secret information and the measurement result is encrypted without information leakage. Furthermore, we utilize the entangle properties of W state and decoy photon checking technique to realize three-time channel detection, which can improve the efficiency and security of the scheme.
ERIC Educational Resources Information Center
Grene, Hanna
2011-01-01
It is no secret that school budgets are growing smaller, forcing districts to make tough financial choices. Building operating costs drain a massive portion of most districts' budgets. As such, energy efficiency is a powerful tool to cut short- and long-term operating costs, and reductions in energy use. The U.S. Environmental Protection Agency's…
Quantum steganography and quantum error-correction
NASA Astrophysics Data System (ADS)
Shaw, Bilal A.
Quantum error-correcting codes have been the cornerstone of research in quantum information science (QIS) for more than a decade. Without their conception, quantum computers would be a footnote in the history of science. When researchers embraced the idea that we live in a world where the effects of a noisy environment cannot completely be stripped away from the operations of a quantum computer, the natural way forward was to think about importing classical coding theory into the quantum arena to give birth to quantum error-correcting codes which could help in mitigating the debilitating effects of decoherence on quantum data. We first talk about the six-qubit quantum error-correcting code and show its connections to entanglement-assisted error-correcting coding theory and then to subsystem codes. This code bridges the gap between the five-qubit (perfect) and Steane codes. We discuss two methods to encode one qubit into six physical qubits. Each of the two examples corrects an arbitrary single-qubit error. The first example is a degenerate six-qubit quantum error-correcting code. We explicitly provide the stabilizer generators, encoding circuits, codewords, logical Pauli operators, and logical CNOT operator for this code. We also show how to convert this code into a non-trivial subsystem code that saturates the subsystem Singleton bound. We then prove that a six-qubit code without entanglement assistance cannot simultaneously possess a Calderbank-Shor-Steane (CSS) stabilizer and correct an arbitrary single-qubit error. A corollary of this result is that the Steane seven-qubit code is the smallest single-error correcting CSS code. Our second example is the construction of a non-degenerate six-qubit CSS entanglement-assisted code. This code uses one bit of entanglement (an ebit) shared between the sender (Alice) and the receiver (Bob) and corrects an arbitrary single-qubit error. The code we obtain is globally equivalent to the Steane seven-qubit code and thus corrects an arbitrary error on the receiver's half of the ebit as well. We prove that this code is the smallest code with a CSS structure that uses only one ebit and corrects an arbitrary single-qubit error on the sender's side. We discuss the advantages and disadvantages for each of the two codes. In the second half of this thesis we explore the yet uncharted and relatively undiscovered area of quantum steganography. Steganography is the process of hiding secret information by embedding it in an "innocent" message. We present protocols for hiding quantum information in a codeword of a quantum error-correcting code passing through a channel. Using either a shared classical secret key or shared entanglement Alice disguises her information as errors in the channel. Bob can retrieve the hidden information, but an eavesdropper (Eve) with the power to monitor the channel, but without the secret key, cannot distinguish the message from channel noise. We analyze how difficult it is for Eve to detect the presence of secret messages, and estimate rates of steganographic communication and secret key consumption for certain protocols. We also provide an example of how Alice hides quantum information in the perfect code when the underlying channel between Bob and her is the depolarizing channel. Using this scheme Alice can hide up to four stego-qubits.
Bauer, Ulrike; Willmes, Christoph; Federle, Walter
2009-06-01
Nepenthes pitchers are sophisticated traps that employ a variety of mechanisms to attract, capture and retain prey. The underlying morphological structures and physiological processes are subject to change over the lifetime of a pitcher. Here an investigation was carried out on how pitcher properties and capture efficiency change over the first 2 weeks after pitcher opening. Prey capture, trapping efficiency, extrafloral nectar secretion, pitcher odour, as well as pH and viscoelasticity of the digestive fluid in N. rafflesiana pitchers were monitored in the natural habitat from pitcher opening up to an age of 2 weeks. Pitchers not only increased their attractiveness over this period by becoming more fragrant and secreting more nectar, but also gained mechanical trapping efficiency via an enhanced wettability of the upper pitcher rim (peristome). Consistently, natural prey capture was initially low and increased 3-6 d after opening. It was, however, highly variable within and among pitchers. At the same time, the pH and viscoelasticity of the digestive fluid decreased, suggesting that the latter is not essential for effective prey capture. Prey capture and attraction by Nepenthes are dynamic processes strongly influenced by the changing properties of the pitcher. The results confirm insect aquaplaning on the peristome as the main capture mechanism in N. rafflesiana.
Corgnet, Brice; Espín, Antonio M.; Hernán-González, Roberto
2017-01-01
Groups make decisions on both the production and the distribution of resources. These decisions typically involve a tension between increasing the total level of group resources (i.e. social efficiency) and distributing these resources among group members (i.e. individuals' relative shares). This is the case because the redistribution process may destroy part of the resources, thus resulting in socially inefficient allocations. Here we apply a dual-process approach to understand the cognitive underpinnings of this fundamental tension. We conducted a set of experiments to examine the extent to which different allocation decisions respond to intuition or deliberation. In a newly developed approach, we assess intuition and deliberation at both the trait level (using the Cognitive Reflection Test, henceforth CRT) and the state level (through the experimental manipulation of response times). To test for robustness, experiments were conducted in two countries: the USA and India. Despite absolute-level differences across countries, in both locations we show that: (i) time pressure and low CRT scores are associated with individuals' concerns for their relative shares and (ii) time delay and high CRT scores are associated with individuals' concerns for social efficiency. These findings demonstrate that deliberation favours social efficiency by overriding individuals' intuitive tendency to focus on relative shares. PMID:28386421
Comment on "Cheating prevention in visual cryptography".
Chen, Yu-Chi; Horng, Gwoboa; Tsai, Du-Shiau
2012-07-01
Visual cryptography (VC), proposed by Naor and Shamir, has numerous applications, including visual authentication and identification, steganography, and image encryption. In 2006, Horng showed that cheating is possible in VC, where some participants can deceive the remaining participants by forged transparencies. Since then, designing cheating-prevention visual secret-sharing (CPVSS) schemes has been studied by many researchers. In this paper, we cryptanalyze the Hu-Tzeng CPVSS scheme and show that it is not cheating immune. We also outline an improvement that helps to overcome the problem.
2014-09-01
the constitution is not a suicide pact, and the President has unchallenged authority to prevent an imminent threat to the United States.”242 In...long. It soon wastes, exhausts, and murders itself. There was never a democracy yet that did not commit suicide .”291 The judiciary has deferred to...Constitution Project aptly describes, “When national security decisions are said to rest on secret information not widely shared with Congress, the temptation
Entangled State Quantum Cryptography: Eavesdropping on the Ekert Protocol
DOE Office of Scientific and Technical Information (OSTI.GOV)
Naik, D. S.; Peterson, C. G.; White, A. G.
2000-05-15
Using polarization-entangled photons from spontaneous parametric down-conversion, we have implemented Ekert's quantum cryptography protocol. The near-perfect correlations of the photons allow the sharing of a secret key between two parties. The presence of an eavesdropper is continually checked by measuring Bell's inequalities. We investigated several possible eavesdropper strategies, including pseudo-quantum-nondemolition measurements. In all cases, the eavesdropper's presence was readily apparent. We discuss a procedure to increase her detectability. (c) 2000 The American Physical Society.
Effects of pre- and pro-sequence of thaumatin on the secretion by Pichia pastoris.
Ide, Nobuyuki; Masuda, Tetsuya; Kitabatake, Naofumi
2007-11-23
Thaumatin is a 22-kDa sweet-tasting protein containing eight disulfide bonds. When thaumatin is expressed in Pichia pastoris using the thaumatin cDNA fused with both the alpha-factor signal sequence and the Kex2 protease cleavage site from Saccharomyces cerevisiae, the N-terminal sequence of the secreted thaumatin molecule is not processed correctly. To examine the role of the thaumatin cDNA-encoded N-terminal pre-sequence and C-terminal pro-sequence on the processing of thaumatin and efficiency of thaumatin production in P. pastoris, four expression plasmids with different pre-sequence and pro-sequence were constructed and transformed into P. pastoris. The transformants containing pre-thaumatin gene that has the native plant signal, secreted thaumatin molecules in the medium. The N-terminal amino acid sequence of the secreted thaumatin molecule was processed correctly. The production yield of thaumatin was not affected by the C-terminal pro-sequence, and the pro-sequence was not processed in P. pastoris, indicating that pro-sequence is not necessary for thaumatin synthesis.
NASA Astrophysics Data System (ADS)
Xu, Ling; Zhao, Zhiwen
2017-12-01
Quantum private comparison (QPC) protocol, including Alice, Bob and the third party Charlie, aims at comparing Alice and Bob's secret inputs correctly without leaking them. Firstly, χ ^+ state and W-Class state are used to conduct the entanglement swapping in this protocol. Either the basis {|φ ^± > ,|ψ ^± >} or the basis {|χ ^± > ,|ω ^± > } is chosen by Alice and Bob based on the predetermined value to measure the particle pairs. And three bits of secret inputs can be compared in this protocol in every comparison time, while most of previous QPC protocols can only compare one or two bits. The qubit efficiency of this protocol is 60% more than others, which are 50% at most. Secondly, if the eavesdropper intends to obtain the secret inputs, it is important and primary to get the measurement results of particle pairs. In this protocol, even if the eavesdropper gets the accurate particle pairs, he cannot get the right measurement results without the right basis. Finally, this protocol is analyzed to be able to defend the secret inputs against various kinds of attack.
East, Alexandra; Mechaly, Ariel E; Huysmans, Gerard H M; Bernarde, Cédric; Tello-Manigne, Diana; Nadeau, Nathalie; Pugsley, Anthony P; Buschiazzo, Alejandro; Alzari, Pedro M; Bond, Peter J; Francetic, Olivera
2016-01-05
The Klebsiella lipoprotein pullulanase (PulA) is exported to the periplasm, triacylated, and anchored via lipids in the inner membrane (IM) prior to its transport to the bacterial surface through a type II secretion system (T2SS). X-Ray crystallography and atomistic molecular dynamics (MD) simulations of PulA in a 1-palmitoyl-2-oleoyl-sn-glycero-3-phosphoethanolamine (POPE) model membrane provided an unprecedented molecular view of an N-terminal unstructured tether and the IM lipoprotein retention signal, and revealed novel interactions with the IM via N-terminal immunoglobulin-like domains in PulA. An efficiently secreted nonacylated variant (PulANA) showed similar peripheral membrane association during MD simulations, consistent with the binding of purified PulANA to liposomes. Remarkably, combined X-ray, MD, and functional studies identified a novel subdomain, Ins, inserted in the α-amylase domain, which is required for PulA secretion. Available data support a model in which PulA binding to the IM promotes interactions with the T2SS, possibly via the Ins subdomain. Copyright © 2016 Elsevier Ltd. All rights reserved.
JBP485 promotes tear and mucin secretion in ocular surface epithelia
Nakamura, Takahiro; Hata, Yuiko; Nagata, Maho; Yokoi, Norihiko; Yamaguchi, Shumpei; Kaku, Taiichi; Kinoshita, Shigeru
2015-01-01
Dry eye syndrome (DES), a multifactorial disease of the tears and ocular surface, is one of the most common ocular disorders. Tear film contains ocular mucins and is essential for maintaining the homeostasis of the wet ocular surface. Since there are a limited number of clinical options for the treatment of DES, additional novel treatments are needed to improve the clinical results. In this study, we found that placental extract-derived dipeptide (JBP485) clearly promoted the expression and secretion of gel-forming mucin 5ac (Muc5ac) in rabbit conjunctival epithelium. JBP485 also elevated the expression level of cell surface-associated mucins (Muc1/4/16) in rabbit corneal epithelium. The Schirmer tear test results indicated that JBP485 induced tear secretion in the rabbit model. Moreover, JBP485 clinically improved corneal epithelial damage in a mouse dry eye model. Thus, our data indicate that JBP485 efficiently promoted mucin and aqueous tear secretion in rabbit ocular surface epithelium and has the potential to be used as a novel treatment for DES. PMID:25996902
JBP485 promotes tear and mucin secretion in ocular surface epithelia.
Nakamura, Takahiro; Hata, Yuiko; Nagata, Maho; Yokoi, Norihiko; Yamaguchi, Shumpei; Kaku, Taiichi; Kinoshita, Shigeru
2015-05-21
Dry eye syndrome (DES), a multifactorial disease of the tears and ocular surface, is one of the most common ocular disorders. Tear film contains ocular mucins and is essential for maintaining the homeostasis of the wet ocular surface. Since there are a limited number of clinical options for the treatment of DES, additional novel treatments are needed to improve the clinical results. In this study, we found that placental extract-derived dipeptide (JBP485) clearly promoted the expression and secretion of gel-forming mucin 5ac (Muc5ac) in rabbit conjunctival epithelium. JBP485 also elevated the expression level of cell surface-associated mucins (Muc1/4/16) in rabbit corneal epithelium. The Schirmer tear test results indicated that JBP485 induced tear secretion in the rabbit model. Moreover, JBP485 clinically improved corneal epithelial damage in a mouse dry eye model. Thus, our data indicate that JBP485 efficiently promoted mucin and aqueous tear secretion in rabbit ocular surface epithelium and has the potential to be used as a novel treatment for DES.
Secretion of small proteins is species-specific within Aspergillus sp.
Valette, Nicolas; Benoit-Gelber, Isabelle; Falco, Marcos Di; Wiebenga, Ad; de Vries, Ronald P; Gelhaye, Eric; Morel-Rouhier, Mélanie
2017-03-01
Small secreted proteins (SSP) have been defined as proteins containing a signal peptide and a sequence of less than 300 amino acids. In this analysis, we have compared the secretion pattern of SSPs among eight aspergilli species in the context of plant biomass degradation and have highlighted putative interesting candidates that could be involved in the degradative process or in the strategies developed by fungi to resist the associated stress that could be due to the toxicity of some aromatic compounds or reactive oxygen species released during degradation. Among these candidates, for example, some stress-related superoxide dismutases or some hydrophobic surface binding proteins (HsbA) are specifically secreted according to the species . Since these latter proteins are able to recruit lytic enzymes to the surface of hydrophobic solid materials and promote their degradation, a synergistic action of HsbA with the degradative system may be considered and need further investigations. These SSPs could have great applications in biotechnology by optimizing the efficiency of the enzymatic systems for biomass degradation. © 2016 The Authors. Microbial Biotechnology published by John Wiley & Sons Ltd and Society for Applied Microbiology.
Shotgun proteomics of Aspergillus niger microsomes upon D-xylose induction.
Ferreira de Oliveira, José Miguel P; van Passel, Mark W J; Schaap, Peter J; de Graaff, Leo H
2010-07-01
Protein secretion plays an eminent role in cell maintenance and adaptation to the extracellular environment of microorganisms. Although protein secretion is an extremely efficient process in filamentous fungi, the mechanisms underlying protein secretion have remained largely uncharacterized in these organisms. In this study, we analyzed the effects of the d-xylose induction of cellulase and hemicellulase enzyme secretion on the protein composition of secretory organelles in Aspergillus niger. We aimed to systematically identify the components involved in the secretion of these enzymes via mass spectrometry of enriched subcellular microsomal fractions. Under each condition, fractions enriched for secretory organelles were processed for tandem mass spectrometry, resulting in the identification of peptides that originate from 1,081 proteins, 254 of which-many of them hypothetical proteins-were predicted to play direct roles in the secretory pathway. d-Xylose induction led to an increase in specific small GTPases known to be associated with polarized growth, exocytosis, and endocytosis. Moreover, the endoplasmic-reticulum-associated degradation (ERAD) components Cdc48 and all 14 of the 20S proteasomal subunits were recruited to the secretory organelles. In conclusion, induction of extracellular enzymes results in specific changes in the secretory subproteome of A. niger, and the most prominent change found in this study was the recruitment of the 20S proteasomal subunits to the secretory organelles.
Efficient production and secretion of oxaloacetate from Halomonas sp. KM-1 under aerobic conditions.
Hannya, Asuka; Nishimura, Taku; Matsushita, Isao; Tsubota, Jun; Kawata, Yoshikazu
2017-11-21
The alkaliphilic, halophilic bacterium Halomonas sp. KM-1 can utilize glucose for the intracellular storage of the bioplastic poly-(R)-3-hydroxybutyric acid (PHB) and extracellular secretion of pyruvate under aerobic conditions. In this study, we investigated the effects of sodium chloride concentration on PHB accumulation and pyruvate secretion in the KM-1 strain and, unexpectedly, observed that oxaloacetate, an important intermediate chemical in the TCA cycle, glycogenesis, and aspartic acid biosynthesis, was secreted. We then further analyzed oxaloacetate productivity after changing the sodium chloride additive concentration, additive time-shift, and culture temperature. In 42-h batch-cultivation experiments, we found that wild-type Halomonas sp. KM-1 secreted 39.0 g/L oxaloacetate at a rate of 0.93 g/(L h). The halophilic bacteria Halomonas has already gained attention for industrial chemical-production processes owing to its unique properties, such as contamination-free culture conditions and a tolerance for high substrate concentrations. Moreover, no commercial scale oxaloacetate production was previously reported to result from bacterial fermentation. Oxaloacetate is an important intermediate chemical in biosynthesis and is used as a health food based on its role in energy synthesis. Thus, these data provided important insights into the production of oxaloacetate and other derivative chemicals using this strain.
Deng, Yuliang; Zhang, Yu; Sun, Shuai; Wang, Zhihua; Wang, Minjiao; Yu, Beiqin; Czajkowsky, Daniel M; Liu, Bingya; Li, Yan; Wei, Wei; Shi, Qihui
2014-12-16
Genetic and transcriptional profiling, as well as surface marker identification of single circulating tumor cells (CTCs) have been demonstrated. However, quantitatively profiling of functional proteins at single CTC resolution has not yet been achieved, owing to the limited purity of the isolated CTC populations and a lack of single-cell proteomic approaches to handle and analyze rare CTCs. Here, we develop an integrated microfluidic system specifically designed for streamlining isolation, purification and single-cell secretomic profiling of CTCs from whole blood. Key to this platform is the use of photocleavable ssDNA-encoded antibody conjugates to enable a highly purified CTC population with <75 'contaminated' blood cells. An enhanced poly-L-lysine barcode pattern is created on the single-cell barcode chip for efficient capture rare CTC cells in microchambers for subsequent secreted protein profiling. This system was extensively evaluated and optimized with EpCAM-positive HCT116 cells seeded into whole blood. Patient blood samples were employed to assess the utility of the system for isolation, purification and single-cell secretion profiling of CTCs. The CTCs present in patient blood samples exhibit highly heterogeneous secretion profile of IL-8 and VEGF. The numbers of secreting CTCs are found not in accordance with CTC enumeration based on immunostaining in the parallel experiments.
Deng, Yuliang; Zhang, Yu; Sun, Shuai; Wang, Zhihua; Wang, Minjiao; Yu, Beiqin; Czajkowsky, Daniel M.; Liu, Bingya; Li, Yan; Wei, Wei; Shi, Qihui
2014-01-01
Genetic and transcriptional profiling, as well as surface marker identification of single circulating tumor cells (CTCs) have been demonstrated. However, quantitatively profiling of functional proteins at single CTC resolution has not yet been achieved, owing to the limited purity of the isolated CTC populations and a lack of single-cell proteomic approaches to handle and analyze rare CTCs. Here, we develop an integrated microfluidic system specifically designed for streamlining isolation, purification and single-cell secretomic profiling of CTCs from whole blood. Key to this platform is the use of photocleavable ssDNA-encoded antibody conjugates to enable a highly purified CTC population with <75 ‘contaminated' blood cells. An enhanced poly-L-lysine barcode pattern is created on the single-cell barcode chip for efficient capture rare CTC cells in microchambers for subsequent secreted protein profiling. This system was extensively evaluated and optimized with EpCAM-positive HCT116 cells seeded into whole blood. Patient blood samples were employed to assess the utility of the system for isolation, purification and single-cell secretion profiling of CTCs. The CTCs present in patient blood samples exhibit highly heterogeneous secretion profile of IL-8 and VEGF. The numbers of secreting CTCs are found not in accordance with CTC enumeration based on immunostaining in the parallel experiments. PMID:25511131
Class II ADP-ribosylation factors are required for efficient secretion of dengue viruses.
Kudelko, Mateusz; Brault, Jean-Baptiste; Kwok, Kevin; Li, Ming Yuan; Pardigon, Nathalie; Peiris, J S Malik; Bruzzone, Roberto; Desprès, Philippe; Nal, Béatrice; Wang, Pei Gang
2012-01-02
Identification and characterization of virus-host interactions are very important steps toward a better understanding of the molecular mechanisms responsible for disease progression and pathogenesis. To date, very few cellular factors involved in the life cycle of flaviviruses, which are important human pathogens, have been described. In this study, we demonstrate a crucial role for class II Arf proteins (Arf4 and Arf5) in the dengue flavivirus life cycle. We show that simultaneous depletion of Arf4 and Arf5 blocks recombinant subviral particle secretion for all four dengue serotypes. Immunostaining analysis suggests that class II Arf proteins are required at an early pre-Golgi step for dengue virus secretion. Using a horseradish peroxidase protein fused to a signal peptide, we show that class II Arfs act specifically on dengue virus secretion without altering the secretion of proteins through the constitutive secretory pathway. Co-immunoprecipitation data demonstrate that the dengue prM glycoprotein interacts with class II Arf proteins but not through its C-terminal VXPX motif. Finally, experiments performed with replication-competent dengue and yellow fever viruses demonstrate that the depletion of class II Arfs inhibits virus secretion, thus confirming their implication in the virus life cycle, although data obtained with West Nile virus pointed out the differences in virus-host interactions among flaviviruses. Our findings shed new light on a molecular mechanism used by dengue viruses during the late stages of the life cycle and demonstrate a novel function for class II Arf proteins.
Class II ADP-ribosylation Factors Are Required for Efficient Secretion of Dengue Viruses*
Kudelko, Mateusz; Brault, Jean-Baptiste; Kwok, Kevin; Li, Ming Yuan; Pardigon, Nathalie; Peiris, J. S. Malik; Bruzzone, Roberto; Desprès, Philippe; Nal, Béatrice; Wang, Pei Gang
2012-01-01
Identification and characterization of virus-host interactions are very important steps toward a better understanding of the molecular mechanisms responsible for disease progression and pathogenesis. To date, very few cellular factors involved in the life cycle of flaviviruses, which are important human pathogens, have been described. In this study, we demonstrate a crucial role for class II Arf proteins (Arf4 and Arf5) in the dengue flavivirus life cycle. We show that simultaneous depletion of Arf4 and Arf5 blocks recombinant subviral particle secretion for all four dengue serotypes. Immunostaining analysis suggests that class II Arf proteins are required at an early pre-Golgi step for dengue virus secretion. Using a horseradish peroxidase protein fused to a signal peptide, we show that class II Arfs act specifically on dengue virus secretion without altering the secretion of proteins through the constitutive secretory pathway. Co-immunoprecipitation data demonstrate that the dengue prM glycoprotein interacts with class II Arf proteins but not through its C-terminal VXPX motif. Finally, experiments performed with replication-competent dengue and yellow fever viruses demonstrate that the depletion of class II Arfs inhibits virus secretion, thus confirming their implication in the virus life cycle, although data obtained with West Nile virus pointed out the differences in virus-host interactions among flaviviruses. Our findings shed new light on a molecular mechanism used by dengue viruses during the late stages of the life cycle and demonstrate a novel function for class II Arf proteins. PMID:22105072
Otsuki, Tetsuji; Ota, Toshio; Nishikawa, Tetsuo; Hayashi, Koji; Suzuki, Yutaka; Yamamoto, Jun-ichi; Wakamatsu, Ai; Kimura, Kouichi; Sakamoto, Katsuhiko; Hatano, Naoto; Kawai, Yuri; Ishii, Shizuko; Saito, Kaoru; Kojima, Shin-ichi; Sugiyama, Tomoyasu; Ono, Tetsuyoshi; Okano, Kazunori; Yoshikawa, Yoko; Aotsuka, Satoshi; Sasaki, Naokazu; Hattori, Atsushi; Okumura, Koji; Nagai, Keiichi; Sugano, Sumio; Isogai, Takao
2005-01-01
We have developed an in silico method of selection of human full-length cDNAs encoding secretion or membrane proteins from oligo-capped cDNA libraries. Fullness rates were increased to about 80% by combination of the oligo-capping method and ATGpr, software for prediction of translation start point and the coding potential. Then, using 5'-end single-pass sequences, cDNAs having the signal sequence were selected by PSORT ('signal sequence trap'). We also applied 'secretion or membrane protein-related keyword trap' based on the result of BLAST search against the SWISS-PROT database for the cDNAs which could not be selected by PSORT. Using the above procedures, 789 cDNAs were primarily selected and subjected to full-length sequencing, and 334 of these cDNAs were finally selected as novel. Most of the cDNAs (295 cDNAs: 88.3%) were predicted to encode secretion or membrane proteins. In particular, 165(80.5%) of the 205 cDNAs selected by PSORT were predicted to have signal sequences, while 70 (54.2%) of the 129 cDNAs selected by 'keyword trap' preserved the secretion or membrane protein-related keywords. Many important cDNAs were obtained, including transporters, receptors, and ligands, involved in significant cellular functions. Thus, an efficient method of selecting secretion or membrane protein-encoding cDNAs was developed by combining the above four procedures.
Stepanyuk, Galina A.; Xu, Hao; Wu, Chia-Kuei; Markova, Svetlana V.; Lee, John; Vysotski, Eugene S.; Wang, Bi-Cheng
2008-01-01
Metridia luciferase is a secreted luciferase from a marine copepod and uses coelenterazine as a substrate to produce a blue bioluminescence (λmax = 480 nm). This luciferase has been successfully applied as a bioluminescent reporter in mammalian cells. The main advantage of secreted luciferase as a reporter is the capability of measuring intracellular events without destroying the cells or tissues and this property is well suited for development of high throughput screening technologies. However because Metridia luciferase is a Cys-rich protein, E. coli expression systems produce an incorrectly folded protein, hindering its biochemical characterization and application for development of in vitro bioluminescent assays. Here we report the successful expression of Metridia luciferase with its signal peptide for secretion, in insect (Sf9) cells using the baculovirus expression system. Functionally active luciferase secreted by insect cells into the culture media has been efficiently purified with a yield of high purity protein of 2–3 mg/L. This Metridia luciferase expressed in the insect cell system is a monomeric protein showing 3.5-fold greater bioluminescence activity than luciferase expressed and purified from E. coli. The near coincidence of the experimental mass of Metridia luciferase purified from insect cells with that calculated from amino acid sequence, indicates that luciferase does not undergo posttranslational modifications such as phosphorylation or glycosylation and also, the cleavage site of the signal peptide for secretion is at VQA-KS, as predicted from sequence analysis. PMID:18595733
NASA Astrophysics Data System (ADS)
Liang, Jiejunyi; Yang, Haitao; Wu, Jinglai; Zhang, Nong; Walker, Paul D.
2018-05-01
To improve the overall efficiency of electric vehicles and guarantee the driving comfort and vehicle drivability under the concept of simplifying mechanism complexity and minimizing manufacturing cost, this paper proposes a novel clutchless power-shifting transmission system with shifting control strategy and power sharing control strategy. The proposed shifting strategy takes advantage of the transmission architecture to achieve power-on shifting, which greatly improves the driving comfort compared with conventional automated manual transmission, with a bump function based shifting control method. To maximize the overall efficiency, a real-time power sharing control strategy is designed to solve the power distribution problem between the two motors. Detailed mathematical model is built to verify the effectiveness of the proposed methods. The results demonstrate the proposed strategies considerably improve the overall efficiency while achieve non-interrupted power-on shifting and maintain the vehicle jerk during shifting under an acceptable threshold.
Structure of nerve growth factor complexed with the shared neurotrophin receptor p75.
He, Xiao-Lin; Garcia, K Christopher
2004-05-07
Neurotrophins are secreted growth factors critical for the development and maintenance of the vertebrate nervous system. Neurotrophins activate two types of cell surface receptors, the Trk receptor tyrosine kinases and the shared p75 neurotrophin receptor. We have determined the 2.4 A crystal structure of the prototypic neurotrophin, nerve growth factor (NGF), complexed with the extracellular domain of p75. Surprisingly, the complex is composed of an NGF homodimer asymmetrically bound to a single p75. p75 binds along the homodimeric interface of NGF, which disables NGF's symmetry-related second p75 binding site through an allosteric conformational change. Thus, neurotrophin signaling through p75 may occur by disassembly of p75 dimers and assembly of asymmetric 2:1 neurotrophin/p75 complexes, which could potentially engage a Trk receptor to form a trimolecular signaling complex.
What couples glycolysis to mitochondrial signal generation in glucose-stimulated insulin secretion?
Ishihara, H; Wollheim, C B
2000-05-01
Pancreatic islet beta-cells are poised to generate metabolic messengers in the mitochondria that link glucose metabolism to insulin exocytosis. This is accomplished through the tight coupling of glycolysis to mitochondrial activation. The messenger molecules ATP and glutamate are produced after the metabolism of glycolysis-derived pyruvate in the mitochondria. The entry of monocarboxylates such as pyruvate into the beta cell is limited, explaining why overexpression of monocarboxylate transporters unravels pyruvate-stimulated insulin secretion. NADH generated by glycolysis is efficiently reoxidized by highly active mitochondrial shuttles rather than by lactate dehydrogenase. Overexpression of this enzyme does not alter glucose-stimulated insulin secretion, suggesting that NADH availability restricts the conversion of pyruvate to lactate in the beta cell. These metabolic features permit the fuel function of glucose to be extended to the generation of signaling molecules, which increases cytosolic Ca2+ and promotes insulin exocytosis.
Rioja, R; García, M T; Peña, M; González, G
2008-06-01
Continuous decolourisation of wastewater from molasses fermentation using mycelium of Trametes versicolor in pellets shape was performed in an airlift bioreactor (semi-pilot scale) with the aim of operating steadily for a long period, maintaining the colour removal activity. The influences of influent flow and glucose feed rate were tested. Induction of peroxidases secretion by Mn(2+) addition was also studied. The efficiency of the decolourisation process was followed by monitoring colour and enzymatic activities. The experimental results showed that continuous decolourisation in an airlift bioreactor can be considered a suitable alternative for treating molasses fermentation wastewater. A colour removal yield around 60% remained practically constant during 23 days under continuous operation. Laccase was found to be the main enzyme secreted by the strain, being responsible for the decolourisation process. Mn(2+) addition was not likely to induct manganese-dependent peroxidase secretion.
Axonal transport and secretion of fibrillar forms of α-synuclein, Aβ42 peptide and HTTExon 1.
Brahic, Michel; Bousset, Luc; Bieri, Gregor; Melki, Ronald; Gitler, Aaron D
2016-04-01
Accruing evidence suggests that prion-like behavior of fibrillar forms of α-synuclein, β-amyloid peptide and mutant huntingtin are responsible for the spread of the lesions that characterize Parkinson disease, Alzheimer disease and Huntington disease, respectively. It is unknown whether these distinct protein assemblies are transported within and between neurons by similar or distinct mechanisms. It is also unclear if neuronal death or injury is required for neuron-to-neuron transfer. To address these questions, we used mouse primary cortical neurons grown in microfluidic devices to measure the amounts of α-synuclein, Aβ42 and HTTExon1 fibrils transported by axons in both directions (anterograde and retrograde), as well as to examine the mechanism of their release from axons after anterograde transport. We observed that the three fibrils were transported in both anterograde and retrograde directions but with strikingly different efficiencies. The amount of Aβ42 fibrils transported was ten times higher than that of the other two fibrils. HTTExon1 was efficiently transported in the retrograde direction but only marginally in the anterograde direction. Finally, using neurons from two distinct mutant mouse strains whose axons are highly resistant to neurodegeneration (Wld(S) and Sarm1(-/-)), we found that the three different fibrils were secreted by axons after anterograde transport, in the absence of axonal lysis, indicating that trans-neuronal spread can occur in intact healthy neurons. In summary, fibrils of α-synuclein, Aβ42 and HTTExon1 are all transported in axons but in directions and amounts that are specific of each fibril. After anterograde transport, the three fibrils were secreted in the medium in the absence of axon lysis. Continuous secretion could play an important role in the spread of pathology between neurons but may be amenable to pharmacological intervention.
Sareneva, T; Mørtz, E; Tölö, H; Roepstorff, P; Julkunen, I
1996-12-01
Interferon-gamma (IFN-gamma) is a secretory glycoprotein produced by T cells in response to antigenic or mitogenic stimuli. We studied the kinetics of the synthesis, N-glycosylation, and secretion of IFN-gamma in human CD8+ T lymphocytes stimulated via T-cell receptor. Highly elevated IFN-gamma mRNA levels were found as early as 1 h after stimulation. Maximal IFN-gamma protein synthesis was observed 2-4 h after induction and appeared to correlate to steady-state IFN-gamma mRNA levels. As analyzed by pulse/chase experiments, the secretion of IFN-gamma from T cells was very rapid, the secretion half-time being approximately 20-25 min. Inhibition of N-glycosylation by tunicamycin dramatically reduced the expression of IFN-gamma, but did not block its secretion. Natural IFN-gamma is heterogeneously glycosylated and doubly, singly, and unglycosylated forms exist. Experiments performed in a cell-free translation/glycosylation system with mutated IFN-gamma constructs lacking either one of the potential glycosylation sites suggested that Asn25 is more efficiently glycosylated than Asn97. Site-specific oligosaccharide analysis of natural IFN-gamma by glycosidase treatment followed by matrix-assisted-laser-desorption-ionization mass spectrometry revealed considerable variation in the carbohydrate structures, with more than 30 different forms. The glycans at Asn25 consisted of fucosylated, mainly complex-type oligosaccharides, whereas the glycans at Asn97 were more heterogeneous, with hybrid and high-mannose structures. Our results emphasize the essential role of N-linked glycans in the biology of IFN-gamma and show that there is a considerable heterogeneity in the individual sugar chains of this important human cytokine.
Efficient generation of functional pancreatic β-cells from human induced pluripotent stem cells.
Yabe, Shigeharu G; Fukuda, Satsuki; Takeda, Fujie; Nashiro, Kiyoko; Shimoda, Masayuki; Okochi, Hitoshi
2017-02-01
Insulin-secreting cells have been generated from human embryonic or induced pluripotent stem cells (iPSCs) by mimicking developmental processes. However, these cells do not always secrete glucose-responsive insulin, one of the most important characteristics of pancreatic β-cells. We focused on the importance of endodermal differentiation from human iPSCs in order to obtain functional pancreatic β-cells. A six-stage protocol was established for the differentiation of human iPSCs to pancreatic β-cells using defined culture media without feeders or serum. The effects of CHIR99021, a selective glycogen synthase kinase-3β inhibitor, were examined in the presence of fibroblast growth factor 2, activin, and bone morphogenetic protein 4 (FAB) during definitive endodermal induction by immunostaining for SRY (sex determining region Y)-box 17 (SOX17) and Forkhead box protein A2 (FOXA2). Insulin secretion was compared between the last stage of monolayer culture and spheroid culture conditions. Cultured cells were transplanted under kidney capsules of streptozotocin-diabetic non-obese diabetic-severe combined immunodeficiency mice, and blood glucose levels were measured once a week. Immunohistochemical analyses were performed 4 and 12 weeks after transplantation. Addition of CHIR99021 (3 μmol/L) in the presence of FAB for 2 days improved endodermal cell viability, maintaining the high SOX17-positive rate. Spheroid formation after the endocrine progenitor stage showed more efficient insulin secretion than did monolayer culture. After cell transplantation, diabetic mice had lower blood glucose levels, and islet-like structures were detected in vivo. Functional pancreatic β-cells were generated from human iPSCs. Induction of definitive endoderm and spheroid formation may be key steps for producing these cells. © 2016 Ruijin Hospital, Shanghai Jiaotong University School of Medicine and John Wiley & Sons Australia, Ltd.
NASA Astrophysics Data System (ADS)
Guo, Ying; Zhao, Wei; Li, Fei; Huang, Duan; Liao, Qin; Xie, Cai-Lang
2017-08-01
The developing tendency of continuous-variable (CV) measurement-device-independent (MDI) quantum cryptography is to cope with the practical issue of implementing scalable quantum networks. Up to now, most theoretical and experimental researches on CV-MDI QKD are focused on two-party protocols. However, we suggest a CV-MDI multipartite quantum secret sharing (QSS) protocol use the EPR states coupled with optical amplifiers. More remarkable, QSS is the real application in multipartite CV-MDI QKD, in other words, is the concrete implementation method of multipartite CV-MDI QKD. It can implement a practical quantum network scheme, under which the legal participants create the secret correlations by using EPR states connecting to an untrusted relay via insecure links and applying the multi-entangled Greenberger-Horne-Zeilinger (GHZ) state analysis at relay station. Even if there is a possibility that the relay may be completely tampered, the legal participants are still able to extract a secret key from network communication. The numerical simulation indicates that the quantum network communication can be achieved in an asymmetric scenario, fulfilling the demands of a practical quantum network. Additionally, we illustrate that the use of optical amplifiers can compensate the partial inherent imperfections of detectors and increase the transmission distance of the CV-MDI quantum system.
Silvestre, Ramona A; Rodríguez-Gallardo, Jovita; Egido, Eva M; Marco, José
1999-01-01
Diadenosine triphosphate (AP3A) and diadenosine tetraphosphate (AP4A) are released by various cells (e.g. platelets and chromaffin cells), and may act as extracellular messengers. In pancreatic B-cells, AP3A and AP4A are inhibitors of the ATP-regulated K+ channels, and glucose increases intracellular levels of both substances.We have studied the effect of exogenous AP3A and AP4A on insulin and glucagon secretion by the perfused rat pancreas.AP3A did not significantly modify insulin or glucagon release, whereas AP4A induced a prompt, short-lived insulin response (≈4 fold higher than basal value; P<0.05) in pancreases perfused at different glucose concentrations (3.2, 5.5 or 9 mM). AP4A-induced insulin release was abolished by somatostatin and by diazoxide. These two substances share the capacity to activate ATP-dependent K+ channels, suggesting that these channels are a potential target for AP4A in the B-cell.AP4A stimulated glucagon release at both 3.2 and 5.5 mM glucose. This effect was abolished by somatostatin.The results suggest that extracellular AP4A may play a physiological role in the control of insulin and glucagon secretion. PMID:10516664
Silvestre, R A; Rodríguez-Gallardo, J; Egido, E M; Marco, J
1999-10-01
1. Diadenosine triphosphate (AP3A) and diadenosine tetraphosphate (AP4A) are released by various cells (e.g. platelets and chromaffin cells), and may act as extracellular messengers. In pancreatic B-cells, AP3A and AP4A are inhibitors of the ATP-regulated K+ channels, and glucose increases intracellular levels of both substances. 2. We have studied the effect of exogenous AP3A and AP4A on insulin and glucagon secretion by the perfused rat pancreas. 3. AP3A did not significantly modify insulin or glucagon release, whereas AP4A induced a prompt, short-lived insulin response ( approximately 4 fold higher than basal value; P<0.05) in pancreases perfused at different glucose concentrations (3.2, 5.5 or 9 mM). AP4A-induced insulin release was abolished by somatostatin and by diazoxide. These two substances share the capacity to activate ATP-dependent K+ channels, suggesting that these channels are a potential target for AP4A in the B-cell. 4. AP4A stimulated glucagon release at both 3.2 and 5.5 mM glucose. This effect was abolished by somatostatin. 5. The results suggest that extracellular AP4A may play a physiological role in the control of insulin and glucagon secretion.
Staphylococcal Immune Evasion Proteins: Structure, Function, and Host Adaptation.
Koymans, Kirsten J; Vrieling, Manouk; Gorham, Ronald D; van Strijp, Jos A G
2017-01-01
Staphylococcus aureus is a successful human and animal pathogen. Its pathogenicity is linked to its ability to secrete a large amount of virulence factors. These secreted proteins interfere with many critical components of the immune system, both innate and adaptive, and hamper proper immune functioning. In recent years, numerous studies have been conducted in order to understand the molecular mechanism underlying the interaction of evasion molecules with the host immune system. Structural studies have fundamentally contributed to our understanding of the mechanisms of action of the individual factors. Furthermore, such studies revealed one of the most striking characteristics of the secreted immune evasion molecules: their conserved structure. Despite high-sequence variability, most immune evasion molecules belong to a small number of structural categories. Another remarkable characteristic is that S. aureus carries most of these virulence factors on mobile genetic elements (MGE) or ex-MGE in its accessory genome. Coevolution of pathogen and host has resulted in immune evasion molecules with a highly host-specific function and prevalence. In this review, we explore how these shared structures and genomic locations relate to function and host specificity. This is discussed in the context of therapeutic options for these immune evasion molecules in infectious as well as in inflammatory diseases.
Kawabe, Yoshihiro; Mizobe, Kenich; Bando, Yasuhiko; Sakiyama, Koji; Taira, Fuyoko; Tomomura, Akito; Araki, Hisao; Amano, Osamu
2016-12-28
Myoepithelial cells (MECs) exist on the basal surface of acini in major exocrine glands, include myofilaments and various constructive proteins, and share characteristics with smooth muscle and epithelial cells. MECs project several ramified processes to invest acini, and possibly contract to compress acini to support the secretion by the glandular cells. However, the functional roles of MECs in salivary secretion are still unclear. We investigated morphological changes in immunostained MECs using the anti-α-smooth muscle actin (αSMA) antibody in operated or non-operated contralateral (NC) submandibular glands after partial or total resection. Furthermore, we investigated and discuss other salivary glands of rats. MECs in the parotid, sublingual and submandibular gland of adult rats exhibited different shapes and localizations. After surgery, in both operated and NC glands, the number of MECs and αSMA-immunopositive areas increased significantly. Three-dimensional analysis using a confocal laser-scanning microscope revealed that substantial and significant enhancement became evident in the number, length, and thickness of MEC-processes covering acini of the operated and NC submandibular glands. The preset findings indicate that MECs alter the morphology of their processes in operated and NC glands after surgery of the partial or total resection. It is suggested that MECs promote salivary secretion using elongated, thickened, and more ramified processes.
Regulation of Memory T Cells by Interleukin-23.
Li, Yanchun; Wang, Hongbo; Lu, Honghua; Hua, Shucheng
2016-01-01
Interleukin-23 (IL-23), a member of the IL-12 family of cytokines, is a heterodimeric cytokine. It is composed of subunits p40 (shared with IL-12) and p19 (an IL-12 p35-related subunit) and is secreted by several types of immune cells, such as natural killer cells and dendritic cells. The IL-23 receptor is composed of the subunit IL-12Rβ1 and the IL-23-specific subunit IL-23R. The binding of IL-23 to its specific cell surface receptor regulates a number of functions, including proliferation and differentiation of cells and secretion of cell factors. Memory T cells are a subset of T cells that secrete numerous important cell factors, and they function in the immune response to infection and diseases like cancer, autoimmune disease and bronchial asthma. IL-23R is expressed on the surface of memory T cells, which suggests that it can specifically regulate memory T cell function. IL-23 has been widely used as a clinical indicator in immune-related diseases and shows potential for use in disease treatment. Here we review the current progress in the study of the role of IL-23 in the regulation of memory T cells. © 2016 S. Karger AG, Basel.
Farouk, Ahmed; Zakaria, Magdy; Megahed, Adel; Omara, Fatma A.
2015-01-01
In this paper, we generalize a secured direct communication process between N users with partial and full cooperation of quantum server. So, N − 1 disjointed users u1, u2, …, uN−1 can transmit a secret message of classical bits to a remote user uN by utilizing the property of dense coding and Pauli unitary transformations. The authentication process between the quantum server and the users are validated by EPR entangled pair and CNOT gate. Afterwards, the remained EPR will generate shared GHZ states which are used for directly transmitting the secret message. The partial cooperation process indicates that N − 1 users can transmit a secret message directly to a remote user uN through a quantum channel. Furthermore, N − 1 users and a remote user uN can communicate without an established quantum channel among them by a full cooperation process. The security analysis of authentication and communication processes against many types of attacks proved that the attacker cannot gain any information during intercepting either authentication or communication processes. Hence, the security of transmitted message among N users is ensured as the attacker introduces an error probability irrespective of the sequence of measurement. PMID:26577473
Tsutsui, Shigeyuki; Yamaguchi, Motoki; Hirasawa, Ai; Nakamura, Osamu; Watanabe, Tasuku
2009-08-01
A lactose-specific lectin with a molecular mass of about 25 kDa was purified from the skin mucus of a cartilaginous fish-the common skate (Raja kenojei). The complementary DNA sequence of the lectin was 1540 bp long and contained a reading frame encoding 226 amino acids, which showed approximately 38% identity to pentraxins of mammals and teleosts. Gene expression was observed in the skin, gill, stomach and intestine in the healthy skate. We also identified an isotype gene from the liver whose deduced amino-acid sequence shared 69.0% identity with the skin type gene. The antiserum detected protein in the skin, where the lectin is localized in the epidermal cells, and in the blood plasma. The lectin genes are multicopied in the common skate genome. Although pentraxins are acute phase proteins, mRNAs of both the isotypes were not upregulated after the in vivo challenge with formalin-killed Escherichia coli, which suggests that they are constantly present in the skin mucus and blood plasma to protect against pathogenic invasion. This lectin is the fifth type of lectin found in the cutaneous secretions of fish, demonstrating that skin mucus lectins have evolved with marked molecular diversity in fish.
Quantum cryptography for secure free-space communications
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hughes, R.J.; Buttler, W.T.; Kwiat, P.G.
1999-03-01
The secure distribution of the secret random bit sequences known as key material, is an essential precursor to their use for the encryption and decryption of confidential communications. Quantum cryptography is a new technique for secure key distribution with single-photon transmissions: Heisenberg`s uncertainty principle ensures that an adversary can neither successfully tap the key transmissions, nor evade detection (eavesdropping raises the key error rate above a threshold value). The authors have developed experimental quantum cryptography systems based on the transmission of non-orthogonal photon polarization states to generate shared key material over line-of-sight optical links. Key material is built up usingmore » the transmission of a single-photon per bit of an initial secret random sequence. A quantum-mechanically random subset of this sequence is identified, becoming the key material after a data reconciliation stage with the sender. The authors have developed and tested a free-space quantum key distribution (QKD) system over an outdoor optical path of {approximately}1 km at Los Alamos National Laboratory under nighttime conditions. Results show that free-space QKD can provide secure real-time key distribution between parties who have a need to communicate secretly. Finally, they examine the feasibility of surface to satellite QKD.« less
ERIC Educational Resources Information Center
Diffin, Jennifer; Chirombo, Fanuel; Nangle, Dennis; de Jong, Mark
2010-01-01
This article explains how the document management team (circulation and interlibrary loan) at the University of Maryland University College implemented Microsoft's SharePoint product to create a central hub for online collaboration, communication, and storage. Enhancing the team's efficiency, organization, and cooperation was the primary goal.…
A Study on the Methods of Assessment and Strategy of Knowledge Sharing in Computer Course
ERIC Educational Resources Information Center
Chan, Pat P. W.
2014-01-01
With the advancement of information and communication technology, collaboration and knowledge sharing through technology is facilitated which enhances the learning process and improves the learning efficiency. The purpose of this paper is to review the methods of assessment and strategy of collaboration and knowledge sharing in a computer course,…
Rab6a/a’ Are Important Golgi Regulators of Pro-Inflammatory TNF Secretion in Macrophages
Micaroni, Massimo; Stanley, Amanda C.; Khromykh, Tatiana; Venturato, Juliana; Wong, Colin X. F.; Lim, Jet P.; Marsh, Brad J.; Storrie, Brian; Gleeson, Paul A.; Stow, Jennifer L.
2013-01-01
Lipopolysaccharide (LPS)-activated macrophages secrete pro-inflammatory cytokines, including tumor necrosis factor (TNF) to elicit innate immune responses. Secretion of these cytokines is also a major contributing factor in chronic inflammatory disease. In previous studies we have begun to elucidate the pathways and molecules that mediate the intracellular trafficking and secretion of TNF. Rab6a and Rab6a' (collectively Rab6) are trans-Golgi-localized GTPases known for roles in maintaining Golgi structure and Golgi-associated trafficking. We found that induction of TNF secretion by LPS promoted the selective increase of Rab6 expression. Depletion of Rab6 (via siRNA and shRNA) resulted in reorganization of the Golgi ribbon into more compact structures that at the resolution of electron microcopy consisted of elongated Golgi stacks that likely arose from fusion of smaller Golgi elements. Concomitantly, the delivery of TNF to the cell surface and subsequent release into the media was reduced. Dominant negative mutants of Rab6 had similar effects in disrupting TNF secretion. In live cells, Rab6–GFP were localized on trans-Golgi network (TGN)-derived tubular carriers demarked by the golgin p230. Rab6 depletion and inactive mutants altered carrier egress and partially reduced p230 membrane association. Our results show that Rab6 acts on TNF trafficking at the level of TGN exit in tubular carriers and our findings suggest Rab6 may stabilize p230 on the tubules to facilitate TNF transport. Both Rab6 isoforms are needed in macrophages for Golgi stack organization and for the efficient post-Golgi transport of TNF. This work provides new insights into Rab6 function and into the role of the Golgi complex in cytokine secretion in inflammatory macrophages. PMID:23437303
Secretion of the Intimin Passenger Domain Is Driven by Protein Folding*
Leo, Jack C.; Oberhettinger, Philipp; Yoshimoto, Shogo; Udatha, D. B. R. K. Gupta; Morth, J. Preben; Schütz, Monika; Hori, Katsutoshi
2016-01-01
Intimin is an essential adhesin of attaching and effacing organisms such as entropathogenic Escherichia coli. It is also the prototype of type Ve secretion or inverse autotransport, where the extracellular C-terminal region or passenger is exported with the help of an N-terminal transmembrane β-barrel domain. We recently reported a stalled secretion intermediate of intimin, where the passenger is located in the periplasm but the β-barrel is already inserted into the membrane. Stalling of this mutant is due to the insertion of an epitope tag at the very N terminus of the passenger. Here, we examined how this insertion disrupts autotransport and found that it causes misfolding of the N-terminal immunoglobulin (Ig)-like domain D00. We could also stall the secretion by making an internal deletion in D00, and introducing the epitope tag into the second Ig-like domain, D0, also resulted in reduced passenger secretion. In contrast to many classical autotransporters, where a proximal folding core in the passenger is required for secretion, the D00 domain is dispensable, as the passenger of an intimin mutant lacking D00 entirely is efficiently exported. Furthermore, the D00 domain is slightly less stable than the D0 and D1 domains, unfolding at ∼200 piconewtons (pN) compared with ∼250 pN for D0 and D1 domains as measured by atomic force microscopy. Our results support a model where the secretion of the passenger is driven by sequential folding of the extracellular Ig-like domains, leading to vectorial transport of the passenger domain across the outer membrane in an N to C direction. PMID:27466361
Rab6a/a' are important Golgi regulators of pro-inflammatory TNF secretion in macrophages.
Micaroni, Massimo; Stanley, Amanda C; Khromykh, Tatiana; Venturato, Juliana; Wong, Colin X F; Lim, Jet P; Marsh, Brad J; Storrie, Brian; Gleeson, Paul A; Stow, Jennifer L
2013-01-01
Lipopolysaccharide (LPS)-activated macrophages secrete pro-inflammatory cytokines, including tumor necrosis factor (TNF) to elicit innate immune responses. Secretion of these cytokines is also a major contributing factor in chronic inflammatory disease. In previous studies we have begun to elucidate the pathways and molecules that mediate the intracellular trafficking and secretion of TNF. Rab6a and Rab6a' (collectively Rab6) are trans-Golgi-localized GTPases known for roles in maintaining Golgi structure and Golgi-associated trafficking. We found that induction of TNF secretion by LPS promoted the selective increase of Rab6 expression. Depletion of Rab6 (via siRNA and shRNA) resulted in reorganization of the Golgi ribbon into more compact structures that at the resolution of electron microcopy consisted of elongated Golgi stacks that likely arose from fusion of smaller Golgi elements. Concomitantly, the delivery of TNF to the cell surface and subsequent release into the media was reduced. Dominant negative mutants of Rab6 had similar effects in disrupting TNF secretion. In live cells, Rab6-GFP were localized on trans-Golgi network (TGN)-derived tubular carriers demarked by the golgin p230. Rab6 depletion and inactive mutants altered carrier egress and partially reduced p230 membrane association. Our results show that Rab6 acts on TNF trafficking at the level of TGN exit in tubular carriers and our findings suggest Rab6 may stabilize p230 on the tubules to facilitate TNF transport. Both Rab6 isoforms are needed in macrophages for Golgi stack organization and for the efficient post-Golgi transport of TNF. This work provides new insights into Rab6 function and into the role of the Golgi complex in cytokine secretion in inflammatory macrophages.
Sweeney, Connor; Lakshmanan, Venkatachalam; Bais, Harsh P
2017-01-01
When disrupted by stimuli such as herbivory, pathogenic infection, or mechanical wounding, plants secrete signals such as root exudates and volatile organic compounds (VOCs). The emission of VOCs induces a response in the neighboring plant communities and can improve plant fitness by alerting nearby plants of an impending threat and prompting them to alter their physiology for defensive purposes. In this study, we investigated the role of plant-derived signals, released as a result of mechanical wounding, that may play a role in intraspecific communication between Arabidopsis thaliana communities. Plant-derived signals released by the wounded plant resulted in more elaborate root development in the neighboring, unwounded plants. Such plant-derived signals also upregulated the Aluminum-activated malate transporter ( ALMT1 ) responsible for the secretion of malic acid (MA) and the DR5 promoter, an auxin responsive promoter concentrated in root apex of the neighboring plants. We speculate that plant-derived signal-induced upregulation of root-specific ALMT1 in the undamaged neighboring plants sharing the environment with stressed plants may associate more with the benign microbes belowground. We also observed increased association of beneficial bacterium Bacillus subtilis UD1022 on roots of the neighboring plants sharing environment with the damaged plants. Wounding-induced plant-derived signals therefore induce defense mechanisms in the undamaged, local plants, eliciting a two-pronged preemptive response of more rapid root growth and up-regulation of ALMT1 , resulting in increased association with beneficial microbiome.
Variola virus immune evasion proteins.
Dunlop, Lance R; Oehlberg, Katherine A; Reid, Jeremy J; Avci, Dilek; Rosengard, Ariella M
2003-09-01
Variola virus, the causative agent of smallpox, encodes approximately 200 proteins. Over 80 of these proteins are located in the terminal regions of the genome, where proteins associated with host immune evasion are encoded. To date, only two variola proteins have been characterized. Both are located in the terminal regions and demonstrate immunoregulatory functions. One protein, the smallpox inhibitor of complement enzymes (SPICE), is homologous to a vaccinia virus virulence factor, the vaccinia virus complement-control protein (VCP), which has been found experimentally to be expressed early in the course of vaccinia infection. Both SPICE and VCP are similar in structure and function to the family of mammalian complement regulatory proteins, which function to prevent inadvertent injury to adjacent cells and tissues during complement activation. The second variola protein is the variola virus high-affinity secreted chemokine-binding protein type II (CKBP-II, CBP-II, vCCI), which binds CC-chemokine receptors. The vaccinia homologue of CKBP-II is secreted both early and late in infection. CKBP-II proteins are highly conserved among orthopoxviruses, sharing approximately 85% homology, but are absent in eukaryotes. This characteristic sets it apart from other known virulence factors in orthopoxviruses, which share sequence homology with known mammalian immune regulatory gene products. Future studies of additional variola proteins may help illuminate factors associated with its virulence, pathogenesis and strict human tropism. In addition, these studies may also assist in the development of targeted therapies for the treatment of both smallpox and human immune-related diseases.
Labidi, Nehla; Snoussi, Sana; Ammari, Manel; Metoui, Wissal; Ben Yousfi, N; Hamrouni, Lamia; Abdelly, C
2010-12-01
The aim of this study was to identify the relationship between the adaptive processes of Suaeda fruticosa for Pi acquisition and the physic-chemical and biological characteristics of two soil types under moderate and high saline conditions. Four treatments were established in pots: namely SS100, SS600, CS100 and CS600 where SS stood for sandy soil and CS for calcareous soil, and the indexes 100 and 600 were NaCl concentrations (mM) in irrigation distilled water. Assuming that Pi per g of plant biomass is an indicator of plant efficiency for P acquisition, the results showed that Pi acquisition was easiest on SS100 and was difficult on CS100. The differences in Pi acquisition between plants on SS100 and CS100 could be attributed to the low root surface area (-30%) and to the low alkaline phosphatases (Pases) activities (-50%) in calcareous rhizospheric soil. The high salinity level had no effect on the efficiency of P acquisition on SS but increased this parameter on CS (+50%). In the latter soil type, high acid phosphatase activities were observed in rhizospheric soil at high salinity level. Acid phosphatase seemed to be secreted from the roots. The higher secretion of acid phosphatase in this soil was related to the root lipid peroxidation in response to elevated salinity associated with the augmentation of unsaturated acids which might induce an oxidative damage of the root membrane. Thus we can conclude that in deficient soil such as calcareous, the efficiency of P acquisition in S. fruticosa which was difficult at moderate salinity level can be enhanced by high salinity level.