Minkara, Mona S; Weaver, Michael N; Gorske, Jim; Bowers, Clifford R; Merz, Kenneth M
2015-08-11
There exists a sparse representation of blind and low-vision students in science, technology, engineering and mathematics (STEM) fields. This is due in part to these individuals being discouraged from pursuing STEM degrees as well as a lack of appropriate adaptive resources in upper level STEM courses and research. Mona Minkara is a rising fifth year graduate student in computational chemistry at the University of Florida. She is also blind. This account presents efforts conducted by an expansive team of university and student personnel in conjunction with Mona to adapt different portions of the graduate student curriculum to meet Mona's needs. The most important consideration is prior preparation of materials to assist with coursework and cumulative exams. Herein we present an account of the first four years of Mona's graduate experience hoping this will assist in the development of protocols for future blind and low-vision graduate students in computational chemistry.
Harris, S
2013-01-01
The recommendations for controlling HIV/AIDS, whether prescriptive or descriptive, underscore the value of information: its translation into knowledge, and knowledge into behaviour. Thus, accessing, evaluating, disseminating and applying authoritative, credible and scholarly information on HIV/AIDS are critical elements in the control of this pandemic in the Web 2.0 era. The University of the West Indies (UWI) Mona libraries have embraced this information role. This article provides insights into three of the information initiatives implemented by the UWI Mona libraries in this important capacity. In this regard, it also provides ideas for other West Indian information units and enhances communication on access to information products and services, albeit incrementally, in an important area of health services for the West Indies.
Economic geology of the Isla de Mona Quadrangle, Puerto Rico
Briggs, Reginald Peter
1974-01-01
Limiting this tableland In the northern part of Isla de Mona are sheer sea cliffs chiefly exposing the Isla de Mona Dolomite. Around the southern part of the island are Irregular cliffs and steep slopes that chiefly expose the Lirio Limestone. The structure of Isla de Mona consists of two gentle complex folds a broad anticline that trends and plunges gently south-southeast through the central and western parts of Isla de Mona, and a parallel syncline through-the eastern part of the Island that also has a chiefly south-southeast plunge. A near-vertical fault that strikes northwest, then north from the central part to the north coast of Isla de Mona displaces bedrock of the eastern block downward about 10 m. Many caves, including one cave system more than 100,000 m2 in total area, are localized in the lower 10 m of the Lirio Limestone, adjacent to the cliffs peripheral to the upland surface, and numerous small caves occur higher in the Lirio. A few small caves also are found In the Isla de Mona Dolomite. However, the total floor area of all caves on Isla de Mona probably is less than 1 percent of the area of the Island. Almost all caves on Isla de Mona contain phosphorite, which was mined extensively during the late 19th and early 20th centuries. Phosphorite accumulation locally may have exceeded 3.5 m in thickness, but probably averaged less than 1.5 m thick. A fair estimate of original reserves of phosphorite in 12 surveyed caves is about 151,000 m3 of which about 125,500 m3 probably has been removed in mining. Original reserves in the entire island are estimated to have been in the range 158,000 to 235,500 m3. Converted to metric tons, remaining reserves of cave phosphorite probably are considerably less than 50,000. The very pure limestone and calcitic dolomite that form the bedrock of Isla de Mona are abundant industrial-mineral resources. In addition, these carbonate rocks and the beach deposits are sources of construction materials for some classes of engineering works. The structure of Isla de Mona suggests some possibility of favorable zones for accumulation of oil and gas, but no source rocks are known, and there are no confirmed reports of oil and gas from any nearby area. Known supplies of fresh water on Isla de Mona are very small, but wells dug in coastal lowlands or drilled In the upland surface might yield moderate quantities of groundwater.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-23
... Corridor Project, Utah, and the Proposed Pony Express Resource Management Plan Amendment AGENCY: Bureau of...)/Proposed Resource Management Plan Amendment (RMPA) for the Mona to Oquirrh Transmission Corridor Project... Final EIS/Proposed RMPA for the Mona to Oquirrh Transmission Corridor Project have been sent to affected...
Díaz-Lameiro, Alondra M; Oleksyk, Taras K; Bird-Picó, Fernando J; Martínez-Cruzado, Juan Carlos
2013-01-01
Little is known about the natural history of the Sphaerodactylus species endemic to the three islands located in the Mona Passage separating the Greater Antillean islands of Hispaniola and Puerto Rico. In this study, parts of two mitochondrial genes, 16S rRNA and 12S rRNA, were sequenced to determine the relationships between the sphaerodactylids that live in the Mona Passage and other Caribbean species from the same genus. While the main goal was to identify the biogeographical origin of these species, we also identified a genetically distinct type of dwarf gecko that warrants future evaluation as a possible new species. According to the reconstructed phylogenies, we propose a stepwise model of colonization wherein S. nicholsi from southwestern Puerto Rico or a very close ancestor gave rise through a founder event to Sphaerodactylus monensis on Mona Island. In a similar fashion, S. monensis or a very close ancestor on Mona Island gave rise to S. levinsi on Desecheo Island. This study also suggests that the most recent common ancestor between the species from the islands in the Mona Passage and Puerto Rico existed approximately 3 MYA. PMID:24340189
Dispersal, recruitment and migratory behaviour in a hawksbill sea turtle aggregation.
Velez-Zuazo, Ximena; Ramos, Willy D; van Dam, Robert P; Diez, Carlos E; Abreu-Grobois, Alberto; McMillan, W Owen
2008-02-01
We investigated the dispersal, recruitment and migratory behaviour of the hawksbill sea turtle (Eretmochelys imbricata), among different life-history stages and demographic segments of the large hawksbill turtle aggregation at Mona Island, Puerto Rico. There were significant differences in both mitochondrial DNA (mtDNA) haplotype diversity and haplotype frequencies among the adult males, females and juveniles examined, but little evidence for temporal heterogeneity within these same groups sampled across years. Consistent with previous studies and the hypothesis of strong natal homing, there were striking mtDNA haplotype differences between nesting females on Mona Island and nesting females in other major Caribbean rookeries. Breeding males also showed strong, albeit weaker, genetic evidence of natal homing. Overall, Bayesian mixed-stock analysis suggests that Mona Island was the natal rookery for 79% (65-94%) of males in the aggregation. In contrast, the Mona Island rookery accounted for only a small subset of the new juvenile recruits to the foraging grounds or in the population of older juvenile hawksbills turtles on Mona. Instead, both new recruits and the older juvenile hawksbill turtles on Mona more likely recruited from other Caribbean rookeries, suggesting that a mechanism besides natal homing must be influencing recruitment to feeding habitats. The difference in the apparent degree of natal homing behaviour among the different life-history stages of hawksbill turtles at Mona Island underscores the complexity of the species' life-history dynamics and highlights the need for both local and regional conservation efforts.
ERIC Educational Resources Information Center
Newman, Dunstan; Newman, Nadine
2010-01-01
Purpose: The purpose of this paper is to focus on training in support of leadership development at the University of the West Indies, Mona Campus, main and branch libraries. Design/methodology/approach: The paper is based on an interview with a campus librarian and desk research. Findings: Like any other institution in the world, the Mona Library…
Geology of Isla de Mona, Puerto Rico
Frank, E.F.; Wicks, Carol M.; Mylroie, J.; Troester, J.; Alexander, E.C.; Carew, J.L.
1998-01-01
Isla de Mona is a carbonate island located in the Mona Passage 68 km west of Puerto Rico. The tectonically uplifted island is 12 km by 5 km, with an area of 55 km2, and forms a raised flat-topped platform or meseta. The meseta tilts gently to the south and is bounded by near vertical cliffs on all sides. These cliffs rise from 80 m above sea level on the north to 20 m above the sea on the southern coast. Along the southwestern and western side of the island a three- to six-meter-high Pleistocene fossil reef abuts the base of the cliff to form a narrow coastal plain. The meseta itself consists of two Mio-Pliocene carbonate units, the lower Isla de Mona Dolomite and the upper Lirio Limestone. Numerous karst features, including a series of flank margin caves primarily developed at the Lirio Limestone/Isla de Mona Dolomite contact, literally ring the periphery of the island.
Sedimentology and diagenesis of Miocene Lirio Limestone, Isla de Mona, Puerto Rico
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ruiz, H.; Gonzalez, L.A.; Budd, A.F.
1991-03-01
Isla de Mona is a carbonate plateau, 50 mi west of Puerto Rico. The island lies on the southern portion of the Mona Platform. It is composed mostly of two Miocene carbonate units: Isla de Mona Dolomite overlain by Lirio Limestone. The Lirio Limestone was deposited on a sloping erosional surface over the Isla de Mona Dolomite. The Miocene Lirio Limestone consists mostly of backreef sands (packstones) with a reefal sequence (boundstones and grainstones) present in the southwestern portion of the island. The reefal sequence is made up mostly of Stylophora, Porites, and Millepora. Thin, discreet pockets of carbonate mud,more » rich in planktonic foraminifera and radiolarians and mixed with shallow benthic fauna/flora (foraminifera, echinoderms, red algae, and corals) interpreted as storm deposits, are found throughout the unit. An extensive reefal zone can be inferred to be present throughout the southwestern to southern portions of the Mona Platform. The Lirio Limestone is heavily karstified and is riddled with sinkholes on the plateau surfaces and caves around the periphery of the island. Caves are exposed around the periphery of the island, radiating from a depression in the central portions of the Lirio Limestone, near contacts with the Isla de Mona Dolomite, are partially dolomitized. The southwestern outcrops exhibit partial dolomitization throughout. The distribution of sinkholes, seaward caverns, and partial dolomitization of the lowermost Lirio Limestone suggests diagenetic modifications by meteoric fluids in central exposed portions of the island and by marine-meteoric fluids in the lowermost portions of the phreatic lens.« less
J. Rojas-Sandoval; E.J. Melendez-Ackerman; J. Fumero-Caban; M. Garcia-Bermudez; J. Sustache; S. Aragon; M. Morales-Vargas; G. Olivieri; D.S. Fernandez
2016-01-01
Mona Island protects one of the most important remnants of Caribbean dry forests and hosts a high diversity of rare and endangered plant and animal species. Feral ungulates (goats and pigs) were introduced to the island ~500 y ago, and their populations may be threatening the conservation of Mona Islandâs native biodiversity. In this study, we used permanent fenced and...
Three new extreme ultraviolet spectrometers on NSTX-U for impurity monitoring
DOE Office of Scientific and Technical Information (OSTI.GOV)
Weller, M. E., E-mail: weller4@llnl.gov; Beiersdorfer, P.; Soukhanovskii, V. A.
2016-11-15
Three extreme ultraviolet (EUV) spectrometers have been mounted on the National Spherical Torus Experiment–Upgrade (NSTX-U). All three are flat-field grazing-incidence spectrometers and are dubbed X-ray and Extreme Ultraviolet Spectrometer (XEUS, 8–70 Å), Long-Wavelength Extreme Ultraviolet Spectrometer (LoWEUS, 190–440 Å), and Metal Monitor and Lithium Spectrometer Assembly (MonaLisa, 50–220 Å). XEUS and LoWEUS were previously implemented on NSTX to monitor impurities from low- to high-Z sources and to study impurity transport while MonaLisa is new and provides the system increased spectral coverage. The spectrometers will also be a critical diagnostic on the planned laser blow-off system for NSTX-U, which will bemore » used for impurity edge and core ion transport studies, edge-transport code development, and benchmarking atomic physics codes.« less
Evolution of in vitro fertilization at the University of the West Indies, Jamaica.
Pottinger, A M; Everett-Keane, D; McKenzie, C
2012-07-01
In vitro fertilization (IVF) provides hope for many couples who believed that they could not have children. This paper tracks the development of IVF treatment at The University of the West Indies (UWI), Mona, from its genesis in 2000. It highlights changes over the years in the population seeking IVF at UWI, Mona, and describes clinical services offered to clients, comparing success rates of services internationally. It also reports on seminal research emerging out of UWI, Mona, in the field of assisted reproductive health. The Hugh Wynter Fertility Management Unit (HWFMU), UWI, Mona, leads the way in shaping how society views those challenged with infertility and in its use of assisted reproductive technologies that improve the quality of life for many locally, within the Caribbean and the Diaspora.
López-Venegas, A.M.; ten Brink, Uri S.; Geist, Eric L.
2008-01-01
The October 11, 1918 ML 7.5 earthquake in the Mona Passage between Hispaniola and Puerto Rico generated a local tsunami that claimed approximately 100 lives along the western coast of Puerto Rico. The area affected by this tsunami is now significantly more populated. Newly acquired high-resolution bathymetry and seismic reflection lines in the Mona Passage show a fresh submarine landslide 15 km northwest of Rinćon in northwestern Puerto Rico and in the vicinity of the first published earthquake epicenter. The landslide area is approximately 76 km2 and probably displaced a total volume of 10 km3. The landslide's headscarp is at a water depth of 1200 m, with the debris flow extending to a water depth of 4200 m. Submarine telegraph cables were reported cut by a landslide in this area following the earthquake, further suggesting that the landslide was the result of the October 11, 1918 earthquake. On the other hand, the location of the previously suggested source of the 1918 tsunami, a normal fault along the east wall of Mona Rift, does not show recent seafloor rupture. Using the extended, weakly non-linear hydrodynamic equations implemented in the program COULWAVE, we modeled the tsunami as generated by a landslide with a duration of 325 s (corresponding to an average speed of ~ 27 m/s) and with the observed dimensions and location. Calculated marigrams show a leading depression wave followed by a maximum positive amplitude in agreement with the reported polarity, relative amplitudes, and arrival times. Our results suggest this newly-identified landslide, which was likely triggered by the 1918 earthquake, was the primary cause of the October 11, 1918 tsunami and not the earthquake itself. Results from this study should be useful to help discern poorly constrained tsunami sources in other case studies.
The October 11, 1918 Mona Passage tsunami modeled using new submarine landslide evidence.
NASA Astrophysics Data System (ADS)
López, A. M.; ten Brink, U.; Geist, E.
2007-12-01
The October 11, 1918 ML 7.5 earthquake in the Mona Passage betweeen Hispaniola and Puerto Rico generated a local tsunami that claimed approximately 100 lives along the western coast of Puerto Rico. The area affected by this tsunami is now many-fold more populated. Although the exact cause of the tsunami is still unclear, newly-acquired high-resolution bathymetry of the Mona Passage and seismic reflection lines show a fresh submarine landslide 12 km northwest of Rincón in northwestern Puerto Rico and in the vicinity of the earthquake epicenter determined by Doser et al., (2005). The landslide area is approximately 76 km2 and probably displaced a total volume of 10 km3. The landslide's head scarp is at a water depth of 1.2 km, with the debris flow extending down to a water depth of 4.5 km. The seismic profiles and multibeam bathymetry indicate that the previously suggested source of the 1918 tsunami, a normal fault along the east side of Mona Rift (Mercado and McCann, 1998), was not active recently. The fault escarpment along Desecheo Ridge, which is near the Doser et al., (2005) epicenter, and our landslide appear, on the other hand, to be rather fresh. Using the extended, weakly non-linear hydrodynamic equations implemented in the program COULWAVE (Lynett and Liu, 2002), we modeled the tsunami by a landslide with a finite duration and with the observed dimensions and location. Marigrams (time series of sea level) were calculated at locations near to reported locations of runup. The marigrams show a leading depression wave followed by a maximum positive amplitude in good agreement with the reported polarity, relative amplitudes, and arrival times. Our results suggest this newly-identified landslide, which was likely triggered by the 1918 earthquake, was the probable cause of the October 11, 1918 tsunami and not a normal fault rupture as previously suggested.
ERIC Educational Resources Information Center
Hubbard, Guy
2003-01-01
Focuses on the facial expression in the "Mona Lisa" by Leonardo da Vinci. Offers background information on da Vinci as well as learning activities for students. Includes a reproduction of the "Mona Lisa" and information about the painting. (CMK)
Clucas, Stephen
2017-05-01
John Dee's Monas Hieroglyphica (1564) was a work which involved a close collaboration between its author and his "singular friend" the Antwerp printer Willem Silvius, in whose house Dee was living whilst he composed the work and saw it through the press. This article considers the reasons why Dee chose to collaborate with Silvius, and the importance of the intellectual culture - and the print trade - of the Low Countries to the development of Dee's outlook. Dee's Monas was probably the first alchemical work which focused exclusively on the diagrammatic representation of the alchemical process, combining diagrams, cosmological schemes, and various forms of tabular grid. It is argued that in the Monas the boundaries between typography and alchemy are blurred as the diagrams "anatomising" his hieroglyphic sign (the "Monad") are seen as revealing truths about alchemical substances and processes.
ERIC Educational Resources Information Center
Minkara, Mona S.; Weaver, Michael N.; Gorske, Jim; Bowers, Clifford R.; Merz, Kenneth M., Jr.
2015-01-01
There exists a sparse representation of blind and low-vision students in science, technology, engineering and mathematics (STEM) fields. This is due in part to these individuals being discouraged from pursuing STEM degrees as well as a lack of appropriate adaptive resources in upper level STEM courses and research. Mona Minkara is a rising fifth…
DOE Office of Scientific and Technical Information (OSTI.GOV)
Atalay, Bulent
2004-05-03
Bulent Atalay discusses content from his book entitled "Math and the Mona Lisa" which covers Leonardo Da Vinci and how he combined his love of science, math, and art to draw dramatic conclusions about the natural world. He also describes how mathematics influences art and architecture.
NASA Astrophysics Data System (ADS)
Matos-Llavona, P. I.; Lopez, A. M.; Jaffe, B. E.; Richmond, B. M.
2017-12-01
Extreme waves on coastlines pose a threat to human life, habitats, and critical coastal infrastructure. Geological evidence of extreme waves can provide valuable information on the magnitude, frequency, wave characteristics and source of past events, thus improving coastal hazard assessment. Reef-rock boulders, as much as 5m in diameter, are found up to 500 m inland on the southwestern coast of Isla de Mona, Puerto Rico. These boulders were emplaced 4000 years ago based on age dates from encrusting corals (Taggart et al., 1993). This study aims to identify an event capable of forming these deposits. For this, a numerical model of the 1918 Mona Passage tsunami was constructed using the New Evolution of Ocean Wave (NEOWAVE) model with three nested grids of 3, 1 and 1/3 arc-second resolution, respectively. A second simulation of a submarine landslide (1km3 volume) located 300m from the southwestern Mona shoreline was run using 3D Tsunami Solution Using Navier-Stokes Algorithm with Multiple Interfaces (TSUNAMI3D). The resulting inundation and wave heights at the shoreline are compared to minimum wave heights required to initiate transport (sub-aerial and submerged) of measured boulders and idealized cubic boulders with varying volumes. The 1918 Mona Passage tsunami simulation shows no significant inundation on the SSW Mona coast and a maximum wave height of 1.3m, which is below the minimum wave height required to initiate transport of a 1m diameter boulder. This result suggests that a tsunami like the one generated in 1918 is not capable of transporting even the smaller boulders. However, the submarine landslide generated extensive inundation on the SW coast with maximum wave height of 10m at the shoreline, 20m run-up, and 900m inundation distance. This is greater than the minimum wave height needed to initiate transport in both submerged and subaerial pre-transport settings; therefore, a submarine landslide with characteristics of the modeled landslide can form the boulder deposits observed. Marine geological surveys providing dates of landslides found in deep waters south of Mona Island will be required to validate this hypothesis. Taggart, B.E. et al., 1993, Holocene reef-rock boulders on Isla de Mona, Puerto Rico, transported by a hurricane or seismic sea wave. GSA, Abstract with Programs v. 25(6), p. 61.
Something to Smile about: Preschoolers Meet Mona Lisa
ERIC Educational Resources Information Center
Woo, Vila
2009-01-01
In this article, the author describes a class project wherein preschoolers gained an enriched experience learning art history through engaging in various activities: (1) listening to a storybook; (2) viewing images; (3) doing movement; and (4) producing a masterpiece. The author describes how the children painted their interpretation of Mona Lisa…
Karst development and speleogenesis, Isla de Mona, Puerto Rico
Frank, E.F.; Mylroie, J.; Troester, J.; Alexander, E.C.; Carew, J.L.
1998-01-01
Isla de Mona consists of a raised table-top Miocene-Pliocene reef platform bounded on three sides by vertical cliffs, up to 80 m high. Hundreds of caves ring the periphery of the island and are preferentially developed in, but not limited to, the Lirio Limestone/Isla de Mona Dolomite contact. These flank margin caves originally formed at sea level and are now exposed at various levels by tectonic uplift of the island (Franbk 1983; Mylroie et al. 1995b). Wall cusps, a characteristic feature of flank margin caves, are ubiquitois features. Comparisons among similar caves formed in the Bahamas and Isla de Mona reveal the same overall morphology throughout the entire range of sizes and complexities. The coincidence of the primary cave development zone with the Lirio Limestone/Isla de Mona Dolomite contact may result from syngenetic speleogenesis and dolomitization rather than preferential dissolution along a lithologic boundary. Tectonic uplift and glacioeustatic sea level fluctuations produced caves at a variety of elevations. Speleothem dissolution took place in many caves under phreatic conditions, evidence these caves were flooded after an initial period of subaerial exposure and speleothem growth. Several features around the perimeter of the island are interpreted to be caves whose roofs were removed by surficial denudation processes. Several large closed depressions and dense pit cave fields are further evidence of surficial karst features. The cliff retreat around the island perimeter since the speleogenesis of the major cave systems is small based upon the distribution of the remnant cave sections.
Extension in Mona Passage, Northeast Caribbean
Chaytor, J.D.; ten Brink, Uri S.
2010-01-01
As shown by the recent Mw 7.0 Haiti earthquake, intra-arc deformation, which accompanies the subduction process, can present seismic and tsunami hazards to nearby islands. Spatially-limited diffuse tectonic deformation within the Northeast Caribbean Plate Boundary Zone likely led to the development of the submerged Mona Passage between Puerto Rico and the Dominican Republic. GPS geodetic data and a moderate to high level of seismicity indicate that extension within the region is ongoing. Newly-collected high-resolution multibeam bathymetry and multi-channel seismic reflection profiles and previously-collected samples are used here to determine the tectonic evolution of the Mona Passage intra-arc region. The passage is floored almost completely by Oligocene-Pliocene carbonate platform strata, which have undergone submarine and subaerial erosion. Structurally, the passage is characterized by W- to NNW-trending normal faults that offset the entire thickness of the Oligo-Pliocene carbonate platform rocks. The orientation of these faults is compatible with the NE-oriented extension vector observed in GPS data. Fault geometry best fits an oblique extension model rather than previously proposed single-phase, poly-phase, bending-moment, or rotation extension models. The intersection of these generally NW-trending faults in Mona Passage with the N-S oriented faults of Mona Canyon may reflect differing responses of the brittle upper-crust, along an arc-forearc rheological boundary, to oblique subduction along the Puerto Rico trench. Several faults within the passage, if ruptured completely, are long enough to generate earthquakes with magnitudes on the order of Mw 6.5-7. ?? 2010.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-10
... Amendment/Mona to Oquirrh Transmission Corridor Project Environmental Impact Statement AGENCY: Bureau of... Plan (RMP) Amendment and the Mona to Oquirrh Transmission Corridor Project located in Juab, Salt Lake... right-of-way outside of a designated corridor on public lands administered by the BLM Salt Lake Field...
The Mona Lisa of modern science.
Kemp, Martin
2003-01-23
No molecule in the history of science has reached the iconic status of the double helix of DNA. Its image has been imprinted on all aspects of society, from science, art, music, cinema, architecture and advertising. This review of the Mona Lisa of science examines the evolution of its form at the hands of both science and art.
New and interesting ectomycorrhizal fungi from Puerto Rico, Mona, and Guana Islands
Orson K. Miller; D. Jean Lodge; Timothy J. Baroni
2000-01-01
A report of putative ectomycorrhizal fungi from Puerto Rico, Mona, and Guana Island in the Greater Antilles includes four species of Amanita, three of which are new species; two Lactarius, one is new, and two species of Boletus, one new. In addition, new distribution records of Phlebopus beniensis, Russula littoralis, Lactarius ferrugineus, a new small spored...
Forest vegetation cover assessment on Mona Island, Puerto Rico
Thomas J. Brandeis; Elvia J. Meléndez-Ackerman; Eileen H. Helmer
2012-01-01
Permanent plots were installed on the Mona Island natural reserve as part of the U.S. Department of Agriculture Forest Serviceâs forest vegetation assessment and monitoring efforts in the Commonwealth of Puerto Rico. In addition to tree, sapling, and seedling measurements, the data collected included detailed descriptions of percent cover of vascular plants in four...
Performance comparison of MoNA and LISA neutron detectors
NASA Astrophysics Data System (ADS)
Purtell, Kimberly; Rethman, Kaitlynne; Haagsma, Autumn; Finck, Joseph; Smith, Jenna; Snyder, Jesse
2010-11-01
In 2002 eight primarily undergraduate institutions constructed and tested the Modular Neutron Array (MoNA) which has been used to detect high energy neutrons at the National Superconducting Cyclotron Laboratory (NSCL). Nine institutions have now designed, constructed and tested the Large-area multi-Institutional Scintillator Array (LISA) neutron detector which will be used at the NSCL and the future Facility for Rare Isotope Beams (FRIB). Both detectors are comprised of 144 detector modules. Each module is a 200 x 10 x 10 cm^3 bar organic plastic scintillator with a photomultiplier tube mounted on each end. Using cosmic rays and a gamma source, we compared the performance of MoNA and LISA by using the same electronics to check light attenuation, position resolution, rise times, and cosmic ray peak widths. Results will be presented.
NASA Astrophysics Data System (ADS)
Rodriguez-Delga, A. M.; Ramirez, W. R.
2008-12-01
Sardinera beach in Mona Island, Puerto Rico, has a great recreational and ecological value and is an important research place to gather information on shoreline processes in an area far from the main land and with only scarce man made influences. Beach rock exposures present along the shoreline in Sardinera Beach have increased considerably during the last decade. A new management plan is being developed for Mona Island and the Department of Natural Resources (DNRA) of Puerto Rico wants to better understand the beach sand dynamics on this and other Mona Island beaches. This research includes field and laboratory work that characterize coastal sedimentary processes and helps to better understand the shoreline changes as well as seasonal variations in sand movement and composition. This work also establish the logistics and methodology basis for further studies that will expand to other Mona Island beaches. Benchmarks, GPS coordinates, and landmarks were used to establish ten permanent beach profiles along Sardinera Beach. Beach profiles were (and will be) measured monthly. Sardinera Beach sands are composed mostly of carbonate (CaCO3) components, products of the combination of biological, chemical and diagenetic processes, high grade of micritization, and of lithic limestone fragments. Sand composition differences between Sardinera Beach, the Mona Shelf and adjacent beach, reef crest and reef lagoon systems suggest Sardinera sands are not replenished by the modern marine components produced in these environments. The input of "fresh bioclasts" in this beach seems to be limited by natural (beach rock) and mane made (dock) barriers along the shore and by alteration in the current patterns produced by the man made aperture of the reef. Sardinera's micritized and recrystalized sand deposits seem to have been re-transported between the reefal lagoon and the beach. Sand volume analysis indicates a total sand loss of 1,322 m3 between the months of September to April. Aerial images from the years 1977, 1992 and 2003 show 14 to 27 meters of recession along the coast line.
E. Medina; E.H. Helmer; E. Melendez-Ackerman; H. Marcano-Vega
2014-01-01
Mona Island is the third largest island in the archipelago of Puerto Rico located about 70 km west of the main island. Presently it is a wilderness refuge that contains well-preserved arboreal and shrubby vegetation, and distinct cactus forests, covering the calcareous, elevated plateau. During a forest inventory conducted by the US Forest Service, we obtained leaves...
DaVinci's Mona Lisa entering the next dimension.
Carbon, Claus-Christian; Hesslinger, Vera M
2013-01-01
For several of Leonardo da Vinci's paintings, such as The Virgin and Child with St Anne or the Mona Lisa, there exist copies produced by his own studio. In case of the Mona Lisa, a quite exceptional, rediscovered studio copy was presented to the public in 2012 by the Prado Museum in Madrid. Not only does it mirror its famous counterpart superficially; it also features the very same corrections to the lower layers, which indicates that da Vinci and the 'copyist' must have elaborated their panels simultaneously. On the basis of subjective (thirty-two participants estimated painter-model constellations) as well as objective data (analysis of trajectories between landmarks of both paintings), we revealed that both versions differ slightly in perspective. We reconstructed the original studio setting and found evidence that the disparity between both paintings mimics human binocular disparity. This points to the possibility that the two Giocondas together might represent the first stereoscopic image in world history.
Kline, Kristopher P; Conti, C Richard; Winchester, David E
2015-01-01
Acute coronary syndrome (ACS) remains a major burden on morbidity and mortality in the United States. Medical professionals and students often use the mnemonic 'MONA' (morphine, oxygen, nitroglycerin and aspirin) to recall treatments for ACS; however, this list of therapies is outdated. We provide a historical perspective on 'MONA,' attempt to uncover its origin in the medical literature, and demonstrate the myriad changes that have occurred over the last 50 years of ACS management. We have developed a novel mnemonic, 'THROMBINS2' (thienopyridines, heparin/enoxaparin, renin-angiotensin system blockers, oxygen, morphine, beta blocker, intervention, nitroglycerin, statin/salicylate) to help bedside clinicians recall all the elements of contemporary ACS management. We demonstrate the mortality benefit for each component of contemporary ACS management, correlating the continued improvement with historical data on mortality after myocardial infarction. We encourage providers to utilize this mnemonic to explore options and guide treatments in ACS patients.
MONA – Interactive manipulation of molecule collections
2013-01-01
Working with small‐molecule datasets is a routine task for cheminformaticians and chemists. The analysis and comparison of vendor catalogues and the compilation of promising candidates as starting points for screening campaigns are but a few very common applications. The workflows applied for this purpose usually consist of multiple basic cheminformatics tasks such as checking for duplicates or filtering by physico‐chemical properties. Pipelining tools allow to create and change such workflows without much effort, but usually do not support interventions once the pipeline has been started. In many contexts, however, the best suited workflow is not known in advance, thus making it necessary to take the results of the previous steps into consideration before proceeding. To support intuition‐driven processing of compound collections, we developed MONA, an interactive tool that has been designed to prepare and visualize large small‐molecule datasets. Using an SQL database common cheminformatics tasks such as analysis and filtering can be performed interactively with various methods for visual support. Great care was taken in creating a simple, intuitive user interface which can be instantly used without any setup steps. MONA combines the interactivity of molecule database systems with the simplicity of pipelining tools, thus enabling the case‐to‐case application of chemistry expert knowledge. The current version is available free of charge for academic use and can be downloaded at http://www.zbh.uni‐hamburg.de/mona. PMID:23985157
Barlow, Katrina L.; Ajao, Adebowale Oluwafemi; Clewley, Jonathan P.
2003-01-01
A novel simian immunodeficiency virus (SIV) sequence has been recovered from RNA extracted from the serum of a mona monkey (Cercopithecus mona) wild born in Nigeria. The sequence was obtained by using novel generic (degenerate) PCR primers and spans from two-thirds into the gag gene to the 3′ poly(A) tail of the SIVmonNG1 RNA genome. Analysis of the open reading frames revealed that the SIVmonNG1 genome codes for a Vpu protein, in addition to Gag, Pol, Vif, Vpr, Tat, Rev, Env, and Nef proteins. Previously, only lentiviruses infecting humans (human immunodeficiency virus type 1 [HIV-1]) and chimpanzees (SIVcpz) were known to have a vpu gene; more recently, this has also been found in SIVgsn from Cercopithecus nictitans. Overall, SIVmonNG1 most closely resembles SIVgsn: the env gene sequence groups with HIV-1/SIVcpz env sequences, whereas the pol gene sequence clusters closely with the pol sequence of SIVsyk from Cercopithecus albogaris. By bootscanning and similarity plotting, the first half of pol resembles SIVsyk, whereas the latter part is closer to SIVcol from Colobus guereza. The similarities between the complex mosaic genomes of SIVmonNG1 and SIVgsn are consistent with a shared or common lineage. These data further highlight the intricate nature of the relationships between the SIVs from different primate species and will be helpful for unraveling these associations. PMID:12768007
Chan, Teresa M; Jo, David; Shih, Andrew W; Bhagirath, Vinai C; Castellucci, Lana A; Yeh, Calvin; Thoma, Brent; Tseng, Eric K; de Wit, Kerstin
2018-06-01
Online educational resources are criticized as being teacher-centred, failing to address learner's needs. Needs assessments are an important precursor to inform curriculum development, but these are often overlooked or skipped by developers of online educational resources due to cumbersome measurement tools. Novel methods are required to identify perceived and unperceived learning needs to allow targeted development of learner-centred curricula. To evaluate the feasibility of performing a novel technique dubbed the Massive Online Needs Assessment (MONA) for the purpose of emergency haematology online educational curricular planning, within an online learning community (affiliated with the Free Open Access Medical education movement). An online survey was launched on CanadiEM.org using an embedded Google Forms survey. Participants were recruited using the study website and a social media campaign (utilizing Twitter, Facebook, Blogs, and a poster) targeting a specific online community. Web analytics were used to monitor participation rates in addition to survey responses. The survey was open from 20 September to 10 December 2016 and received 198 complete responses representing 6 medical specialties from 21 countries. Most survey respondents identified themselves as staff physicians (n = 109) and medical trainees (n = 75). We identified 17 high-priority perceived needs, 17 prompted needs, and 10 topics with unperceived needs through our MONA process. A MONA is a feasible, novel method for collecting data on perceived, prompted, and unperceived learning needs to inform an online emergency haematology educational blog. This methodology could be useful to the developers of other online education resources.
The uncatchable smile in Leonardo da Vinci's La Bella Principessa portrait.
Soranzo, Alessandro; Newberry, Michelle
2015-08-01
A portrait of uncertain origin recently came to light which, after extensive research and examination, was shown to be that rarest of things: a newly discovered Leonardo da Vinci painting entitled La Bella Principessa. This research presents a new illusion which is similar to that identified in the Mona Lisa; La Bella Principessa's mouth appears to change slant depending on both the Viewing Distance and the Level of Blur applied to a digital version of the portrait. Through a series of psychophysics experiments, it was found that a perceived change in the slant of the La Bella Principessa's mouth influences her expression of contentment thus generating an illusion that we have coined the "uncatchable smile". The elusive quality of the Mona Lisa's smile has been previously reported (Science, 290 (2000) 1299) and so the existence of a similar illusion in a portrait painted prior to the Mona Lisa becomes more interesting. The question remains whether Leonardo da Vinci intended this illusion. In any case, it can be argued that the ambiguity created adds to the portrait's allure. Copyright © 2015 Elsevier Ltd. All rights reserved.
The Hermetic Frontispiece: Contextualising John Dee's Hieroglyphic Monad.
Forshaw, Peter J
2017-05-01
This essay examines the elaborate title pages of some of alchemist, astrologer, and bibliophile John Dee's publications with a focus on the two best known works that feature his famous Hieroglyphic Monad, the Propaedeumata Aphoristica (1558) and Monas Hieroglyphica (1564). The aim is to cast light on its context, identify sources for some textual influences in the works, unpack the visual symbolism in the two "monadic" title pages in relation to the two complementary sciences of "superior" and "inferior" astronomy, speculate on some of the more enigmatic details, and conclude with a brief discussion of a possible astrological significance to the dates of composition of the Monas Hieroglyphica.
Schärer, Michelle T
2003-06-01
Epibiotic organisms inhabiting non-nesting hawksbill sea turtles, Eretmochelys imbricata (Linnaeus, 1766), are described from Mona and Monito Islands, Puerto Rico. Epibiont samples from 105 turtles of shallow (< 40 m) water foraging habitats were collected and identified to the lowest possible taxon. This epibiotic assemblage consisting of at least 4 algal functional groups and 12 animal phyla represents the greatest phylogenetic diversity for marine turtle epibiota. Six groups are considered new reports for marine turtles. Most epibiont colonization was found on posterior marginal scutes and under overlapping scutes. Ecological attributes of epibiota and their symbiosis with E. imbricata provide a tool to understand basi and epibiont populations.
Plate interaction in the NE Caribbean subduction zone from continuous GPS observations
ten Brink, Uri S.; Lopez-Vegas, Alberto M.
2012-01-01
Kinematic similarities between the Sumatra and Puerto Rico Trenches highlight the potential for a mega-earthquake along the Puerto Rico Trench and the generation of local and trans-Atlantic tsunamis. We used the horizontal components of continuous GPS (cGPS) measurements from 10 sites on NE Caribbean islands to evaluate strain accumulation along the North American (NA) - Caribbean (CA) plate boundary. These sites move westward and slightly northward relative to CA interior at rates ≤2.5 mm/y. Provided this motion originates in the subduction interface, the northward motion suggests little or no trench-perpendicular thrust accumulation and may in fact indicate divergence north of Puerto Rico, where abnormal subsidence, bathymetry, and gravity are observed. The Puerto Rico Trench, thus, appears unable to generate mega-earthquakes, but damaging smaller earthquakes cannot be discounted. The westward motion, characterized by decreasing rate with distance from the trench, is probably due to eastward motion of CA plate impeded at the plate boundary by the Bahamas platform. Two additional cGPS sites in Mona Passage and SW Puerto Rico move to the SW similar to Hispaniola and unlike the other 10 sites. That motion relative to the rest of Puerto Rico may have given rise to seismicity and normal faults in Mona Rift, Mona Passage, and SW Puerto Rico.
An electromagnetic geophysical survey of the freshwater lens of Isla de Mona, Puerto Rico
Richards, R.T.; Troester, J.W.; Martinez, M.I.
1998-01-01
An electromagnetic reconnaissance of the freshwater lens of Isla de Mona, Puerto Rico was conducted with both terrain conductivity (TC) and transient electromagnetic (TEM) surface geophysical techniques. These geophysical surveys were limited to the southern and western parts of the island because of problems with access and cultural metallic objects such as reinforced concrete roadways on the eastern part of the island. The geophysical data were supplemented with the location of a freshwater spring found by scuba divers at a depth of about 20 m below sea level along the northern coast of the island. The geophysical data suggest that the freshwater lens has a maximum thickness of 20 m in the southern half of the island. The freshwater lens is not thickest at the center of the island but nearer the southwestern edge in Quaternary deposits and the eastern edge of the island in the Tertiary carbonates. This finding indicates that the groundwater flow paths on Isla de Mona are not radially summetrical from the center of the island to the ocean. The asymmetry of the freshwater lens indicates that the differences in hydraulic conductivity are a major factor in determining the shape of the freshwater lens. The porosity of the aquifer, as determined by the geophysical data is about 33%.
Plate interaction in the NE Caribbean subduction zone from continuous GPS observations
NASA Astrophysics Data System (ADS)
ten Brink, Uri S.; López-Venegas, Alberto M.
2012-05-01
Kinematic similarities between the Sumatra and Puerto Rico Trenches highlight the potential for a mega-earthquake along the Puerto Rico Trench and the generation of local and trans-Atlantic tsunamis. We used the horizontal components of continuous GPS (cGPS) measurements from 10 sites on NE Caribbean islands to evaluate strain accumulation along the North American (NA) - Caribbean (CA) plate boundary. These sites move westward and slightly northward relative to CA interior at rates ≤2.5 mm/y. Provided this motion originates in the subduction interface, the northward motion suggests little or no trench-perpendicular thrust accumulation and may in fact indicate divergence north of Puerto Rico, where abnormal subsidence, bathymetry, and gravity are observed. The Puerto Rico Trench, thus, appears unable to generate mega-earthquakes, but damaging smaller earthquakes cannot be discounted. The westward motion, characterized by decreasing rate with distance from the trench, is probably due to eastward motion of CA plate impeded at the plate boundary by the Bahamas platform. Two additional cGPS sites in Mona Passage and SW Puerto Rico move to the SW similar to Hispaniola and unlike the other 10 sites. That motion relative to the rest of Puerto Rico may have given rise to seismicity and normal faults in Mona Rift, Mona Passage, and SW Puerto Rico.
Seven Simple Secrets: What the Best Teachers Know and Do!
ERIC Educational Resources Information Center
Breaux, Annette L.; Whitaker, Todd
2006-01-01
Implementing the secrets presented in this book will change your life both in and out of the classroom. But most importantly, implementing these secrets will enhance the lives of every student you teach. The following are contained in this book: Secret One: The Secret of Planning; Secret Two: The Secret of Classroom Management; Secret Three: The…
Bell's palsy: the answer to the riddle of Leonardo da Vinci's 'Mona Lisa'.
Maloney, W J
2011-05-01
The smile of the famed portrait 'The Mona Lisa' has perplexed both art historians and researchers for the past 500 years. There has been a multitude of theories expounded to explain the nature of the model's enigmatic smile. The origin of the model's wry smile can be demonstrated through a careful analysis of both documented facts concerning the portrait--some gathered only recently through the use of modern technology--and a knowledge of the clinical presentation of Bell's palsy. Bell's palsy is more prevalent in women who are either pregnant or who have recently given birth. This paper postulates that the smile of the portrait's model was due to Leonardo da Vinci's anatomically precise representation of a new mother affected by Bell's palsy subsequent to her recent pregnancy.
Cancer Data and Statistics Tools
... Joseph Jacqueline W. Miller Mona Saraiya Judith Lee Smith Sherri L. Stewart Mary C. White Debra Younginer ... MD, MPH Simple Singh, MD, MPH Judith Lee Smith, PhD Sherri L. Stewart, PhD Eric Tai, MD, ...
78 FR 14817 - Endangered Species; Receipt of Applications for Permit
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-07
... include Mona or Puerto Rican boa) Emydidae Testudinidae Species: Asian elephant (Elephas maximus) African... applicant requests a permit for interstate commerce of an Asian elephant (Elephas maximus), to enhance their...
Genetics Home Reference: Winchester syndrome
... because Winchester syndrome and MONA are caused by mutations in different genes, they are now thought to ... groups? Genetic Changes Winchester syndrome is caused by mutations in the MMP14 gene (also known as MT1- ...
Factors associated with depression in students at The University of the West Indies, Mona, Jamaica.
Lowe, G A; Lipps, G E; Young, R
2009-01-01
This project examines the factors associated with depression in students attending the University of the West Indies, Mona Campus. Students enrolled in the Foundation courses during the first and second semesters of the 2005/2006 academic year were administered the Brief Screen for Depression as well as a demographic questionnaire as part of a larger study. A wide cross-section of the university population was sampled (n = 690; 252 from semester one, 438 from semester two; 77% females, 23% males; age 16-62 years, median = 20 years, mean = 23.4 years +/- 7.4). Nearly 40% of students scored in the clinically depressed range. Students in the December wave of data collection had higher depression scores than those in the January wave. Consistent with international research, females reported significantly higher levels of depressive symptoms. Married students reported significantly lower depression scores than students in visiting relationships. Students who were combining employment and school reported lower depression scores than those who were not employed. Maternal education significantly influenced students' levels of depression such that students whose mothers had university or other tertiary education had lower depression scores while those whose mothers had primary or lower education had the highest depression scores. Students with a chronic condition or a disability scored higher than those without such problems on all three measures of depression. Depression may be a significant problem in students at The University of the West Indies, Mona campus.
Stable aesthetic standards delusion: changing 'artistic quality' by elaboration.
Carbon, Claus-Christian; Hesslinger, Vera M
2014-01-01
The present study challenges the notion that judgments of artistic quality are based on stable aesthetic standards. We propose that such standards are a delusion and that judgments of artistic quality are the combined result of exposure, elaboration, and discourse. We ran two experiments using elaboration tasks based on the repeated evaluation technique in which different versions of the Mona Lisa had to be elaborated deeply. During the initial task either the version known from the Louvre or an alternative version owned by the Prado was elaborated; during the second task both versions were elaborated in a comparative fashion. After both tasks multiple blends of the two versions had to be evaluated concerning several aesthetic key variables. Judgments of artistic quality of the blends were significantly different depending on the initially elaborated version of the Mona Lisa, indicating experience-based aesthetic processing, which contradicts the notion of stable aesthetic standards.
Mège, Pascal; Schizas, Nikolaos V; Reyes, Joselyd García; Hrbek, Tomas
2015-06-01
It has been proposed that the elkhorn coral, Acropora palmata , is genetically separated into two distinct provinces in the Caribbean, an Eastern and a Western population admixing in western Puerto Rico and around the Mona Passage. In this study, the genetic structure of A. palmata sampled at 11 Puerto Rican localities and localities from Curaçao, the Bahamas and Guadeloupe were examined. Analyses using five microsatellite markers showed that 75% of sampled colonies had unique genotypes, the rest being clone mates. Genetic diversity among genets was high (H E = 0.761) and consistent across localities (0.685 to 0.844). F ST ranged from -0.011 to 0.047 supporting low but significant genetic differentiation between localities within the previously reported Eastern and Western genetic provinces. Plots of genetic per geographic distances and significant Mantel tests supported isolation-by-distance (IBD) within Puerto Rico. Analysis with the software Structure favored a scenario with weak differentiation between two populations, assigning eastern Puerto Rican locations (Fajardo and Culebra), Guadeloupe and Curaçao to the Caribbean Eastern population and western Puerto Rican locations (west of Vega Baja and Ponce), Mona and the Bahamas to the Caribbean Western population. Vieques and San Juan area harbored admixed profiles. Standardized F ST s per 1,000 km unit further supported higher differentiation between localities belonging to different Structure populations, with IBD being stronger within Puerto Rico than on larger regional scales. This stronger genetic transition seems to separate localities between putative Eastern and Western provinces in the eastern Puerto Rican region, not around the Mona Passage.
Mège, Pascal; Schizas, Nikolaos V.; Reyes, Joselyd García; Hrbek, Tomas
2014-01-01
It has been proposed that the elkhorn coral, Acropora palmata, is genetically separated into two distinct provinces in the Caribbean, an Eastern and a Western population admixing in western Puerto Rico and around the Mona Passage. In this study, the genetic structure of A. palmata sampled at 11 Puerto Rican localities and localities from Curaçao, the Bahamas and Guadeloupe were examined. Analyses using five microsatellite markers showed that 75% of sampled colonies had unique genotypes, the rest being clone mates. Genetic diversity among genets was high (HE = 0.761) and consistent across localities (0.685 to 0.844). FST ranged from −0.011 to 0.047 supporting low but significant genetic differentiation between localities within the previously reported Eastern and Western genetic provinces. Plots of genetic per geographic distances and significant Mantel tests supported isolation-by-distance (IBD) within Puerto Rico. Analysis with the software Structure favored a scenario with weak differentiation between two populations, assigning eastern Puerto Rican locations (Fajardo and Culebra), Guadeloupe and Curaçao to the Caribbean Eastern population and western Puerto Rican locations (west of Vega Baja and Ponce), Mona and the Bahamas to the Caribbean Western population. Vieques and San Juan area harbored admixed profiles. Standardized FSTs per 1,000 km unit further supported higher differentiation between localities belonging to different Structure populations, with IBD being stronger within Puerto Rico than on larger regional scales. This stronger genetic transition seems to separate localities between putative Eastern and Western provinces in the eastern Puerto Rican region, not around the Mona Passage. PMID:26085704
Bibliography Section. Bibliographic Control Division. Papers.
ERIC Educational Resources Information Center
International Federation of Library Associations, The Hague (Netherlands).
Papers on national bibliographies and bibliographic control, which were presented at the 1983 International Federation of Library Associations (IFLA) conference, include: (1) "Bibliographic Control of IFLA Publications: Retrospective and Current" by Mona Madsen (Denmark), which outlines types of IFLA documents, existing bibliographies,…
The Dangers of Art "Appreciation."
ERIC Educational Resources Information Center
Irvine, Hope
1991-01-01
Addresses the issue of the fame of Leonardo da Vinci's "Mona Lisa." Describes several kitsch objects that have been created about the painting. Maintains that students need to address this issue otherwise such exploitation will depreciate the value of the art work. (KM)
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-29
... efficiency; (7) optimization of generation and energy storage ranging from a 4 unit, 500 megawatts (MW) (4... brief comments up to 6,000 characters, without prior registration, using the eComment system at http...
Redirect - Office of Protected Resources - NOAA Fisheries
NOAA FISHERIES: Office of Protected Resources Acropora palmata thicket on Mona Island, Puerto Rico . Andy Bruckner, 1996 Coho salmon painting, Canadian Dept of Fisheries and Oceans Monk seal, C.E. Bowlby Commerce logo NOAA Fisheries Office of Protected Resources
50 CFR 226.209 - Critical habitat for hawksbill turtle.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 50 Wildlife and Fisheries 10 2013-10-01 2013-10-01 false Critical habitat for hawksbill turtle... ATMOSPHERIC ADMINISTRATION, DEPARTMENT OF COMMERCE MARINE MAMMALS DESIGNATED CRITICAL HABITAT § 226.209 Critical habitat for hawksbill turtle. (a) Mona and Monito Islands, Puerto Rico—Waters surrounding the...
50 CFR 226.209 - Critical habitat for hawksbill turtle.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 50 Wildlife and Fisheries 10 2014-10-01 2014-10-01 false Critical habitat for hawksbill turtle... ATMOSPHERIC ADMINISTRATION, DEPARTMENT OF COMMERCE MARINE MAMMALS DESIGNATED CRITICAL HABITAT § 226.209 Critical habitat for hawksbill turtle. (a) Mona and Monito Islands, Puerto Rico—Waters surrounding the...
Evaluating Cadet Leadership Position at the U.S. Air Force Academy
2012-01-01
Laberg , and Scott A. Snook, “Big five personality factors, hardiness, and social judgment as predictors of leader performance,” Leadership...September 19, 2012: http://www.wantscheck.org/secafinstructions.pdf Eagly, Alice H., Steven J. Karau, and Mona G. Makhijani, “Gender and the
PRAYING MANTIS II: The Answer to Iranian Compliance
2010-06-01
Andrew P. Layton , MBE MERCIAN (GBR Army), for his countless hours of editorial assistance and keen observations during the writing of this paper...Austin (2009, 2009): 1-33. Gordon, Michael R., Jeffery Gettleman, Isabel Kershner, Eric Schmitt, and Mona el- Naggar. "U.S. Officials Say Israel
Sign language in dental education-A new nexus.
Jones, T; Cumberbatch, K
2017-08-14
The introduction of the landmark mandatory teaching of sign language to undergraduate dental students at the University of the West Indies (UWI), Mona Campus in Kingston, Jamaica, to bridge the communication gap between dentists and their patients is reviewed. A review of over 90 Doctor of Dental Surgery and Doctor of Dental Medicine curricula in North America, the United Kingdom, parts of Europe and Australia showed no inclusion of sign language in those curricula as a mandatory component. In Jamaica, the government's training school for dental auxiliaries served as the forerunner to the UWI's introduction of formal training of sign language in 2012. Outside of the UWI, a couple of dental schools have sign language courses, but none have a mandatory programme as the one at the UWI. Dentists the world over have had to rely on interpreters to sign with their deaf patients. The deaf in Jamaica have not appreciated the fact that dentists cannot sign and they have felt insulted and only go to the dentist in emergency situations. The mandatory inclusion of sign language in the Undergraduate Dental Programme curriculum at The University of the West Indies, Mona Campus, sought to establish a direct communication channel to formally bridge this gap. The programme of two sign language courses and a direct clinical competency requirement was developed during the second year of the first cohort of the newly introduced undergraduate dental programme through a collaborating partnership between two faculties on the Mona Campus. The programme was introduced in 2012 in the third year of the 5-year undergraduate dental programme. To date, two cohorts have completed the programme, and the preliminary findings from an ongoing clinical study have shown a positive impact on dental care access and dental treatment for deaf patients at the UWI Mona Dental Polyclinic. The development of a direct communication channel between dental students and the deaf that has led to increased dental access and treatment for the deaf can be extended to dentists and to other dental students globally. The vision is that similar courses will be introduced in other health training programmes at the UWI, and conceivably, in other institutions. The small sample size allows for informative, but not definitive, conclusions to be drawn. The mandatory inclusion of sign language and Deaf culture in the dental curricula has not just removed a communication barrier, but has assisted in the empathetic and ethical development of the dental student. © 2017 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.
Viljoen, Lario; Thorne, Marguerite; Thomas, Angelique; Bond, Virginia; Hoddinott, Graeme
2016-01-01
HIV prevalence and incidence in South Africa remain high, making HIV a part of everyday life. Community narratives on HIV treatment and prevention are important and influence official and unofficial health messaging and community perceptions and understandings of HIV. We explore how contributors and the columnist of an agony aunt column position HIV relative to choices made about love, partnership, and sex over three years. We analysed all columns of an agony aunt series (Antie Mona) published between December 2012 and November 2015. The column is published in a South African, Afrikaans-language newspaper "Son", prioritising sensationalist news items. Trends were identified through narrative analysis. Data were managed in ATLAS.ti and inductive, iterative coding conducted. It was found that letters to the agony aunt rarely refer to HIV directly (less than 7%). Euphemisms such as diseases of the flesh and the great flu were more commonly used instead of HIV or AIDS. Letters addressed HIV in three ways: direct references to experiences living with HIV; direct questions about HIV prevention; and scenarios where HIV could (from a public health perspective) have been the main concern, but everyday issues took precedence. The majority of letters fell into this latter category where the writers focused on the immediate concerns of good sexual relations, problems related to love and romantic relationships, good moral behaviour of others, and issues of oppressive life conditions rather than on HIV directly. The findings illustrate that informal, public contributions to health information, such as agony aunts, are important narratives that inform popular perspectives on HIV and health. A better appreciation of this context would allow health implementers to ensure that these role players receive updated health messaging to avoid the risk of HIV-related stigma where HIV is used as a moral rod to punish perceived moral transgressions.
50 CFR 226.209 - Critical habitat for hawksbill turtle.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 50 Wildlife and Fisheries 7 2010-10-01 2010-10-01 false Critical habitat for hawksbill turtle. 226.209 Section 226.209 Wildlife and Fisheries NATIONAL MARINE FISHERIES SERVICE, NATIONAL OCEANIC AND... Critical habitat for hawksbill turtle. (a) Mona and Monito Islands, Puerto Rico—Waters surrounding the...
Structural Information Retention in Visual Art Processing.
ERIC Educational Resources Information Center
Koroscik, Judith Smith
The accuracy of non-art college students' longterm retention of structural information presented in Leonardo da Vinci's "Mona Lisa" was tested. Seventeen female undergraduates viewed reproductions of the painting and copies that closely resembled structural attributes of the original. Only 3 of the 17 subjects reported having viewed a reproduction…
Humanities in the High School Classroom.
ERIC Educational Resources Information Center
Stawski, Conrad
A humanities course that teaches an appreciation of tradition and culture through the visual arts includes consideration of contemporary art as well as classic paintings and sculpture. Study of Leonardo DaVinci's "Last Supper" provides an exercise in the intellectual approach to religious painting, while the portrait of Mona Lisa by the same…
Hepp, Christof; Maier, Berenike
2017-10-01
Secretion systems enable bacteria to import and secrete large macromolecules including DNA and proteins. While most components of these systems have been identified, the molecular mechanisms of macromolecular transport remain poorly understood. Recent findings suggest that various bacterial secretion systems make use of the translocation ratchet mechanism for transporting polymers across the cell envelope. Translocation ratchets are powered by chemical potential differences generated by concentration gradients of ions or molecules that are specific to the respective secretion systems. Bacteria employ these potential differences for biasing Brownian motion of the macromolecules within the conduits of the secretion systems. Candidates for this mechanism include DNA import by the type II secretion/type IV pilus system, DNA export by the type IV secretion system, and protein export by the type I secretion system. Here, we propose that these three secretion systems employ different molecular implementations of the translocation ratchet mechanism. © 2017 The Authors. BioEssays Published by WILEY Periodicals, Inc.
Sagnac secret sharing over telecom fiber networks.
Bogdanski, Jan; Ahrens, Johan; Bourennane, Mohamed
2009-01-19
We report the first Sagnac quantum secret sharing (in three-and four-party implementations) over 1550 nm single mode fiber (SMF) networks, using a single qubit protocol with phase encoding. Our secret sharing experiment has been based on a single qubit protocol, which has opened the door to practical secret sharing implementation over fiber telecom channels and in free-space. The previous quantum secret sharing proposals were based on multiparticle entangled states, difficult in the practical implementation and not scalable. Our experimental data in the three-party implementation show stable (in regards to birefringence drift) quantum secret sharing transmissions at the total Sagnac transmission loop distances of 55-75 km with the quantum bit error rates (QBER) of 2.3-2.4% for the mean photon number micro?= 0.1 and 1.7-2.1% for micro= 0.3. In the four-party case we have achieved quantum secret sharing transmissions at the total Sagnac transmission loop distances of 45-55 km with the quantum bit error rates (QBER) of 3.0-3.7% for the mean photon number micro= 0.1 and 1.8-3.0% for micro?= 0.3. The stability of quantum transmission has been achieved thanks to our new concept for compensation of SMF birefringence effects in Sagnac, based on a polarization control system and a polarization insensitive phase modulator. The measurement results have showed feasibility of quantum secret sharing over telecom fiber networks in Sagnac configuration, using standard fiber telecom components.
Latitudes: new Indian transnational cinema.
Villarejo, Amy
2014-01-01
This article examines films and video art that speak to conditions of exile and displacement, including the work of Mona Hatoum, Sonali Gulati, and Onir. It proposes the term "latitude" to interrogate the aesthetic and formal properties of these artworks, seeking to understand how lesbian and same-sex eroticism and identities are central to their efficacy.
ERIC Educational Resources Information Center
Evans, Robert W.
This report, compiled by the settlement facilitator, documents progress for year six of the 7-year Bronson Agreement. The agreement was entered into to settle the litigation entitled Mona Bronson, et al. vs. Board of Education of the City of Cincinnati. Its major goals were the following: (1) continuing to reduce racial isolation of students in…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-15
... remains representing a minimum of 10 individuals were removed from Pock's Garden Site (5MT.10851), in.... Jennings, the Colorado State University (CSU) Field School, investigated and transferred the individuals to... and under the direction of Mona Charles, Director of the Archaeological Field School. The site is...
Amorim, R B; Monteiro-Neto, C
2016-02-01
This study characterizes the gill net fishery at Colônia de Pescadores Z13 (CPZ13), in Copacabana, Rio de Janeiro, and its relationship with the marine protected area 'Monumento Natural do Arquipélago das Ilhas Cagarras - MoNa Cagarras', describing the fleet and fishing gears, identifying fishing spots, species and their associations by gillnet type. From June 2012 to May 2013, every Tuesday to Sunday, gill net landings were monitored and fishers interviewed regarding their catch. Small boats (dory whaleboats) are used to set three types of gillnets: "Corvineira" (target species - whitemouth croaker), "linguadeira" (target species - flounders) and "rede-alta" (target species - bluefish). Fifty-nine species within 37 families were captured at 14 fishing spots, showing association with bottom type and distance from shore. The use of fisher's local ecological knowledge defines gear placement at specific sites targeting fisheries resources. All fishing sites are not within the limits of MoNa Cagarras but would benefit from management plans including an MPA buffering zone.
Drake, Michael C.; Zieger, Ulrike; Groszkowski, Andrew; Gallardo, Bruce; Sages, Patti; Reavis, Roslyn; Faircloth, Leslie; Jacobson, Krystin; Lonce, Nicholas; Pinckney, Rhonda D.; Cole, Rebecca A.
2014-01-01
One hundred specimens of Rhinella marina, (Anura: Bufonidae) collected in St. George's parish, Grenada, from September 2010 to August 2011, were examined for the presence of ectoparasites and helminths. Ninety-five (95%) were parasitized by 1 or more parasite species. Nine species of parasites were found: 1 digenean, 2 acanthocephalans, 4 nematodes, 1 arthropod and 1 pentastome. The endoparasites represented 98.9% of the total number of parasite specimens collected. Grenada represents a new locality record for Mesocoelium monas, Raillietiella frenatus, Pseudoacanthacephalus sp., Aplectana sp., Physocephalus sp., Acanthacephala cystacanth, and Physalopteridae larvae. The digenean M. monas occurred with the highest prevalence of 82%, contrasting many studies of R. marina where nematodes dominate the parasite infracommunity. Female toads were found to have a significantly higher prevalence of Amblyomma dissimile than male toads. Only 2 parasites exhibited a significant difference between wet and dry season with Parapharyngodon grenadensis prevalence highest in the wet season and A. dissimile prevalence highest during the dry season. Additionally, A. dissimilewas significantly more abundant during the dry season.
Wiley, J.W.; Post, W.; Cruz, A.
1991-01-01
The yellow-shouldered blackbird Agelaius xanthomus, endemic to Puerto Rico and Mona Island, is endangered, mainly because of brood parasitism by the shiny cowbird Molothrus bonariensis, which reached Puerto Rico at least 30 years ago. The yellow-shouldered blackbird populations have since declined, about 770?1200 remaining (470?900 on Mona Island) by 1982?1986 compared to a population of about 2400 in 1975. Nearly all nests of blackbirds in most of its habitats are parasitized by cowbirds. This significantly reduces nesting success, but blackbirds have evolved no defenses against brood parasitism. Removal of cowbirds from the yellow-shouldered blackbird nesting grounds, modeled after similar programmes for the brown-headed cowbird Molothrus ater on Kirtland's warbler Dendroica kirtlandii nesting areas, significantly increased blackbird production. Blackbirds readily accept nest boxes, and breeding populations can be established in otherwise unusable sites and can be concentrated in mangrove habitats, were they are more easily protected by cowbird removal. Furthermore, yellow-shouldered blackbird pairs using cavities, including nest boxes, fledged more young per nest than pairs using open nests.
Two-party secret key distribution via a modified quantum secret sharing protocol.
Grice, W P; Evans, P G; Lawrie, B; Legré, M; Lougovski, P; Ray, W; Williams, B P; Qi, B; Smith, A M
2015-03-23
We present and demonstrate a novel protocol for distributing secret keys between two and only two parties based on N-party single-qubit Quantum Secret Sharing (QSS). We demonstrate our new protocol with N = 3 parties using phase-encoded photons. We show that any two out of N parties can build a secret key based on partial information from each other and with collaboration from the remaining N - 2 parties. Our implementation allows for an accessible transition between N-party QSS and arbitrary two party QKD without modification of hardware. In addition, our approach significantly reduces the number of resources such as single photon detectors, lasers and dark fiber connections needed to implement QKD.
ERIC Educational Resources Information Center
Kerr-Campbell, Maureen; Salmon, Frances
2013-01-01
The incorporation of visual resources in academia is becoming increasingly popular. The Cousins Hereward Postcard Collection comprises 212 postcards that depict social, historical, cultural, and economic activities in Jamaica during the period 1900-1912. Illustrations include social conditions of the working class and peasantry, natural history…
Transforming the Past into the Present
ERIC Educational Resources Information Center
Campbell, Janine
2011-01-01
Transformation is nothing new for artists. From taking a piece of mud and molding it into a sculpture, to drawing a moustache on the "Mona Lisa," artists have the power and the inclination to reinvent things time and again. In this article, the author describes how her middle school students explored the aesthetics of the past by applying…
Engaging Mindfully with the Commons: A Case of Caribbean Teachers' Experience with ESD
ERIC Educational Resources Information Center
Down, Lorna
2015-01-01
A study of teachers' responses to Education for Sustainable Development (ESD) in a graduate course in Literature and Education for Sustainable Development, at the School of Education, The University of the West Indies, Mona, revealed that ESD can change indifference to the "commons" to one of mindfulness about local and global…
Secret Key Generation via a Modified Quantum Secret Sharing Protocol
DOE Office of Scientific and Technical Information (OSTI.GOV)
Smith IV, Amos M; Evans, Philip G; Lawrie, Benjamin J
We present and experimentally show a novel protocol for distributing secret information between two and only two parties in a N-party single-qubit Quantum Secret Sharing (QSS) system. We demonstrate this new algorithm with N = 3 active parties over 6km of telecom. ber. Our experimental device is based on the Clavis2 Quantum Key Distribution (QKD) system built by ID Quantique but is generalizable to any implementation. We show that any two out of the N parties can build secret keys based on partial information from each other and with collaboration from the remaining N > 2 parties. This algorithm allowsmore » for the creation of two-party secret keys were standard QSS does not and signicantly reduces the number of resources needed to implement QKD on a highly connected network such as the electrical grid.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-29
... County, Utah. The project affects federal lands administered by the Bureau of Land Management. The sole... containing the pump-turbines and motor- generators; (2) a waterway between 7,600 and 15,800 feet long...: Alternative 1: (1) A single 340-foot-high by 1,800-foot-long, concrete-faced dam across Old Canyon (upper...
The status of Puerto Rico's forests, 2003
Thomas J. Brandeis; Eileen H. Helmer; Sonja N. Oswalt
2007-01-01
Puerto Ricoâs forest cover continues to increase and is now 57 percent for mainland Puerto Rico, 85 percent for Vieques, and 88 percent for Culebra. Subtropical dry forest occupies 50 346 ha, 6832 ha, 2591 ha, and 6217 ha on the islands of Puerto Rico, Vieques, Culebra, and Mona, respectively. Subtropical moist forest, the most prevalent forested life zone on...
ERIC Educational Resources Information Center
Khan, Mehre Y.
2007-01-01
Arguably, Muslim subjects of the diaspora, regardless if they identify as secular, religious, feminist, or queer, have taken on a new and further stigmatized visibility post-9/11. How can students and teachers located in feminist classrooms, Muslim and non-Muslim alike, safely imagine Muslim bodies and identities outside and within war propaganda,…
The effect of face eccentricity on the perception of gaze direction.
Todorović, Dejan
2009-01-01
The perception of a looker's gaze direction depends not only on iris eccentricity (the position of the looker's irises within the sclera) but also on the orientation of the lookers' head. One among several potential cues of head orientation is face eccentricity, the position of the inner features of the face (eyes, nose, mouth) within the head contour, as viewed by the observer. For natural faces this cue is confounded with many other head-orientation cues, but in schematic faces it can be studied in isolation. Salient novel illustrations of the effectiveness of face eccentricity are 'Necker faces', which involve equal iris eccentricities but multiple perceived gaze directions. In four experiments, iris and face eccentricity in schematic faces were manipulated, revealing strong and consistent effects of face eccentricity on perceived gaze direction, with different types of tasks. An additional experiment confirmed the 'Mona Lisa' effect with this type of stimuli. Face eccentricity most likely acted as a simple but robust cue of head turn. A simple computational account of combined effects of cues of eye and head turn on perceived gaze direction is presented, including a formal condition for the perception of direct gaze. An account of the 'Mona Lisa' effect is presented.
Martinuzzi, Sebastiáin; Gould, William A; Ramos Gonzalez, Olga M; Martinez Robles, Alma; Calle Maldonado, Paulina; Pérez-Buitrago, Néstor; Fumero Caban, José J
2008-06-01
Assessing the status of tropical dry forest habitats using remote sensing technologies is one of the research priorities for Neotropical forests. We developed a simple method for mapping vegetation and habitats in a tropical dry forest reserve, Mona Island, Puerto Rico, by integrating the Normalized Difference Vegetation Index (NDVI) from Landsat, topographic information, and high-resolution Ikonos imagery. The method was practical for identifying vegetation types in areas with a great variety of plant communities and complex relief, and can be adapted to other dry forest habitats of the Caribbean Islands. NDVI was useful for identifying the distribution of forests, woodlands, and shrubland, providing a natural representation of the vegetation patterns on the island. The use of Ikonos imagery allowed increasing the number of land cover classes. As a result, sixteen land-cover types were mapped over the 5500 ha area, with a kappa coefficient of accuracy equal to 79%. This map is a central piece for modeling vertebrate species distribution and biodiversity patterns by the Puerto Rico Gap Analysis Project, and it is of great value for assisting research and management actions in the island.
Two-Party secret key distribution via a modified quantum secret sharing protocol
DOE Office of Scientific and Technical Information (OSTI.GOV)
Grice, Warren P.; Evans, Philip G.; Lawrie, Benjamin
We present and demonstrate a method of distributing secret information based on N-party single-qubit Quantum Secret Sharing (QSS) in a modied plug-and-play two-party Quantum Key Distribution (QKD) system with N 2 intermediate nodes and compare it to both standard QSS and QKD. Our setup is based on the Clavis2 QKD system built by ID Quantique but is generalizable to any implementation. We show that any two out of N parties can build a secret key based on partial information from each other and with collaboration from the remaining N 2 parties. This method signicantly reduces the number of resources (singlemore » photon detectors, lasers and dark ber connections) needed to implement QKD on the grid.« less
Two-Party secret key distribution via a modified quantum secret sharing protocol
Grice, Warren P.; Evans, Philip G.; Lawrie, Benjamin; ...
2015-01-01
We present and demonstrate a method of distributing secret information based on N-party single-qubit Quantum Secret Sharing (QSS) in a modied plug-and-play two-party Quantum Key Distribution (QKD) system with N 2 intermediate nodes and compare it to both standard QSS and QKD. Our setup is based on the Clavis2 QKD system built by ID Quantique but is generalizable to any implementation. We show that any two out of N parties can build a secret key based on partial information from each other and with collaboration from the remaining N 2 parties. This method signicantly reduces the number of resources (singlemore » photon detectors, lasers and dark ber connections) needed to implement QKD on the grid.« less
Secret Key Crypto Implementations
NASA Astrophysics Data System (ADS)
Bertoni, Guido Marco; Melzani, Filippo
This chapter presents the algorithm selected in 2001 as the Advanced Encryption Standard. This algorithm is the base for implementing security and privacy based on symmetric key solutions in almost all new applications. Secret key algorithms are used in combination with modes of operation to provide different security properties. The most used modes of operation are presented in this chapter. Finally an overview of the different techniques of software and hardware implementations is given.
RAMONA: a Web application for gene set analysis on multilevel omics data.
Sass, Steffen; Buettner, Florian; Mueller, Nikola S; Theis, Fabian J
2015-01-01
Decreasing costs of modern high-throughput experiments allow for the simultaneous analysis of altered gene activity on various molecular levels. However, these multi-omics approaches lead to a large amount of data, which is hard to interpret for a non-bioinformatician. Here, we present the remotely accessible multilevel ontology analysis (RAMONA). It offers an easy-to-use interface for the simultaneous gene set analysis of combined omics datasets and is an extension of the previously introduced MONA approach. RAMONA is based on a Bayesian enrichment method for the inference of overrepresented biological processes among given gene sets. Overrepresentation is quantified by interpretable term probabilities. It is able to handle data from various molecular levels, while in parallel coping with redundancies arising from gene set overlaps and related multiple testing problems. The comprehensive output of RAMONA is easy to interpret and thus allows for functional insight into the affected biological processes. With RAMONA, we provide an efficient implementation of the Bayesian inference problem such that ontologies consisting of thousands of terms can be processed in the order of seconds. RAMONA is implemented as ASP.NET Web application and publicly available at http://icb.helmholtz-muenchen.de/ramona. © The Author 2014. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.
Martinez, M.I.; Troester, Joseph W.; Richards, Ronald T.
1995-01-01
Ground-water flow in the coastal plain appears to be radial from the center of the freshwater mound. At the intersection between the coastal plain and the plateau, the flow is parallel to the coastline. The direction of flow on the rest of the plateau could not be determined accurately with the available data.
Detection of K-ras and p53 Mutations in Sputum Samples of Lung Cancer Patients Using Laser Capture Microdissection Microscope and Mutation Analysis
Phouthone Keohavong a,*, Wei-Min Gao a, Kui-Cheng Zheng a, Hussam Mady b, Qing Lan c, Mona Melhem b, and Judy Mumford d.
<...
Giovannelli, Jonathan; Dallongeville, Jean; Wagner, Aline; Bongard, Vanina; Laillet, Brigitte; Marecaux, Nadine; Ruidavets, Jean Bernard; Haas, Bernadette; Ferrieres, Jean; Arveiler, Dominique; Simon, Chantal; Dauchet, Luc
2014-04-01
Food frequency questionnaires (FFQs) are often used to evaluate individuals' food intakes in epidemiologic studies because of their simplicity and low cost. To assess the validity of a short (24 items), qualitative FFQ used in the MONA LISA-NUT study. Cross-sectional study of a representative sample in three French counties. The sample included 2,630 participants aged 35 to 65 years from the MONA LISA-NUT study. Food consumption was measured with the FFQ and via food records for 3 consecutive days. Plasma fatty acids were measured from a subset of participants. The FFQ items' validity was assessed by calculating crude and deattenuated Pearson correlation coefficients between frequencies reported by the FFQ and average weights reported by the food records. Furthermore, the validity of some items of the FFQ measuring the consumption of fatty foods was assessed by calculating Pearson correlation coefficients between frequencies of consumption of these foods and dosages of the corresponding plasma fatty acids: fish and eicosapentaenoic acid (EPA) and docosahexaenoic acid (DHA), olive oil and oleic acid, margarine and elaidic acid, and dairy products and pentadecanoic and heptadecanoic acids. The mean of the deattenuated Pearson correlation coefficients for all items was 0.46, with values ranging from 0.22 (fried food) to 0.77 (breakfast cereal). The correlation coefficient was ≤ 0.4 for one third of the 24 items. Moderate correlations were found between fish and EPA/DHA (EPA: r=0.43, 95% CI 0.33 to 0.51; DHA: r=0.39, 95% CI 0.30 to 0.47), but not for other food items. One third of the 24 items in the short, qualitative FFQ evaluated here were not sufficiently valid. However, for the food groups most commonly studied in the literature, this FFQ had the same degree of validity as other questionnaires designed to classify subjects according to their level of intake. Copyright © 2014 Academy of Nutrition and Dietetics. Published by Elsevier Inc. All rights reserved.
Optimized FPGA Implementation of the Thyroid Hormone Secretion Mechanism Using CAD Tools.
Alghazo, Jaafar M
2017-02-01
The goal of this paper is to implement the secretion mechanism of the Thyroid Hormone (TH) based on bio-mathematical differential eqs. (DE) on an FPGA chip. Hardware Descriptive Language (HDL) is used to develop a behavioral model of the mechanism derived from the DE. The Thyroid Hormone secretion mechanism is simulated with the interaction of the related stimulating and inhibiting hormones. Synthesis of the simulation is done with the aid of CAD tools and downloaded on a Field Programmable Gate Arrays (FPGAs) Chip. The chip output shows identical behavior to that of the designed algorithm through simulation. It is concluded that the chip mimics the Thyroid Hormone secretion mechanism. The chip, operating in real-time, is computer-independent stand-alone system.
El Estado de los Bosques de Puerto Rico, 2003
Thomas J. Brandeis; Eileen H. Helmer; Sonja N. Oswalt
2003-01-01
La cobertura forestal de Puerto Rico sigue aumentando y ahora asciende a un 57 por ciento en la isla de Puerto Rico, 85 por ciento en Vieques y 88 por ciento en Culebra. Los bosques subtropicales secos ocupan 50 346 ha, 6832 ha, 2591 ha y 6217 ha en las islas de Puerto Rico, Vieques, Culebra y Mona, respectivamente. El bosque subtropical húmedo, la zona de vida...
ERIC Educational Resources Information Center
Pan American Health Organization, Washington, DC.
Five years have elapsed since the International Conference on Malnutrition, Learning, and Behavior at the Massachusetts Institute of Technology. The present Seminar was held to examine progress since then. The following papers were presented and discussed: "Malnutrition and the Nervous System," Donald B. Cheek, A. B. Holt, and E. D. Mellits;…
USDA-ARS?s Scientific Manuscript database
This study investigated the in vitro and in vivo antioxidant and anti-inflammatory properties of a juice blend (JB), MonaVie Active, containing a mixture of fruits and berries with known antioxidant activity, including acai, a palm fruit, as the predominant ingredient. The phytochemical antioxidants...
An Empirical Model of the Vertical Structure of German Fogs.
1980-11-01
Fitz ) ATTN: Dr. John E. Cockayne Washington, DC 20305 McLean, VA 22102 Director US Army Nuclear & Chemical Agency Defense Nuclear Agency ATTN: MONA-WE...Information Center John M. Hobbie ATTN: DRSMI-RPRD (Documents Section) c/o Kentron International Redstone Arsenal, AL 35809 2003 Byrd Spring Road...ATTN: Mr. John D. Carlyle Culter City, CA 90230 5383 Hollister Avenue Santa Barbara, CA 93111 Commander US Army Combat Developments Commander
NASA Astrophysics Data System (ADS)
Couradeau, Estelle; Roush, Daniel; Guida, Brandon Scott; Garcia-Pichel, Ferran
2017-01-01
Endolithic microbial communities are prominent features of intertidal marine habitats, where they colonize a variety of substrates, contributing to their erosion. Almost 2 centuries worth of naturalistic studies focused on a few true-boring (euendolithic) phototrophs, but substrate preference has received little attention. The Isla de Mona (Puerto Rico) intertidal zone offers a unique setting to investigate substrate specificity of endolithic communities since various phosphate rock, limestone and dolostone outcrops occur there. High-throughput 16S rDNA genetic sampling, enhanced by targeted cultivation, revealed that, while euendolithic cyanobacteria were dominant operational taxonomic units (OTUs), the communities were invariably of high diversity, well beyond that reported in traditional studies and implying an unexpected metabolic complexity potentially contributed by secondary colonizers. While the overall community composition did not show differences traceable to the nature of the mineral substrate, we detected specialization among particular euendolithic cyanobacterial clades towards the type of substrate they excavate but only at the OTU phylogenetic level, implying that close relatives have specialized recurrently into particular substrates. The cationic mineral component was determinant in this preference, suggesting the existence in nature of alternatives to the boring mechanism described in culture that is based exclusively on transcellular calcium transport.
Laurenzano, Claudia; Costa, Tânia M; Schubart, Christoph D
2016-01-01
Fiddler crabs (Brachyura, Ocypodidae), like many other marine organisms, disperse via planktonic larvae. A lengthy pelagic larval duration is generally assumed to result in genetic connectivity even among distant populations. However, major river outflows, such as of the Amazon or Orinoco, or strong currents may act as phylogeographic barriers to ongoing gene flow. For example, the Mona Passage, located between Puerto Rico and Hispaniola, has been postulated to impair larval exchange of several species. In this study, Cox1 mtDNA data was used to analyze population genetic structure of two fiddler crab species from the western Atlantic, comparing the continental coastline and Caribbean islands. The results indicate genetic homogeneity in Minuca rapax among Atlantic (continental) populations (Suriname, Brazil), whereas Caribbean populations show significantly restricted gene flow among the constituent islands and towards continental populations. Our data support the hypothesis of the Mona Passage hindering larval exchange. Contrastingly, Caribbean Leptuca leptodactyla populations appear to be devoid of detectable variation, while Atlantic-continental (i.e. Brazilian) populations show much higher haplotype and nucleotide diversities and display slight genetic differentiation among populations within the Atlantic region, though not statistically significant. Both species show a pronounced divergence between regions, supporting the presence of a phylogeographic barrier.
Laurenzano, Claudia; Costa, Tânia M.; Schubart, Christoph D.
2016-01-01
Fiddler crabs (Brachyura, Ocypodidae), like many other marine organisms, disperse via planktonic larvae. A lengthy pelagic larval duration is generally assumed to result in genetic connectivity even among distant populations. However, major river outflows, such as of the Amazon or Orinoco, or strong currents may act as phylogeographic barriers to ongoing gene flow. For example, the Mona Passage, located between Puerto Rico and Hispaniola, has been postulated to impair larval exchange of several species. In this study, Cox1 mtDNA data was used to analyze population genetic structure of two fiddler crab species from the western Atlantic, comparing the continental coastline and Caribbean islands. The results indicate genetic homogeneity in Minuca rapax among Atlantic (continental) populations (Suriname, Brazil), whereas Caribbean populations show significantly restricted gene flow among the constituent islands and towards continental populations. Our data support the hypothesis of the Mona Passage hindering larval exchange. Contrastingly, Caribbean Leptuca leptodactyla populations appear to be devoid of detectable variation, while Atlantic-continental (i.e. Brazilian) populations show much higher haplotype and nucleotide diversities and display slight genetic differentiation among populations within the Atlantic region, though not statistically significant. Both species show a pronounced divergence between regions, supporting the presence of a phylogeographic barrier. PMID:27861598
ERIC Educational Resources Information Center
Rice, Walter Herbert
In this decision, Judge W. H. Rice finds the Cincinnati (Ohio) School District (CSD) in compliance with some provisions of a school desegregation consent decree from June 22, 1984, and not in compliance with others. The original decision was historic in allowing the school district charged with promoting or allowing unconstitutional segregation to…
NASA Technical Reports Server (NTRS)
Chipman, Russell A.
1996-01-01
This report covers work performed during the period of November 1994 through March 1996 on the design of a Space-borne Solar Vector Magnetograph. This work has been performed as part of a design team under the supervision of Dr. Mona Hagyard and Dr. Alan Gary of the Space Science Laboratory. Many tasks were performed and this report documents the results from some of those tasks, each contained in the corresponding appendix. Appendices are organized in chronological order.
ERIC Educational Resources Information Center
Pearson, Ferial G.
2017-01-01
This phenomenological study explored the perceptions of 23 educators as related to the implementation of the "Secret Kindness Agents Project." The methodology was comprised of a researcher-designed questionnaire to capture the essence of the participants' experiences with the project. A Conceptual Map developed by researchers at the…
Threshold multi-secret sharing scheme based on phase-shifting interferometry
NASA Astrophysics Data System (ADS)
Deng, Xiaopeng; Wen, Wei; Shi, Zhengang
2017-03-01
A threshold multi-secret sharing scheme is proposed based on phase-shifting interferometry. The K secret images to be shared are firstly encoded by using Fourier transformation, respectively. Then, these encoded images are shared into many shadow images based on recording principle of the phase-shifting interferometry. In the recovering stage, the secret images can be restored by combining any 2 K + 1 or more shadow images, while any 2 K or fewer shadow images cannot obtain any information about the secret images. As a result, a (2 K + 1 , N) threshold multi-secret sharing scheme can be implemented. Simulation results are presented to demonstrate the feasibility of the proposed method.
[Secret remedies in France until abolition in 1926].
Warolin, Christian
2002-01-01
Secret remedies are preparations or medicines whose composition is not disclosed by the inventor in order to protect his invention or to deceive the public. Secret remedies have always existed. From time immemorial the communities of apothecaries in Paris or in the provinces were opposed to quack doctors or healers who sold inactive mixtures. The 1352 Royal Edict forbade preparations of secret remedies. However, in the 17th century secret remedies were authorized through commission letters or warrants. In the 18th century regulations were implemented to control secret trade. The famous 11 April 1803 Law called the Germinal Law banned the sale of secret remedies but its severity was softened through successive decrees based on divergent interpretations of the regulations. The final banning of secret remedies was pronounced by a decree on 13 July 1926.
Relating quantum privacy and quantum coherence: an operational approach.
Devetak, I; Winter, A
2004-08-20
Given many realizations of a state or a channel as a resource, two parties can generate a secret key as well as entanglement. We describe protocols to perform the secret key distillation (as it turns out, with optimal rate). Then we show how to achieve optimal entanglement generation rates by "coherent" implementation of a class of secret key agreement protocols, proving the long-conjectured "hashing inequality."
Josiński, Henryk; Kostrzewa, Daniel; Michalczuk, Agnieszka; Switoński, Adam
2014-01-01
This paper introduces an expanded version of the Invasive Weed Optimization algorithm (exIWO) distinguished by the hybrid strategy of the search space exploration proposed by the authors. The algorithm is evaluated by solving three well-known optimization problems: minimization of numerical functions, feature selection, and the Mona Lisa TSP Challenge as one of the instances of the traveling salesman problem. The achieved results are compared with analogous outcomes produced by other optimization methods reported in the literature.
Gittens, Paul; Mullen, Gregory
2018-06-08
To examine the outcomes of sexual function in postmenopausal women and women with a history of breast cancer treated with endocrine therapy who were experiencing the symptoms of GSM for which they were treated with fractional microablative CO 2 laser. From July 2015 to October 2016, a retrospective chart review of women who underwent fractional microablative CO 2 laser therapy (MonaLisa Touch, DEKA) for GSM was conducted. Several validated questionnaires were used to assess changes in symptoms and sexual function including the Female Sexual Function Index (FSFI), the Wong-Baker Faces Scale (WBFS), and the Female Sexual Distress Scale-Revised (FSDSR). Comparisons of mean symptom scores were described at baseline and six weeks after each treatment. There was a statistically significant improvement in every domain of FSFI, WBFS, and FSDS-R when comparing baseline symptom scores to after treatment three symptom scores for all patients. The secondary outcome was to evaluate the differences, if any, in outcomes of sexual function between postmenopausal women and women with a history of breast cancer treated with endocrine therapy. Both groups had statistically significant improvements in many domains studied. Fractional microablative CO 2 laser therapy (MonaLisa Touch, DEKA) is an effective modality in treating the symptoms of GSM in postmenopausal women and women with a history of breast cancer treated with endocrine therapy.
Full-field implementation of a perfect eavesdropper on a quantum cryptography system.
Gerhardt, Ilja; Liu, Qin; Lamas-Linares, Antía; Skaar, Johannes; Kurtsiefer, Christian; Makarov, Vadim
2011-06-14
Quantum key distribution (QKD) allows two remote parties to grow a shared secret key. Its security is founded on the principles of quantum mechanics, but in reality it significantly relies on the physical implementation. Technological imperfections of QKD systems have been previously explored, but no attack on an established QKD connection has been realized so far. Here we show the first full-field implementation of a complete attack on a running QKD connection. An installed eavesdropper obtains the entire 'secret' key, while none of the parameters monitored by the legitimate parties indicate a security breach. This confirms that non-idealities in physical implementations of QKD can be fully practically exploitable, and must be given increased scrutiny if quantum cryptography is to become highly secure.
Implementing Cognitive Remediation Programs in France: The "Secret Sauce".
Amado, Isabelle; Sederer, Lloyd I
2016-07-01
Cognitive remediation (CR) is a psychosocial therapy that seeks to restore patients' cognitive abilities by providing strategies to improve functioning in cognitive domains and helping them transfer acquired capabilities to everyday life. Since 2008, CR programs have been introduced in several regional health ministry areas in France. This column describes that implementation initiative, which includes creation of a network of the most active CR programs to conduct multicenter trials; establishment of a university degree in CR, awarded after completion of a one-year clinical training program; and implementation activities of regional health agencies. The authors describe three core elements of a "secret sauce"-a common language, timing, and leadership-that has helped ensure the success of the implementation efforts and that may be useful in other countries.
Screw-Thread Standards for Federal Services, 1957. Handbook H28 (1957), Part 1. Revised
1960-11-01
8217 . 196 5. Method of de -siglttin --------- 98 4. (hirnl formutl for rniitsure.. G. 1-)irections for d(lt mi t i g lita- ittent Of titt’h tiMlIt tr --- 196...are intended to coniformi to genlerally AIa.fl.t.P’it’Nrecnivzl Asst. In itt’s.. The Notional Screw& aceited coinieresal praicti.et alt~lhnughl...Mcitiju, AssNistat Engineer of Stbmdarais, Enigineering outsde f de Goern entservces Divisin, Crime Co., 836 S. Michigan Avemn, Chicago 5,11. (mona
Earth observation taken by the Expedition 28 crew
2011-08-22
ISS028-E-028782 (22 Aug. 2011) --- This panoramic view of recently-formed Hurricane Irene was acquired by the crew of the International Space Station early Monday afternoon from a point over the coastal waters of Venezuela. At the time Irene was packing winds of 80mph and was just north of the Mona Passage between Hispaniola and Puerto Rico. Although no eye was visible at this time, the storm was strengthening and exhibited the size and structure of a classic ?Cape Verde? hurricane as it tracked west-northwestward towards the southern Bahamas.
Weak Links: Stabilizers of Complex Systems from Proteins to Social Networks
NASA Astrophysics Data System (ADS)
Csermely, Peter
Why do women stabilize our societies? Why can we enjoy and understand Shakespeare? Why are fruitflies uniform? Why do omnivorous eating habits aid our survival? Why is Mona Lisa's smile beautiful? -- Is there any answer to these questions? This book shows that the statement: "weak links stabilize complex systems" holds the answers to all of the surprising questions above. The author (recipientof several distinguished science communication prizes) uses weak (low affinity, low probability) interactions as a thread to introduce a vast varietyof networks from proteins to ecosystems.
Secrets of Mlearning Failures: Confronting Reality
ERIC Educational Resources Information Center
Cochrane, Thomas
2012-01-01
Having implemented and evaluated over 35 mlearning projects in a variety of contexts in higher education over the past 6 years the researcher is ready to share the untold secret: not all mlearning projects succeed! This article critiques three of the researcher's mlearning projects that can be classed as "failures" and compares them to successful…
Threshold secret sharing scheme based on phase-shifting interferometry.
Deng, Xiaopeng; Shi, Zhengang; Wen, Wei
2016-11-01
We propose a new method for secret image sharing with the (3,N) threshold scheme based on phase-shifting interferometry. The secret image, which is multiplied with an encryption key in advance, is first encrypted by using Fourier transformation. Then, the encoded image is shared into N shadow images based on the recording principle of phase-shifting interferometry. Based on the reconstruction principle of phase-shifting interferometry, any three or more shadow images can retrieve the secret image, while any two or fewer shadow images cannot obtain any information of the secret image. Thus, a (3,N) threshold secret sharing scheme can be implemented. Compared with our previously reported method, the algorithm of this paper is suited for not only a binary image but also a gray-scale image. Moreover, the proposed algorithm can obtain a larger threshold value t. Simulation results are presented to demonstrate the feasibility of the proposed method.
López-García, Ashley Samara; García-Prieto, Luis
2017-06-02
Species of Mesocoelium Odhner, 1901 (Digenea) are generally similar and are often difficult to distinguish. Currently there are 42 specimens of this genus held in the Colección Nacional de Helmintos (CNHE) of the Instituto de Biología, Universidad Nacional Autónoma de Mexico, which previously have been assigned to three species: M. monas Rudolphi, 1819, M. travassosi Pereira & Cuocolo, 1940 and M. leiperi Bhalerao, 1936. Upon reevaluation of these specimens it was determined that 27, could not be assigned to species level and 15 could only be assigned to body type (carli and leiperi) because of the poor conditions of preservation of the material. The remaining 15 specimens were of sufficient quality to be identified to species and were found to represent M. americanum Harwood, 1932, M. danforthi Hoffman, 1935, M. meggitti Bhalerao, 1927, M. cf. americanum Harwood, 1932, and M. cf. danforthi Hoffman, 1935. Neither M. monas nor M. travassosi could be confirmed among these specimens; however, Mesocoelium meggitti (syn. M. travassosi) was confirmed. Mesocoelium danforthi is recorded for the first time in the Mexican collection. The presence of M. cf. gonocephali Singh, 1967 and M. cf. microon Nicoll, 1914 also among the 15 specimens of sufficient quality to be identified to species, needs to be confirmed through collects of new material. Finally, in future studies, we propose to improve the quality of specimens by fixing them considering the modifications to this process proposed herein, and compliment these morphological studies with molecular studies.
Ramalho, A C O; da Silva, R J; Schwartz, H O; Péres, A K
2009-08-01
The present study reports the occurrence of helminths in the introduced species Tupinambis merianae (tegu lizard), and in two endemic species Trachylepis atlantica (small lizard) and Amphisbaena ridleyi (two-head-snake lizard ), from Fernando de Noronha Archipelago, State of Pernambuco, Brazil. Nine species of helminths were found, mainly in the digestive tract and accessory organs, with the following prevalence (P) and mean infection intensity (MII). Tupinambis merianae: Diaphanocephalus galeatus (P = 96%, MII = 20.5), Spinicauda spinicauda (P = 100%, MII = 197.8), and Oochoristica sp.l (P = 20%, MII = 4.4). Trachylepis atlantica: Moaciria alvarengai (P = 20%, MII = 1.4), S. spinicauda (P = 92%, MII = 22.1), Mesocoelium monas (P = 4%, MII = 3.0), Platynosomum sp. (P = 8%, MII = 7.0), and Oochoristica sp.2 (P = 16%, MII = 1.25). Amphisbaena ridleyi: Aplectana albae (P = 96%, MII = 143.4), Thelandros alvarengai (P = 4%, MII = 1.0), Me. monas (P = 44%, MII = 2.8), Platynosomum sp. (P = 36%; MII = 13.8), and Oochoristica sp.2 (P = 48%; MII = 2.17). More than 80% of T. merianae were infected with 2, or more, helminth species. In Tr. atlantica, single-species infections were present in 50% of the specimens, but co-occurrence of 2 parasites was also high (41.7%). In A. ridleyi, multiple infections were more common, with up to 5 parasite species present. The helminth fauna observed allowed us to conclude that helminths can be carried together with their host when they colonize new geographic localities and that these introduced helminths can, in turn, colonize endemic, or native, hosts.
Hydrogeology of Puerto Rico and the outlying islands of Vieques, Culebra, and Mona
Gómez-Gómez, Fernando; Rodríguez-Martínez, Jesús; Santiago, Marilyn
2014-01-01
The availability of hydrogeologic maps for Puerto Rico and the outlying islands of Vieques, Culebra, and Mona are important to hydrogeologists, groundwater specialists, and water resource managers and planners. These maps, in combination with the report, serve as a source of information to all users by providing basic hydrogeologic and hydrologic knowledge in a concise illustrated format. Puerto Rico and the outlying islands cover a total area of 8,927 square kilometers (km2). Of this total area, about 3,500 km2 are underlain by hydrogeologic units that are classified as intergranular or fissured. These hydrogeologic units form the principal aquifer systems throughout Puerto Rico and the outlying islands. In Puerto Rico, the most extensive and intensely developed aquifers are the North Coast Limestone aquifer system and the South Coastal Alluvial Plain aquifer system. Withdrawals from these two aquifer systems constitute nearly 70 percent of the total groundwater withdrawn in Puerto Rico. The spatial extent of the North Coast Limestone aquifer system is about 2,000 km2. Within this aquifer system, groundwater development is greatest in the 800-km2 area between the Río Grande de Arecibo and the Río de la Plata. This also is the area for which concern is the highest regarding the future use of groundwater as a primary source of water for domestic and industrial use. With an estimated withdrawal of 280,000 cubic meters per day (m3/d), groundwater constituted the principal source of water within this area providing 100 percent of the water for self-supplied industries and about 85 percent for public water supplies in 1985. By 2005, groundwater withdrawals decreased to 150,000 m3/d. The spatial extent of the South Coastal Alluvial Plain aquifer system is about 470 km2. The estimated consumptive groundwater withdrawal from the aquifer system was 190,000 m3/d in 1980 and 170,000 m3/d in 2005. About 60 percent and 40 percent of the groundwater withdrawal from the South Coastal Alluvial Plain aquifer system was used for public water supply and irrigation, respectively. In the outlying islands of Vieques, Culebra, and Mona, only Vieques is underlain by aquifers of any local importance. The Resolución and Esperanza aquifers underlie an area covering 16 km2 on the island of Vieques. Prior to 1978 when an underwater public water-supply pipeline connecting Vieques to the main island of Puerto Rico was completed, groundwater withdrawal from the two aquifers was as much as 2,500 m3/d. Groundwater withdrawals in Vieques island in 2005 were estimated at less than 100 m3/d. The potential development of relatively untapped groundwater resources in Puerto Rico is limited to the Río Grande de Añasco valley and the Río Culebrinas valley in the western part of the island and to the Río Grande de Arecibo part of the North Coast Limestone aquifer system. In general, the North Coast Limestone and the South Coastal Alluvial Plain aquifer systems, which are the two principal groundwater-flow systems in Puerto Rico, show evidence of aquifer overdraft as indicated by regional increases in concentrations of dissolved solids. Optimization of withdrawals through conjunctive use of both surface-water and groundwater sources and by instituting water conservation measures has the greatest potential to ensure the continued use of groundwater resources. In support of these efforts, programs also could be implemented to improve database information regarding groundwater withdrawals and the contribution of surface-water diversions to surface-water flow, especially within the southern coastal plain of Puerto Rico.
Beltrán, Diana M; Schizas, Nikolaos V; Appeldoorn, Richard S; Prada, Carlos
2017-07-05
The oceans are deteriorating at a fast pace. Conservation measures, such as Marine Protected Areas, are being implemented to relieve areas from local stressors and allow populations to restore to natural levels. Successful networks of MPAs operate if the space among MPAs is smaller than the dispersal capacity of the species under protection. We studied connectivity patterns across populations in a series of MPAs in the common yellowhead Jawfish, Opistognathus aurifrons. Using the power of genome-wide variation, we estimated that the maximum effective dispersal is 8.3 km. We found that MPAs exchange migrants likely via intermediate unprotected habitats through stepping stone dispersal. At scales >50 km such connectivity is decreased, particularly across the Mona Passage. The MPA network studied would be unable to maintain connectivity of these small benthic fishes if habitat in between them is extirpated. Our study highlights the power of SNPs to derive effective dispersal distance and the ability of SNPs to make inferences from single individuals. Given that overall reef fish diversity is driven by species with life histories similar to that of the yellowhead jawfish, managers face a challenge to develop strategies that allow connectivity and avoid isolation of populations and their possible extinction.
Vassilev, Apostol; Mouha, Nicky; Brandão, Luís
2018-01-01
The security of encrypted data depends not only on the theoretical properties of cryptographic primitives but also on the robustness of their implementations in software and hardware. Threshold cryptography introduces a computational paradigm that enables higher assurance for such implementations.
Onians, John
2017-10-23
This paper considers several types of imagination relevant to art historical enquiry. These are exemplified in artistic expressions ranging from palaeolithic paintings in the Chauvet Cave, to drawings, sculptures and buildings designed by Michelangelo and drawings and paintings by Leonardo, and are related to recent neuroscientific discoveries. From this it emerges that important types of imagination cannot be understood without an appreciation of the neural processes that underlie them and especially without an acknowledgement of the importance of neurochemistry. Crown Copyright © 2017. Published by Elsevier Ltd. All rights reserved.
Papers presented to the International Colloquium on Venus
NASA Technical Reports Server (NTRS)
1992-01-01
This volume contains short papers that have been accepted for the International Colloquium on Venus, August 10-12, Pasadena, California. The Program Committee consisted of Stephen Saunders (Jet Propulsion Laboratory) and Sean C. Solomon (Massachusetts Institute of Technology). Chairmen: Raymond Arvison (Washington University); Vassily Moroz (Institute for Space Research); Donald B. Campbell (Cornell University); Thomas Donahue (University of Michigan); James W. Head III (Brown University); Pamela Jones (Lunar and Planetary Institute); Mona Jasnow, Andrew Morrison, Timothy Pardker, Jeffrey Plaut, Ellen Stofan, Tommy Thompson, Cathy Weitz (Jet Propulsion Laboratory); Gordon Pettengil (Massachusetts Institute of Technology); and Janet Luhmann (University of California, Los Angeles).
Vassilev, Apostol; Mouha, Nicky; Brandão, Luís
2018-01-01
The security of encrypted data depends not only on the theoretical properties of cryptographic primitives but also on the robustness of their implementations in software and hardware. Threshold cryptography introduces a computational paradigm that enables higher assurance for such implementations. PMID:29576634
Secreted production of Renilla luciferase in Bacillus subtilis.
Chiang, Chung-Jen; Chen, Po Ting; Chao, Yun-Peng
2010-01-01
Luciferase (Rluc) from the soft coral Renilla reniformis has been widely used as a bioluminescent reporter, and its secreted production has been solely performed in mammalian cells thus far. To make the production more efficient, a series of approaches was attempted to overproduce Rluc extracellularly in Bacillus subtilis. First, Cys124 in the Rluc gene was substituted with Ala. The mutant gene was subsequently incorporated into a pUB110/R6K-based plasmid, consequently, fusing with the P43 promoter and the sacB signal peptide. With the nitrogen-rich medium, B. subtilis strain bearing the plasmid became able to secret a detectable amount of Rluc. Moreover, the secretion signal for the Rluc gene was replaced by the aprN leader peptide with or without the propeptide. The result led to a more than twofold increase in the secreted Rluc. Finally, by enhancing the transcription of the Rluc gene implementing the P43 and spac tandem promoter, it resulted in the secreted Rluc with a yield of 100 mg/L. Overall, this study illustrates a potential strategy for improving the secretion efficiency of heterologous proteins in B. subtilis.
Entanglement-secured single-qubit quantum secret sharing
DOE Office of Scientific and Technical Information (OSTI.GOV)
Scherpelz, P.; Resch, R.; Berryrieser, D.
In single-qubit quantum secret sharing, a secret is shared between N parties via manipulation and measurement of one qubit at a time. Each qubit is sent to all N parties in sequence; the secret is encoded in the first participant's preparation of the qubit state and the subsequent participants' choices of state rotation or measurement basis. We present a protocol for single-qubit quantum secret sharing using polarization entanglement of photon pairs produced in type-I spontaneous parametric downconversion. We investigate the protocol's security against eavesdropping attack under common experimental conditions: a lossy channel for photon transmission, and imperfect preparation of themore » initial qubit state. A protocol which exploits entanglement between photons, rather than simply polarization correlation, is more robustly secure. We implement the entanglement-based secret-sharing protocol with 87% secret-sharing fidelity, limited by the purity of the entangled state produced by our present apparatus. We demonstrate a photon-number splitting eavesdropping attack, which achieves no success against the entanglement-based protocol while showing the predicted rate of success against a correlation-based protocol.« less
Unconditional security of entanglement-based continuous-variable quantum secret sharing
NASA Astrophysics Data System (ADS)
Kogias, Ioannis; Xiang, Yu; He, Qiongyi; Adesso, Gerardo
2017-01-01
The need for secrecy and security is essential in communication. Secret sharing is a conventional protocol to distribute a secret message to a group of parties, who cannot access it individually but need to cooperate in order to decode it. While several variants of this protocol have been investigated, including realizations using quantum systems, the security of quantum secret sharing schemes still remains unproven almost two decades after their original conception. Here we establish an unconditional security proof for entanglement-based continuous-variable quantum secret sharing schemes, in the limit of asymptotic keys and for an arbitrary number of players. We tackle the problem by resorting to the recently developed one-sided device-independent approach to quantum key distribution. We demonstrate theoretically the feasibility of our scheme, which can be implemented by Gaussian states and homodyne measurements, with no need for ideal single-photon sources or quantum memories. Our results contribute to validating quantum secret sharing as a viable primitive for quantum technologies.
Gregori, Josep; Méndez, Olga; Katsila, Theodora; Pujals, Mireia; Salvans, Cándida; Villarreal, Laura; Arribas, Joaquin; Tabernero, Josep; Sánchez, Alex; Villanueva, Josep
2014-07-15
Secretome profiling has become a methodology of choice for the identification of tumor biomarkers. We hypothesized that due to the dynamic nature of secretomes cellular perturbations could affect their composition but also change the global amount of protein secreted per cell. We confirmed our hypothesis by measuring the levels of secreted proteins taking into account the amount of proteome produced per cell. Then, we established a correlation between cell proliferation and protein secretion that explained the observed changes in global protein secretion. Next, we implemented a normalization correcting the statistical results of secretome studies by the global protein secretion of cells into a generalized linear model (GLM). The application of the normalization to two biological perturbations on tumor cells resulted in drastic changes in the list of statistically significant proteins. Furthermore, we found that known epithelial-to-mesenchymal transition (EMT) effectors were only statistically significant when the normalization was applied. Therefore, the normalization proposed here increases the sensitivity of statistical tests by increasing the number of true-positives. From an oncology perspective, the correlation between protein secretion and cellular proliferation suggests that slow-growing tumors could have high-protein secretion rates and consequently contribute strongly to tumor paracrine signaling.
Quantum secret information equal exchange protocol based on dense coding
NASA Astrophysics Data System (ADS)
Jiang, Ying-Hua; Zhang, Shi-Bin; Dai, Jin-Qiao; Shi, Zhi-Ping
2018-04-01
In this paper, we design a novel quantum secret information equal exchange protocol, which implements the equal exchange of secret information between the two parties with the help of semi-trusted third party (TP). In the protocol, EPR pairs prepared by the TP are, respectively, distributed to both the communication parties. Then, the two parties perform Pauli operation on each particle and return the new particles to TP, respectively. TP measures each new pair with Bell basis and announces the measurement results. Both parties deduce the secret information of each other according to the result of announcement by TP. Finally, the security analysis shows that this protocol solves the problem about equal exchange of secret information between two parties and verifies the security of semi-trusted TPs. It proves that the protocol can effectively resist glitch attacks, intercept retransmission attacks and entanglement attack.
Counterfactual quantum cryptography.
Noh, Tae-Gon
2009-12-04
Quantum cryptography allows one to distribute a secret key between two remote parties using the fundamental principles of quantum mechanics. The well-known established paradigm for the quantum key distribution relies on the actual transmission of signal particle through a quantum channel. In this Letter, we show that the task of a secret key distribution can be accomplished even though a particle carrying secret information is not in fact transmitted through the quantum channel. The proposed protocols can be implemented with current technologies and provide practical security advantages by eliminating the possibility that an eavesdropper can directly access the entire quantum system of each signal particle.
Counterfactual Quantum Cryptography
NASA Astrophysics Data System (ADS)
Noh, Tae-Gon
2009-12-01
Quantum cryptography allows one to distribute a secret key between two remote parties using the fundamental principles of quantum mechanics. The well-known established paradigm for the quantum key distribution relies on the actual transmission of signal particle through a quantum channel. In this Letter, we show that the task of a secret key distribution can be accomplished even though a particle carrying secret information is not in fact transmitted through the quantum channel. The proposed protocols can be implemented with current technologies and provide practical security advantages by eliminating the possibility that an eavesdropper can directly access the entire quantum system of each signal particle.
Mouse-virulent Toxoplasma gondii isolated from feral cats on Mona Island, Puerto Rico.
Dubey, J P; López-Torres, H Y; Sundar, N; Velmurugan, G V; Ajzenberg, D; Kwok, O C H; Hill, R; Dardé, M L; Su, C
2007-12-01
Cats are essential in the life cycle of Toxoplasma gondii because they are the only hosts that can excrete the environmentally resistant oocysts. Samples of serum, feces, and tissues from cats from Mona, a remote island off the coast of Puerto Rico, were examined for T. gondii infection. Antibodies to T. gondii were assayed by the modified agglutination test and found in 16 of 19 (84.2%) of cats, with titers of 1:10 in 2, 1:80 in 1, 1:160 in 4, 1:320 in 3, and 1:1,280 or higher in 6. Tissues of 19 of the 20 cats were bioassayed in mice for T. gondii infection. Toxoplasma gondii was isolated from tissues of 12 cats: from the hearts of 9, skeletal muscle of 10, and brain of 1 cat. All infected mice from 10 of 12 isolates died of acute toxoplasmosis during primary infection. Genotyping of these 12 T. gondii isolates (designated (TgCatPr 1-12) by 10 multilocus PCR-RFLP markers, i.e., SAG1, SAG2, SAG3, BTUB, GRA6, c22-8, c29-2, L358, PK1, and an apicoplast marker Apico, and the 6 multilocus microsatellite markers TUB2, W35, TgM-A, B18, B17, and M33, revealed 7 genotypes; 5 isolates had Type I alleles at all loci except at 1 microsatellite locus, and the remainder were atypical. The latter isolates of T. gondii were different biologically and phenotypically from the feline isolates from the rest of the Americas. One isolate (TgCatPr 12) was a mixed infection with 2 genotypes.
Rodríguez-Robles, Javier A; Jezkova, Tereza; Fujita, Matthew K; Tolson, Peter J; García, Miguel A
2015-07-01
Habitat fragmentation reduces the extent and connectivity of suitable habitats, and can lead to changes in population genetic structure. Limited gene flow among isolated demes can result in increased genetic divergence among populations, and decreased genetic diversity within demes. We assessed patterns of genetic variation in the Caribbean boa Chilabothrus monensis (Epicrates monensis) using two mitochondrial and seven nuclear markers, and relying on the largest number of specimens of these snakes examined to date. Two disjunct subspecies of C. monensis are recognized: the threatened C. m. monensis, endemic to Mona Island, and the rare and endangered C. m. granti, which occurs on various islands of the Puerto Rican Bank. Mitochondrial and nuclear markers revealed unambiguous genetic differences between the taxa, and coalescent species delimitation methods indicated that these snakes likely are different evolutionary lineages, which we recognize at the species level, C. monensis and C. granti. All examined loci in C. monensis (sensu stricto) are monomorphic, which may indicate a recent bottleneck event. Each population of C. granti exclusively contains private mtDNA haplotypes, but five of the seven nuclear genes assayed are monomorphic, and nucleotide diversity is low in the two remaining markers. The faster pace of evolution of mtDNA possibly reflects the present-day isolation of populations of C. granti, whereas the slower substitution rate of nuDNA may instead mirror the relatively recent episodes of connectivity among the populations facilitated by the lower sea level during the Pleistocene. The small degree of overall genetic variation in C. granti suggests that demes of this snake could be managed as a single unit, a practice that would significantly increase their effective population size. Copyright © 2015 Elsevier Inc. All rights reserved.
NASA Astrophysics Data System (ADS)
Ramos Valle, A.
2016-02-01
We have previously compared the output from three oceanographic models against observed data from an ADCP at a common grid point location on the zonally oriented, southwestern Puerto Rico shelf that extends into the northern Caribbean Sea. The three models were: 1) AMSEAS (NCOM), 2) Regional ROMS and 3) a higher resolution version of ROMS nested within the Regional ROMS. These models faced great difficulty in accurately depicting the bathymetry of the ocean in the PR-USVI archipelago which is characterized by small islands, narrow insular shelves, steep slopes and deep water beyond. The resulting validations of the three models versus the ADCP at the selected location were poor. However, the insight we gained into the behavior of the models during the validation process suggested that models might do a better job at simulating currents across the inter-island straits that connect the Atlantic Ocean with the Caribbean Sea than along the insular Caribbean or Atlantic coastlines. We therefore focused our attention on expanding our previous research by performing a similar analysis using the ROMS model against ADCP observations in the Mona Passage, west of PR. This new ADCP location exhibits bathymetric features that are smoother, less complex, and better represented in the Regional ROMS model while flows at the site are stronger than at the previous ADCP site at La Parguera. Statistical time-series analyses are performed on model and ADCP flow velocity time series to quantify the model's skill. Results indicate that ROMS does a much better job at simulating ocean currents at the Mona Passage site than at La Parguera. Dynamical and numerical differences that might explain the spatially varying model skill are considered. In summary: model skill validation sites around PR are not all the same.
Distribution and abundance of sacred monkeys in Igboland, southern Nigeria.
Baker, Lynne R; Tanimola, Adebowale A; Olubode, Oluseun S; Garshelis, David L
2009-07-01
Although primates are hunted on a global scale, some species are protected against harassment and killing by taboos or religious doctrines. Sites where the killing of sacred monkeys or the destruction of sacred groves is forbidden may be integral to the conservation of certain species. In 2004, as part of a distribution survey of Sclater's guenon (Cercopithecus sclateri) in southern Nigeria, we investigated reports of sacred monkeys in the Igbo-speaking region of Nigeria. We confirmed nine new sites where primates are protected as sacred: four with tantalus monkeys (Chlorocebus tantalus) and five with mona monkeys (Cercopithecus mona). During 2004-2006, we visited two communities (Akpugoeze and Lagwa) previously known to harbor sacred populations of Ce. sclateri to estimate population abundance and trends. We directly counted all groups and compared our estimates with previous counts when available. We also estimated the size of sacred groves and compared these with grove sizes reported in the literature. The mean size of the sacred groves in Akpugoeze (2.06 ha, n = 10) was similar to others in Africa south of the Sahel, but larger than the average grove in Lagwa (0.49 ha, n = 15). We estimated a total population of 124 Sclater's monkeys in 15 groups in Lagwa and 193 monkeys in 20 groups in Akpugoeze. The Akpugoeze population was relatively stable over two decades, although the proportion of infants declined, and the number of groups increased. As Sclater's monkey does not occur in any official protected areas, sacred populations are important to the species' long-term conservation. Despite the monkeys' destruction of human crops, most local people still adhere to the custom of not killing monkeys. These sites represent ideal locations in which to study the ecology of Sclater's monkey and human-wildlife interactions. (c) 2009 Wiley-Liss, Inc.
Development and Validation of a Measure of Attitudes toward Fluffy Women
Barned, C; Lipps, GE
2014-01-01
ABSTRACT Background: There is an absence of research on the newly evolved term “fluffy” which describes body image and personality features among women. Research on “fluffiness” among Caribbean peoples has been limited by the lack of valid and reliable measures of the concept. Objective: This project addresses this problem by exploring the internal consistency reliability and the concurrent and discriminant validity of the Attitudes toward Fluffy Women Scale (ATFW) using a mixture of past and present students from The University of the West Indies (UWI), Mona, and the University of Technology (UTech), Kingston. Method: Past or present students from The UWI, Mona, and UTech, Kingston, were recruited for the study through the use of convenience sampling. A total of 80 students (38 males, 47.5%; 42 females, 52.5%) participated in the study. Results: Overall, the ATFW was found to have an acceptable degree of internal consistency reliability (α = 0.90). The scale also had reasonably good concurrent validity as evidenced by moderate correlations with scores on the Attitudes Toward Obese Persons Scale (r = −0.42) and acceptable discriminant validity as demonstrated through low correlations with a Bogardus Social Distance Scale designed to assess prejudice toward people living with the human immunodeficiency virus [HIV] (r = 0.29). This pattern of scores suggests that the majority of the stable variance underlying the ATFW assesses the “fluffy” concept (17.6%) while a smaller degree of the variability (8%) measures a conceptually similar but distinct concept. Conclusion: The Attitudes toward Fluffy Women scale was found to be a reliable and valid scale for assessing the attitudes of young adults toward fluffy women. PMID:25803379
Generation new MP3 data set after compression
NASA Astrophysics Data System (ADS)
Atoum, Mohammed Salem; Almahameed, Mohammad
2016-02-01
The success of audio steganography techniques is to ensure imperceptibility of the embedded secret message in stego file and withstand any form of intentional or un-intentional degradation of secret message (robustness). Crucial to that using digital audio file such as MP3 file, which comes in different compression rate, however research studies have shown that performing steganography in MP3 format after compression is the most suitable one. Unfortunately until now the researchers can not test and implement their algorithm because no standard data set in MP3 file after compression is generated. So this paper focuses to generate standard data set with different compression ratio and different Genre to help researchers to implement their algorithms.
Fast implementation of length-adaptive privacy amplification in quantum key distribution
NASA Astrophysics Data System (ADS)
Zhang, Chun-Mei; Li, Mo; Huang, Jing-Zheng; Patcharapong, Treeviriyanupab; Li, Hong-Wei; Li, Fang-Yi; Wang, Chuan; Yin, Zhen-Qiang; Chen, Wei; Keattisak, Sripimanwat; Han, Zhen-Fu
2014-09-01
Post-processing is indispensable in quantum key distribution (QKD), which is aimed at sharing secret keys between two distant parties. It mainly consists of key reconciliation and privacy amplification, which is used for sharing the same keys and for distilling unconditional secret keys. In this paper, we focus on speeding up the privacy amplification process by choosing a simple multiplicative universal class of hash functions. By constructing an optimal multiplication algorithm based on four basic multiplication algorithms, we give a fast software implementation of length-adaptive privacy amplification. “Length-adaptive” indicates that the implementation of privacy amplification automatically adapts to different lengths of input blocks. When the lengths of the input blocks are 1 Mbit and 10 Mbit, the speed of privacy amplification can be as fast as 14.86 Mbps and 10.88 Mbps, respectively. Thus, it is practical for GHz or even higher repetition frequency QKD systems.
Epstein, Richard A
2011-01-01
The Biologics Price Competition and Innovation Act of 2009 ("Biosimilars Act") is for the field of pharmaceutical products the single most important legislative development since passage of the Drug Price Competition and Patent Term Restoration Act of 1984 ("Hatch-Waxman Act"), on which portions of the Biosimilars Act are clearly patterned. Congress revised section 351 of the Public Health Service Act (PHSA) to create a pathway for FDA approval of "biosimilar" biological products. Each biosimilar applicant is required to cite in its application a "reference product" that was approved on the basis of a full application containing testing data and manufacturing information, which is owned and was submitted by another company and much of which constitutes trade secret information subject to constitutional protection. Because the Biosimilars Act authorizes biosimilar applicants to cite these previously approved applications, the implementation of the new legislative scheme raises critical issues under the Fifth Amendment of the Constitution, pursuant to which private property--trade secrets included--may not be taken for public use, without "just compensation." FDA must confront those issues as it implements the scheme set out in the Biosimilars Act. This article will discuss these issues, after providing a brief overview of the Biosimilars Act and a more detailed examination of the law of trade secrets.
NASA Astrophysics Data System (ADS)
Guo, Ying; Zhao, Wei; Li, Fei; Huang, Duan; Liao, Qin; Xie, Cai-Lang
2017-08-01
The developing tendency of continuous-variable (CV) measurement-device-independent (MDI) quantum cryptography is to cope with the practical issue of implementing scalable quantum networks. Up to now, most theoretical and experimental researches on CV-MDI QKD are focused on two-party protocols. However, we suggest a CV-MDI multipartite quantum secret sharing (QSS) protocol use the EPR states coupled with optical amplifiers. More remarkable, QSS is the real application in multipartite CV-MDI QKD, in other words, is the concrete implementation method of multipartite CV-MDI QKD. It can implement a practical quantum network scheme, under which the legal participants create the secret correlations by using EPR states connecting to an untrusted relay via insecure links and applying the multi-entangled Greenberger-Horne-Zeilinger (GHZ) state analysis at relay station. Even if there is a possibility that the relay may be completely tampered, the legal participants are still able to extract a secret key from network communication. The numerical simulation indicates that the quantum network communication can be achieved in an asymmetric scenario, fulfilling the demands of a practical quantum network. Additionally, we illustrate that the use of optical amplifiers can compensate the partial inherent imperfections of detectors and increase the transmission distance of the CV-MDI quantum system.
A Graph Theory Practice on Transformed Image: A Random Image Steganography
Thanikaiselvan, V.; Arulmozhivarman, P.; Subashanthini, S.; Amirtharajan, Rengarajan
2013-01-01
Modern day information age is enriched with the advanced network communication expertise but unfortunately at the same time encounters infinite security issues when dealing with secret and/or private information. The storage and transmission of the secret information become highly essential and have led to a deluge of research in this field. In this paper, an optimistic effort has been taken to combine graceful graph along with integer wavelet transform (IWT) to implement random image steganography for secure communication. The implementation part begins with the conversion of cover image into wavelet coefficients through IWT and is followed by embedding secret image in the randomly selected coefficients through graph theory. Finally stegoimage is obtained by applying inverse IWT. This method provides a maximum of 44 dB peak signal to noise ratio (PSNR) for 266646 bits. Thus, the proposed method gives high imperceptibility through high PSNR value and high embedding capacity in the cover image due to adaptive embedding scheme and high robustness against blind attack through graph theoretic random selection of coefficients. PMID:24453857
Controller-Independent Bidirectional Direct Communication with Four-Qubit Cluster States
NASA Astrophysics Data System (ADS)
Cao, Yong; Zha, Xin-Wei; Wang, Shu-Kai
2018-03-01
We propose a feasible scheme for implementing bidirectional quantum direct communication protocol using four-qubit cluster states. In this scheme, the quantum channel between the sender Alice and the receiver Bob consists of an ordered sequence of cluster states which are prepared by Alice. After ensuring the security of quantum channel, according to the secret messages, the sender will perform the unitary operation and the receiver can obtain different secret messages in a deterministic way.
Optofluidic cellular immunofunctional analysis by localized surface plasmon resonance
NASA Astrophysics Data System (ADS)
Kurabayashi, Katsuo; Oh, Bo-Ram
2014-08-01
Cytokine secretion assays provide the means to quantify intercellular-signaling proteins secreted by blood immune cells. These assays allow researchers and clinicians to obtain valuable information on the immune status of the donor. Previous studies have demonstrated that localized surface plasmon resonance (LSPR) effects enable label-free, real-time biosensing on a nanostructured metallic surface with simple optics and sensing tunability. However, limited sensitivity coupled with a lack of sample handling capability makes it challenging to implement LSPR biosensing in cellular functional immunoanalysis based on cytokine secretion assay. This paper describes our recent progress towards full development of a label-free LSPR biosensing technique to detect cell-secreted tumor necrosis factor (TNF)-α cytokines in clinical blood samples. We integrate LSPR bionanosensors in an optofluidic platform capable of handling target immune cells in a microfluidic chamber while readily permitting optical access for cytokine detection.
Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer
NASA Astrophysics Data System (ADS)
Mannan, Mohammad; van Oorschot, P. C.
Keylogging and phishing attacks can extract user identity and sensitive account information for unauthorized access to users' financial accounts. Most existing or proposed solutions are vulnerable to session hijacking attacks. We propose a simple approach to counter these attacks, which cryptographically separates a user's long-term secret input from (typically untrusted) client PCs; a client PC performs most computations but has access only to temporary secrets. The user's long-term secret (typically short and low-entropy) is input through an independent personal trusted device such as a cellphone. The personal device provides a user's long-term secrets to a client PC only after encrypting the secrets using a pre-installed, "correct" public key of a remote service (the intended recipient of the secrets). The proposed protocol (
Bursey, Charles R; Goldberg, Stephen R
2004-02-01
Cosmocerca vrcibradici n. sp. and Oswaldocruzia vitti n. sp., intestinal parasites of Prionodactylus eigenmanni (type host) and P. oshaughnessyi, are described and illustrated. Of the 19 valid species of Cosmocerca, C. vrcibradici n. sp. represents the 12th Neotropical species and the first species to be reported from lizard hosts. Of the 76 valid species of Oswaldocruzia, O. vitti n. sp. represents the 14th Neotropical species and the eighth species to be reported from lizard hosts. In addition, 1 species of Digenea, Mesocoelium monas, and 1 species of Acanthocephala, Acanthocephalus saurius, were found.
Badal, Simone; Collins-Fairclough, Aneisha; Stewart, Cheryl; Smith, Keriayn
2014-10-01
The 2nd Annual Conference of the Society for Scientific Advancement (SoSA) was convened to integrate three research areas towards the development of therapies that will help to reduce disease burden in the Caribbean. Held in Kingston, the capital city of Jamaica, on November 22, 2013, the meeting assembled experts in the areas of genomics, stem cell research and natural medicine. The speakers represented the University of the West Indies, Mona and St. Augustine campuses, the University of Technology, and faculty from the USA and Africa. Sponsorship of this meeting supports SoSA's goal of stimulating translational research in the Caribbean.
Papers presented to the International Colloquium on Venus
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
1992-01-01
This volume contains short papers that have been accepted for the International Colloquium on Venus, August 10-12, Pasadena, California. The Program Committee consisted of Stephen Saunders (Jet Propulsion Laboratory) and Sean C. Solomon (Massachusetts Institute of Technology). Chairmen: Raymond Arvison (Washington University); Vassily Moroz (Institute for Space Research); Donald B. Campbell (Cornell University); Thomas Donahue (University of Michigan); James W. Head III (Brown University); Pamela Jones (Lunar and Planetary Institute); Mona Jasnow, Andrew Morrison, Timothy Pardker, Jeffrey Plaut, Ellen Stofan, Tommy Thompson, Cathy Weitz (Jet Propulsion Laboratory); Gordon Pettengil (Massachusetts Institute of Technology); and Janet Luhmann (University of California, Losmore » Angeles). Separate abstracts have been prepared for papers in this report.« less
Brough, David; Pelegrin, Pablo; Nickel, Walter
2017-10-01
Extracellular proteins with important signalling roles in processes, such as inflammation and angiogenesis, are known to employ unconventional routes of protein secretion. Although mechanisms of unconventional protein secretion are beginning to emerge, the precise molecular details have remained elusive for the majority of cargo proteins secreted by unconventional means. Recent findings suggest that for two examples of unconventionally secreted proteins, interleukin 1β (IL-1β) and fibroblast growth factor 2 (FGF2), the common molecular principle of pore formation may be shared. Under specific experimental conditions, secretion of IL-1β and FGF2 is triggered by phosphatidylinositol 4,5-bisphosphate [PI(4,5)P 2 ]-dependent formation of pores across the plasma membrane. However, the underlying mechanisms are different, with FGF2 known to directly interact with PI(4,5)P 2 , whereas in the case of IL-1β secretion, it is proposed that the N-terminal fragment of gasdermin D interacts with PI(4,5)P 2 to form the pore. Thus, although implemented in different ways, these findings suggest that pore formation may be shared by the unconventional secretion mechanisms for FGF2 and IL-1β in at least some cases. In this Opinion article, we discuss the unconventional mechanisms of FGF2 and IL-1β release with a particular emphasis on recent discoveries suggesting the importance of pore formation on the plasma membrane. © 2017. Published by The Company of Biologists Ltd.
NASA Astrophysics Data System (ADS)
Li, Fei; Zhao, Wei; Guo, Ying
2018-01-01
Continuous-variable (CV) measurement-device-independent (MDI) quantum cryptography is now heading towards solving the practical problem of implementing scalable quantum networks. In this paper, we show that a solution can come from deploying an optical amplifier in the CV-MDI system, aiming to establish a high-rate quantum network. We suggest an improved CV-MDI protocol using the EPR states coupled with optical amplifiers. It can implement a practical quantum network scheme, where the legal participants create the secret correlations by using EPR states connecting to an untrusted relay via insecure links and applying the multi-entangled Greenberger-Horne-Zeilinger (GHZ) state analysis at relay station. Despite the possibility that the relay could be completely tampered with and imperfect links are subject to the powerful attacks, the legal participants are still able to extract a secret key from network communication. The numerical simulation indicates that the quantum network communication can be achieved in an asymmetric scenario, fulfilling the demands of a practical quantum network. Furthermore, we show that the use of optical amplifiers can compensate the inherent imperfections and improve the secret key rate of the CV-MDI system.
NASA Astrophysics Data System (ADS)
López-Venegas, Alberto M.; Horrillo, Juan; Pampell-Manis, Alyssa; Huérfano, Victor; Mercado, Aurelio
2015-06-01
The most recent tsunami observed along the coast of the island of Puerto Rico occurred on October 11, 1918, after a magnitude 7.2 earthquake in the Mona Passage. The earthquake was responsible for initiating a tsunami that mostly affected the northwestern coast of the island. Runup values from a post-tsunami survey indicated the waves reached up to 6 m. A controversy regarding the source of the tsunami has resulted in several numerical simulations involving either fault rupture or a submarine landslide as the most probable cause of the tsunami. Here we follow up on previous simulations of the tsunami from a submarine landslide source off the western coast of Puerto Rico as initiated by the earthquake. Improvements on our previous study include: (1) higher-resolution bathymetry; (2) a 3D-2D coupled numerical model specifically developed for the tsunami; (3) use of the non-hydrostatic numerical model NEOWAVE (non-hydrostatic evolution of ocean WAVE) featuring two-way nesting capabilities; and (4) comprehensive energy analysis to determine the time of full tsunami wave development. The three-dimensional Navier-Stokes model tsunami solution using the Navier-Stokes algorithm with multiple interfaces for two fluids (water and landslide) was used to determine the initial wave characteristic generated by the submarine landslide. Use of NEOWAVE enabled us to solve for coastal inundation, wave propagation, and detailed runup. Our results were in agreement with previous work in which a submarine landslide is favored as the most probable source of the tsunami, and improvement in the resolution of the bathymetry yielded inundation of the coastal areas that compare well with values from a post-tsunami survey. Our unique energy analysis indicates that most of the wave energy is isolated in the wave generation region, particularly at depths near the landslide, and once the initial wave propagates from the generation region its energy begins to stabilize.
Secret Sharing of a Quantum State.
Lu, He; Zhang, Zhen; Chen, Luo-Kan; Li, Zheng-Da; Liu, Chang; Li, Li; Liu, Nai-Le; Ma, Xiongfeng; Chen, Yu-Ao; Pan, Jian-Wei
2016-07-15
Secret sharing of a quantum state, or quantum secret sharing, in which a dealer wants to share a certain amount of quantum information with a few players, has wide applications in quantum information. The critical criterion in a threshold secret sharing scheme is confidentiality: with less than the designated number of players, no information can be recovered. Furthermore, in a quantum scenario, one additional critical criterion exists: the capability of sharing entangled and unknown quantum information. Here, by employing a six-photon entangled state, we demonstrate a quantum threshold scheme, where the shared quantum secrecy can be efficiently reconstructed with a state fidelity as high as 93%. By observing that any one or two parties cannot recover the secrecy, we show that our scheme meets the confidentiality criterion. Meanwhile, we also demonstrate that entangled quantum information can be shared and recovered via our setting, which shows that our implemented scheme is fully quantum. Moreover, our experimental setup can be treated as a decoding circuit of the five-qubit quantum error-correcting code with two erasure errors.
Secretion of Growth Hormone in Response to Muscle Sensory Nerve Stimulation
NASA Technical Reports Server (NTRS)
Grindeland, Richard E.; Roy, R. R.; Edgerton, V. R.; Gosselink, K. L.; Grossman, E. J.; Sawchenko, P. E.; Wade, Charles E. (Technical Monitor)
1994-01-01
Growth hormone (GH) secretion is stimulated by aerobic and resistive exercise and inhibited by exposure to actual or simulated (bedrest, hindlimb suspension) microgravity. Moreover, hypothalamic growth hormone-releasing factor (GRF) and preproGRF mRNA are markedly decreased in spaceflight rats. These observations suggest that reduced sensory input from inactive muscles may contribute to the reduced secretion of GH seen in "0 G". Thus, the aim of this study was to determine the effect of muscle sensory nerve stimulation on secretion of GH. Fed male Wistar rats (304 +/- 23 g) were anesthetized (pentobarbital) and the right peroneal (Pe), tibial (T), and sural (S) nerves were cut. Electrical stimulation of the distal (D) or proximal (P) ends of the nerves was implemented for 15 min. to mimic the EMG activity patterns of ankle extensor muscles of a rat walking 1.5 mph. The rats were bled by cardiac puncture and their anterior pituitaries collected. Pituitary and plasma bioactive (BGH) and immunoactive (IGH) GH were measured by bioassay and RIA.
NASA Astrophysics Data System (ADS)
Furr-Holden, D.
2017-12-01
Flint, MI has experienced a recent, man-made public health crisis. The Flint Water Crisis, caused by a switch in the municipal water supply and subsequent violation of engineering and regulatory standards to ensure water quality lead to a large portion of the city being exposed to excess metals (including lead), bacteria and other water-borne pathogens. The data used to initially rebut the existence of the crisis were ecologically flawed as they included large numbers of people who were not on the Flint water supply. Policy-makers, municipal officials, the medical community, and public health professionals were at odds over the existence of a problem and the lack of data only fueled the debate. Pediatricians, lead by Dr. Mona Hannah-Attisha, began testing children in the Hurley Children's Medical Center for blood-lead levels and observed a 2-fold increase in elevated blood lead levels in Flint children compared to children in the area not on the Flint municipal water supply, where no increases in elevated lead were observed. Subsequent geospatial analyses revealed spatial clustering of cases based on where children live, go to school and play. These data represented the first step in data driven decision making leading to the subsequent switch of the municipal water supply and launch of subsequent advocacy efforts to remediate the effect of the Water Crisis. Since that time, a multi-disciplinary team of scientists including engineers, bench scientists, physicians and public health researchers have mounted evidence to promote complete replacement of the city's aging water infrastructure, developed a data registry to track cases and coordinate care and services for affected residents, and implemented a community engagement model that puts residents and community stakeholders at the heart of the planning and implementation efforts. The presentation will include data used at various stages to mount a public health response to the Flint Water Crisis and establish the link between data-driven decisions and subsequent policies to mediate long term consequences.
NASA Astrophysics Data System (ADS)
Amerimehr, Ali; Hadain Dehkordi, Massoud
2018-03-01
We analyze the security of a quantum secure direct communication and authentication protocol based on single photons. We first give an impersonation attack on the protocol. The cryptanalysis shows that there is a gap in the authentication procedure of the protocol so that an opponent can reveal the secret information by an undetectable attempt. We then propose an improvement for the protocol and show it closes the gap by applying a mutual authentication procedure. In the improved protocol single photons are transmitted once in a session, so it is easy to implement as the primary protocol. Furthermore, we use a novel technique for secret order rearrangement of photons by which not only quantum storage is eliminated also a secret key can be reused securely. So the new protocol is applicable in practical approaches like embedded system devices.
Induction of pulsatile secretion of leptin in horses following thyroidectomy.
Buff, Preston R; Messer, Nat T; Cogswell, Andria M; Wilson, David A; Johnson, Philip J; Keisler, Duane H; Ganjam, Venkataseshu K
2007-02-01
Endocrine characteristics of Quarter Horse-type mares were determined during a 68 h feed deprivation and again in the same mares following surgical thyroidectomy (THX). A crossover experimental design was implemented, in which mares received brome hay available ad libitum (FED) or were food deprived (RES) for 68 h. Blood samples were collected every 20 min for 48 h, beginning 20 h after the onset of food deprivation. Concentrations of triiodothyronine and thyroxine were undetectable post-THX. Plasma concentrations of thyrotropin were greater post-THX versus pre-THX (P<0 x 001). Plasma concentrations of leptin were greater in the THX FED group than in the THX RES group (P<0 x 01). The existence of leptin pulse secretion was found only in post-THX compared with the same horses pre-THX (P=0 x 02). We theorize that non-pulsatile secretion of leptin may have contributed to the survival of this species, as it evolved in the regions of seasonal availability of food. Lack of pulsatile secretion of leptin may contribute to the accumulation of energy stores by modulating leptin sensitivity.
NASA Astrophysics Data System (ADS)
Rafiq Abuturab, Muhammad
2018-01-01
A new asymmetric multiple information cryptosystem based on chaotic spiral phase mask (CSPM) and random spectrum decomposition is put forwarded. In the proposed system, each channel of secret color image is first modulated with a CSPM and then gyrator transformed. The gyrator spectrum is randomly divided into two complex-valued masks. The same procedure is applied to multiple secret images to get their corresponding first and second complex-valued masks. Finally, first and second masks of each channel are independently added to produce first and second complex ciphertexts, respectively. The main feature of the proposed method is the different secret images encrypted by different CSPMs using different parameters as the sensitive decryption/private keys which are completely unknown to unauthorized users. Consequently, the proposed system would be resistant to potential attacks. Moreover, the CSPMs are easier to position in the decoding process owing to their own centering mark on axis focal ring. The retrieved secret images are free from cross-talk noise effects. The decryption process can be implemented by optical experiment. Numerical simulation results demonstrate the viability and security of the proposed method.
Mortensen, Stig B; Klim, Søren; Dammann, Bernd; Kristensen, Niels R; Madsen, Henrik; Overgaard, Rune V
2007-10-01
The non-linear mixed-effects model based on stochastic differential equations (SDEs) provides an attractive residual error model, that is able to handle serially correlated residuals typically arising from structural mis-specification of the true underlying model. The use of SDEs also opens up for new tools for model development and easily allows for tracking of unknown inputs and parameters over time. An algorithm for maximum likelihood estimation of the model has earlier been proposed, and the present paper presents the first general implementation of this algorithm. The implementation is done in Matlab and also demonstrates the use of parallel computing for improved estimation times. The use of the implementation is illustrated by two examples of application which focus on the ability of the model to estimate unknown inputs facilitated by the extension to SDEs. The first application is a deconvolution-type estimation of the insulin secretion rate based on a linear two-compartment model for C-peptide measurements. In the second application the model is extended to also give an estimate of the time varying liver extraction based on both C-peptide and insulin measurements.
Image communication scheme based on dynamic visual cryptography and computer generated holography
NASA Astrophysics Data System (ADS)
Palevicius, Paulius; Ragulskis, Minvydas
2015-01-01
Computer generated holograms are often exploited to implement optical encryption schemes. This paper proposes the integration of dynamic visual cryptography (an optical technique based on the interplay of visual cryptography and time-averaging geometric moiré) with Gerchberg-Saxton algorithm. A stochastic moiré grating is used to embed the secret into a single cover image. The secret can be visually decoded by a naked eye if only the amplitude of harmonic oscillations corresponds to an accurately preselected value. The proposed visual image encryption scheme is based on computer generated holography, optical time-averaging moiré and principles of dynamic visual cryptography. Dynamic visual cryptography is used both for the initial encryption of the secret image and for the final decryption. Phase data of the encrypted image are computed by using Gerchberg-Saxton algorithm. The optical image is decrypted using the computationally reconstructed field of amplitudes.
Deterministic secure quantum communication using a single d-level system.
Jiang, Dong; Chen, Yuanyuan; Gu, Xuemei; Xie, Ling; Chen, Lijun
2017-03-22
Deterministic secure quantum communication (DSQC) can transmit secret messages between two parties without first generating a shared secret key. Compared with quantum key distribution (QKD), DSQC avoids the waste of qubits arising from basis reconciliation and thus reaches higher efficiency. In this paper, based on data block transmission and order rearrangement technologies, we propose a DSQC protocol. It utilizes a set of single d-level systems as message carriers, which are used to directly encode the secret message in one communication process. Theoretical analysis shows that these employed technologies guarantee the security, and the use of a higher dimensional quantum system makes our protocol achieve higher security and efficiency. Since only quantum memory is required for implementation, our protocol is feasible with current technologies. Furthermore, Trojan horse attack (THA) is taken into account in our protocol. We give a THA model and show that THA significantly increases the multi-photon rate and can thus be detected.
Liu, Peter Y; Pincus, Steven M; Keenan, Daniel M; Roelfsema, Ferdinand; Veldhuis, Johannes D
2005-02-01
The hypothalamo-pituitary-testicular and hypothalamo-pituitary-adrenal axes are prototypical coupled neuroendocrine systems. In the present study, we contrasted in vivo linkages within and between these two axes using methods without linearity assumptions. We examined 11 young (21-31 yr) and 8 older (62-74 yr) men who underwent frequent (every 2.5 min) blood sampling overnight for paired measurement of LH and testosterone and 35 adults (17 women and 18 men; 26-77 yr old) who underwent adrenocorticotropic hormone (ACTH) and cortisol measurements every 10 min for 24 h. To mirror physiological interactions, hormone secretion was first deconvolved from serial concentrations with a waveform-independent biexponential elimination model. Feedforward synchrony, feedback synchrony, and the difference in feedforward-feedback synchrony were quantified by the cross-approximate entropy (X-ApEn) statistic. These were applied in a forward (LH concentration template, examining pattern recurrence in testosterone secretion), reverse (testosterone concentration template, examining pattern recurrence in LH secretion), and differential (forward minus reverse) manner, respectively. Analogous concentration-secretion X-ApEn estimates were calculated from ACTH-cortisol pairs. X-ApEn, a scale- and model-independent measure of pattern reproducibility, disclosed 1) greater testosterone-LH feedback coordination than LH-testosterone feedforward synchrony in healthy men and significant and symmetric erosion of both feedforward and feedback linkages with aging; 2) more synchronous ACTH concentration-dependent feedforward than feedback drive of cortisol secretion, independent of gender and age; and 3) enhanced detection of bidirectional physiological regulation by in vivo pairwise concentration-secretion compared with concentration-concentration analyses. The linking of relevant biological input to output signals and vice versa should be useful in the dissection of the reciprocal control of neuroendocrine systems or even in the analysis of other nonendocrine networks.
NASA Astrophysics Data System (ADS)
Coleman, D. F.; Ten Brink, U. S.; Armstrong, R.; Chaytor, J. D.; Demopoulos, A. W.
2013-12-01
During October 2013, an ocean exploration project took place off the coast of Puerto Rico and the Virgin Islands. This project, a collaborative effort between the Ocean Exploration Trust, the US Geological Survey, the University of Puerto Rico at Mayaguez, the University of Rhode Island, and NOAA, was aimed at exploring regions of the US exclusive economic zone (EEZ) south of the Puerto Rico Trench axis, and north of Mona Island, Puerto Rico, and the US and British Virgin Islands, and portions of the Anegada Passage. The research vessel E/V Nautilus and the Hercules/Argus ROV system were used to expand the multibeam sonar bathymetric data coverage of the region, collect high definition video footage of seafloor features, and to collect biological and geological samples along selected transects. Particular areas of interest for targeted ROV dives included: the region where a large M7.2 1918 earthquake produced a tsunami that struck northwestern corner of Puerto Rico; a transect up the vertical wall of the Mona Rift (4000 to 1500 m depth); transects along the Septentrional fault system; dives in areas of suspected fluid flow through faults, fissures, and offshore Karst systems associated with the tilted carbonate platform north of Puerto Rico; dives in the Anegada Passage at the entry points for surface Atlantic waters that circulate into the Caribbean; and in regions to investigate and date sedimentary features offset by fault motion and potential tsunamigenic landslides. Biological sampling of many deep-sea benthic organisms (including deep water corals) have never been attempted before in this area. These samples are being used to understand more about the diversity, population dynamics, genetics, and habitat connectivity of these communities, and to provide an age constraint for disturbed sedimentary features. Until this cruise, the location and distribution of deep coral habitats in the US Caribbean was largely unknown. The available information on benthic communities associated with deep coral ecosystems in this region was mostly limited to taxonomic listings from incidental collections by fish traps, shrimp trawls and coral entanglement devices. We present the results of the first direct observations and sampling of these ecosystems.
A Novel Image Encryption Algorithm Based on DNA Subsequence Operation
Zhang, Qiang; Xue, Xianglian; Wei, Xiaopeng
2012-01-01
We present a novel image encryption algorithm based on DNA subsequence operation. Different from the traditional DNA encryption methods, our algorithm does not use complex biological operation but just uses the idea of DNA subsequence operations (such as elongation operation, truncation operation, deletion operation, etc.) combining with the logistic chaotic map to scramble the location and the value of pixel points from the image. The experimental results and security analysis show that the proposed algorithm is easy to be implemented, can get good encryption effect, has a wide secret key's space, strong sensitivity to secret key, and has the abilities of resisting exhaustive attack and statistic attack. PMID:23093912
32 CFR 2400.29 - Accountability and control.
Code of Federal Regulations, 2010 CFR
2010-07-01
....29 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY... serve as Top Secret Control Officer (TSCO) for the Office of Science and Technology Policy and will be...
32 CFR 2400.29 - Accountability and control.
Code of Federal Regulations, 2011 CFR
2011-07-01
....29 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY... serve as Top Secret Control Officer (TSCO) for the Office of Science and Technology Policy and will be...
32 CFR 2400.29 - Accountability and control.
Code of Federal Regulations, 2012 CFR
2012-07-01
....29 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY... serve as Top Secret Control Officer (TSCO) for the Office of Science and Technology Policy and will be...
32 CFR 2400.29 - Accountability and control.
Code of Federal Regulations, 2013 CFR
2013-07-01
....29 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY... serve as Top Secret Control Officer (TSCO) for the Office of Science and Technology Policy and will be...
32 CFR 2400.29 - Accountability and control.
Code of Federal Regulations, 2014 CFR
2014-07-01
....29 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY... serve as Top Secret Control Officer (TSCO) for the Office of Science and Technology Policy and will be...
Search for unbound nuclides and beam/fragment optics with the MoNA/LISA segmented target at NSCL
NASA Astrophysics Data System (ADS)
Gueye, Paul; Frank, Nathan; Thoennessen, Michael; Redpath, Thomas; MoNA Collaboration
2017-09-01
A multi-layered Si/Be segmented target consisting of three 700 mg/cm2 thick Be9 slabs and four 140 microns Si detectors was used by the MoNA Collaboration at the National Superconducting Cyclotron Laboratory of Michigan State University to study the O26 lifetime. This target provides unprecedented information on the incident beams and fragments (energy loss and position), thus allowing for better determination of the incident and outgoing energies and momenta of the detected particles compare to previous experiments conducted at this facility. With the availability of a newly developed Geant4 Monte Carlo simulation of the full N2 vault, we will present and discuss the performances of this target. Search for unbound nuclides and beam/fragment optics with the MoNA/LISA segmented target at NSCL.
Rigor Made Easy: Getting Started
ERIC Educational Resources Information Center
Blackburn, Barbara R.
2012-01-01
Bestselling author and noted rigor expert Barbara Blackburn shares the secrets to getting started, maintaining momentum, and reaching your goals. Learn what rigor looks like in the classroom, understand what it means for your students, and get the keys to successful implementation. Learn how to use rigor to raise expectations, provide appropriate…
NASA Astrophysics Data System (ADS)
Hughes, Richard
2004-05-01
Quantum key distribution (QKD) uses single-photon communications to generate the shared, secret random number sequences that are used to encrypt and decrypt secret communications. The unconditional security of QKD is based on the interplay between fundamental principles of quantum physics and information theory. An adversary can neither successfully tap the transmissions, nor evade detection (eavesdropping raises the key error rate above a threshold value). QKD could be particularly attractive for free-space optical communications, both ground-based and for satellites. I will describe a QKD experiment performed over multi-kilometer line-of-sight paths, which serves as a model for a satellite-to-ground key distribution system. The system uses single-photon polarization states, without active polarization switching, and for the first time implements the complete BB84 QKD protocol including, reconciliation, privacy amplification and the all-important authentication stage. It is capable of continuous operation throughout the day and night, achieving the self-sustaining production of error-free, shared, secret bits. I will also report on the results of satellite-to-ground QKD modeling.
Deterministic secure quantum communication using a single d-level system
Jiang, Dong; Chen, Yuanyuan; Gu, Xuemei; Xie, Ling; Chen, Lijun
2017-01-01
Deterministic secure quantum communication (DSQC) can transmit secret messages between two parties without first generating a shared secret key. Compared with quantum key distribution (QKD), DSQC avoids the waste of qubits arising from basis reconciliation and thus reaches higher efficiency. In this paper, based on data block transmission and order rearrangement technologies, we propose a DSQC protocol. It utilizes a set of single d-level systems as message carriers, which are used to directly encode the secret message in one communication process. Theoretical analysis shows that these employed technologies guarantee the security, and the use of a higher dimensional quantum system makes our protocol achieve higher security and efficiency. Since only quantum memory is required for implementation, our protocol is feasible with current technologies. Furthermore, Trojan horse attack (THA) is taken into account in our protocol. We give a THA model and show that THA significantly increases the multi-photon rate and can thus be detected. PMID:28327557
Measurement-Device-Independent Quantum Cryptography
NASA Astrophysics Data System (ADS)
Tang, Zhiyuan
Quantum key distribution (QKD) enables two legitimate parties to share a secret key even in the presence of an eavesdropper. The unconditional security of QKD is based on the fundamental laws of quantum physics. Original security proofs of QKD are based on a few assumptions, e.g., perfect single photon sources and perfect single-photon detectors. However, practical implementations of QKD systems do not fully comply with such assumptions due to technical limitations. The gap between theory and implementations leads to security loopholes in most QKD systems, and several attacks have been launched on sophisticated QKD systems. Particularly, the detectors have been found to be the most vulnerable part of QKD. Much effort has been put to build side-channel-free QKD systems. Solutions such as security patches and device-independent QKD have been proposed. However, the former are normally ad-hoc, and cannot close unidentified loopholes. The latter, while having the advantages of removing all assumptions on devices, is impractical to implement today. Measurement-device-independent QKD (MDI-QKD) turns out to be a promising solution to the security problem of QKD. In MDI-QKD, all security loopholes, including those yet-to-be discovered, have been removed from the detectors, the most critical part in QKD. In this thesis, we investigate issues related to the practical implementation and security of MDI-QKD. We first present a demonstration of polarization-encoding MDI-QKD. Taking finite key effect into account, we achieve a secret key rate of 0.005 bit per second (bps) over 10 km spooled telecom fiber, and a 1600-bit key is distributed. This work, together with other demonstrations, shows the practicality of MDI-QKD. Next we investigate a critical assumption of MDI-QKD: perfect state preparation. We apply the loss-tolerant QKD protocol and adapt it to MDI-QKD to quantify information leakage due to imperfect state preparation. We then present an experimental demonstration of MDI-QKD over 10 km and 40 km of spooled fiber, which for the first time considers the impact of inaccurate polarization state preparation on the secret key rate. This would not have been possible under previous security proofs, given the same amount of state preparation flaws.
School-Based Early Childhood Centers: Secrets of Success from Early Innovators.
ERIC Educational Resources Information Center
Jewett, Janet L.; Katzev, Aphra
School-based early childhood centers have the potential for responding effectively to a broad range of child and family needs and to society's demands for more effective schools. They have four defining features: (1) implementation of quality programs and developmentally appropriate practices for young children through age eight; (2) families as…
Launching a Wireless Laptop Program
ERIC Educational Resources Information Center
Grignano, Domenic
2007-01-01
In this article, the author, as a technology director for East Rock Magnet School in New Haven, Connecticut, a federal government test site for laptop learning, shares his secrets to a successful implementation of a wireless laptop program: (1) Build a wireless foundation; (2) Do not choose the cheapest model just because of budget; (3) A sturdy…
13 Tips for Virtual World Teaching
ERIC Educational Resources Information Center
Villano, Matt
2008-01-01
Multi-user virtual environments (MUVEs) are gaining momentum as the latest and greatest learning tool in the world of education technology. How does one get started with them? How do they work? This article shares 13 secrets from immersive education experts and educators on how to have success in implementing these new tools and technologies on…
Fractal assembly of micrometre-scale DNA origami arrays with arbitrary patterns.
Tikhomirov, Grigory; Petersen, Philip; Qian, Lulu
2017-12-06
Self-assembled DNA nanostructures enable nanometre-precise patterning that can be used to create programmable molecular machines and arrays of functional materials. DNA origami is particularly versatile in this context because each DNA strand in the origami nanostructure occupies a unique position and can serve as a uniquely addressable pixel. However, the scale of such structures has been limited to about 0.05 square micrometres, hindering applications that demand a larger layout and integration with more conventional patterning methods. Hierarchical multistage assembly of simple sets of tiles can in principle overcome this limitation, but so far has not been sufficiently robust to enable successful implementation of larger structures using DNA origami tiles. Here we show that by using simple local assembly rules that are modified and applied recursively throughout a hierarchical, multistage assembly process, a small and constant set of unique DNA strands can be used to create DNA origami arrays of increasing size and with arbitrary patterns. We illustrate this method, which we term 'fractal assembly', by producing DNA origami arrays with sizes of up to 0.5 square micrometres and with up to 8,704 pixels, allowing us to render images such as the Mona Lisa and a rooster. We find that self-assembly of the tiles into arrays is unaffected by changes in surface patterns on the tiles, and that the yield of the fractal assembly process corresponds to about 0.95 m - 1 for arrays containing m tiles. When used in conjunction with a software tool that we developed that converts an arbitrary pattern into DNA sequences and experimental protocols, our assembly method is readily accessible and will facilitate the construction of sophisticated materials and devices with sizes similar to that of a bacterium using DNA nanostructures.
Fractal assembly of micrometre-scale DNA origami arrays with arbitrary patterns
NASA Astrophysics Data System (ADS)
Tikhomirov, Grigory; Petersen, Philip; Qian, Lulu
2017-12-01
Self-assembled DNA nanostructures enable nanometre-precise patterning that can be used to create programmable molecular machines and arrays of functional materials. DNA origami is particularly versatile in this context because each DNA strand in the origami nanostructure occupies a unique position and can serve as a uniquely addressable pixel. However, the scale of such structures has been limited to about 0.05 square micrometres, hindering applications that demand a larger layout and integration with more conventional patterning methods. Hierarchical multistage assembly of simple sets of tiles can in principle overcome this limitation, but so far has not been sufficiently robust to enable successful implementation of larger structures using DNA origami tiles. Here we show that by using simple local assembly rules that are modified and applied recursively throughout a hierarchical, multistage assembly process, a small and constant set of unique DNA strands can be used to create DNA origami arrays of increasing size and with arbitrary patterns. We illustrate this method, which we term ‘fractal assembly’, by producing DNA origami arrays with sizes of up to 0.5 square micrometres and with up to 8,704 pixels, allowing us to render images such as the Mona Lisa and a rooster. We find that self-assembly of the tiles into arrays is unaffected by changes in surface patterns on the tiles, and that the yield of the fractal assembly process corresponds to about 0.95m - 1 for arrays containing m tiles. When used in conjunction with a software tool that we developed that converts an arbitrary pattern into DNA sequences and experimental protocols, our assembly method is readily accessible and will facilitate the construction of sophisticated materials and devices with sizes similar to that of a bacterium using DNA nanostructures.
Controlled Chemical Patterns with ThermoChemical NanoLithography (TCNL)
NASA Astrophysics Data System (ADS)
Carroll, Keith; Giordano, Anthony; Wang, Debin; Kodali, Vamsi; King, W. P.; Marder, S. R.; Riedo, E.; Curtis, J. E.
2012-02-01
Many research areas, both fundamental and applied, rely upon the ability to organize non-trivial assemblies of molecules on surfaces. In this work, we introduce a significant extension of ThermoChemical NanoLithography (TCNL), a high throughput chemical patterning technique that uses temperature-driven chemical reactions localized near the tip of a thermal cantilever. By combining a chemical kinetics based model with experiments, we have developed a protocol for varying the concentration of surface bound molecules. The result is an unprecedented ability to fabricate extremely complex patterns comprised of varying chemical concentrations, as demonstrated by sinusoidal patterns of amine groups with varying pitches (˜5-15 μm) and the replication of Leonardo da Vinci's Mona Lisa with dimensions of ˜30 x 40 μm^2. Programmed control of the chemical reaction rate should have widespread applications for a technique which has already been shown to nanopattern various substrates including graphene nanowires, piezoelectric crystals, and optoelectronic materials.
The Road from Rio to Johannesburg: Where Are the Footpaths to/from Science Education?
ERIC Educational Resources Information Center
Kyle, William C.
2006-01-01
When the United Nations General Assembly authorized holding the World Summit on Sustainable Development (WSSD) in Johannesburg, it was hardly a secret--or even a point in dispute--that progress in implementing sustainable development had been disappointing since the 1992 Earth Summit in Rio de Janeiro. With poverty deepening and environmental…
Unlocking the Secrets of Complex Text
ERIC Educational Resources Information Center
Ehrenworth, Mary
2013-01-01
"Our job is to instill in students a deep sense of engagement with the intricacies of complex texts, to rouse them to see more in the texts they read--and to do this in a way that makes them want to read more," writes Mary Ehrenworth. A tall order--but Ehrenworth presents specific close reading practices that teachers can implement to…
Neotectonics of Puerto Rico and the Virgin Islands, northeastern Caribbean, from GPS geodesy
NASA Astrophysics Data System (ADS)
Jansma, Pamela E.; Mattioli, Glen S.; Lopez, Alberto; Demets, Charles; Dixon, Timothy H.; Mann, Paul; Calais, Eric
2000-12-01
The boundary between the North American and Caribbean plates is characterized primarily by left-lateral motion along predominantly east-west striking faults. Seismicity and marine geophysical survey data are consistent with at least two, and possibly three, microplates in the diffuse boundary zone in the northeastern Caribbean: (1) the Gonave, (2) the Hispaniola, and (3) the Puerto Rico-northern Virgin Islands (PRVI). We discuss results from GPS geodetic measurements acquired since 1994 to test the microplate hypothesis, define PRVI translation and rotation within the boundary zone, and constrain PRVI neotectonics. GPS-derived velocities are analyzed with respect to both North American and Caribbean plate reference frames. Integrated displacements across PRVI are limited to a few millimeters per year, consistent with a rigid PRVI and permitting calculation of an average velocity for PRVI. The motions of PRVI relative to North America and the Caribbean are 16.9±1.1 mm/yr toward N68°E±3° (1σ) and 2.4±1.4 mm/yr toward S79°W±26° (1σ), respectively. In contrast with some recent models, ongoing rotation of PRVI about a nearby (< 25° distant) vertical axis is not supported by the geodetic data. In addition, we argue against eastward tectonic escape of PRVI and favor a simple, progressive increase in velocity across the plate boundary zone, requiring that the summed magnitude of strike-slip fault slip rates will equal the total plate motion rate between the Caribbean and North America. GPS data are consistent with components of left-lateral strike-slip faulting along the Muertos trough south of Puerto Rico and shortening across the Puerto Rico trench. Comparison of GPS velocities for PRVI with respect to North America with total North America-Caribbean relative motion suggests up to 85% of North American-Caribbean plate motion is accommodated by the Puerto Rico trench and offshore faults north of Puerto Rico. Differences in GPS-derived velocities from Hispaniola and PRVI yield east-west extension across the N-S trending Mona rift of a few millimeters per year when estimated elastic strain accumulation effects along the north Hispaniola deformed belt and the Septentrional fault zone are considered. The opening rate implies an age of the Mona rift of 2-3 million years, agreeing with marine geophysical data that support a young age for the structure.
Engineering Exosomes for Cancer Therapy.
Gilligan, Katie E; Dwyer, Róisín M
2017-05-24
There remains an urgent need for novel therapeutic strategies to treat metastatic cancer, which results in over 8 million deaths annually worldwide. Following secretion, exosomes are naturally taken up by cells, and capable of the stable transfer of drugs, therapeutic microRNAs and proteins. As knowledge of the biogenesis, release and uptake of exosomes continues to evolve, and thus also has interest in these extracellular vesicles as potential tumor-targeted vehicles for cancer therapy. The ability to engineer exosome content and migratory itinerary holds tremendous promise. Studies to date have employed viral and non-viral methods to engineer the parent cells to secrete modified exosomes, or alternatively, to directly manipulate exosome content following secretion. The majority of studies have demonstrated promising results, with decreased tumor cell invasion, migration and proliferation, along with enhanced immune response, cell death, and sensitivity to chemotherapy observed. The studies outlined in this review highlight the exciting potential for exosomes as therapeutic vehicles for cancer treatment. Successful implementation in the clinical setting will be dependent upon establishment of rigorous standards for exosome manipulation, isolation, and characterisation.
Edmands, William M B; Petrick, Lauren; Barupal, Dinesh K; Scalbert, Augustin; Wilson, Mark J; Wickliffe, Jeffrey K; Rappaport, Stephen M
2017-04-04
A long-standing challenge of untargeted metabolomic profiling by ultrahigh-performance liquid chromatography-high-resolution mass spectrometry (UHPLC-HRMS) is efficient transition from unknown mass spectral features to confident metabolite annotations. The compMS 2 Miner (Comprehensive MS 2 Miner) package was developed in the R language to facilitate rapid, comprehensive feature annotation using a peak-picker-output and MS 2 data files as inputs. The number of MS 2 spectra that can be collected during a metabolomic profiling experiment far outweigh the amount of time required for pain-staking manual interpretation; therefore, a degree of software workflow autonomy is required for broad-scale metabolite annotation. CompMS 2 Miner integrates many useful tools in a single workflow for metabolite annotation and also provides a means to overview the MS 2 data with a Web application GUI compMS 2 Explorer (Comprehensive MS 2 Explorer) that also facilitates data-sharing and transparency. The automatable compMS 2 Miner workflow consists of the following steps: (i) matching unknown MS 1 features to precursor MS 2 scans, (ii) filtration of spectral noise (dynamic noise filter), (iii) generation of composite mass spectra by multiple similar spectrum signal summation and redundant/contaminant spectra removal, (iv) interpretation of possible fragment ion substructure using an internal database, (v) annotation of unknowns with chemical and spectral databases with prediction of mammalian biotransformation metabolites, wrapper functions for in silico fragmentation software, nearest neighbor chemical similarity scoring, random forest based retention time prediction, text-mining based false positive removal/true positive ranking, chemical taxonomic prediction and differential evolution based global annotation score optimization, and (vi) network graph visualizations, data curation, and sharing are made possible via the compMS 2 Explorer application. Metabolite identities and comments can also be recorded using an interactive table within compMS 2 Explorer. The utility of the package is illustrated with a data set of blood serum samples from 7 diet induced obese (DIO) and 7 nonobese (NO) C57BL/6J mice, which were also treated with an antibiotic (streptomycin) to knockdown the gut microbiota. The results of fully autonomous and objective usage of compMS 2 Miner are presented here. All automatically annotated spectra output by the workflow are provided in the Supporting Information and can alternatively be explored as publically available compMS 2 Explorer applications for both positive and negative modes ( https://wmbedmands.shinyapps.io/compMS2_mouseSera_POS and https://wmbedmands.shinyapps.io/compMS2_mouseSera_NEG ). The workflow provided rapid annotation of a diversity of endogenous and gut microbially derived metabolites affected by both diet and antibiotic treatment, which conformed to previously published reports. Composite spectra (n = 173) were autonomously matched to entries of the Massbank of North America (MoNA) spectral repository. These experimental and virtual (lipidBlast) spectra corresponded to 29 common endogenous compound classes (e.g., 51 lysophosphatidylcholines spectra) and were then used to calculate the ranking capability of 7 individual scoring metrics. It was found that an average of the 7 individual scoring metrics provided the most effective weighted average ranking ability of 3 for the MoNA matched spectra in spite of potential risk of false positive annotations emerging from automation. Minor structural differences such as relative carbon-carbon double bond positions were found in several cases to affect the correct rank of the MoNA annotated metabolite. The latest release and an example workflow is available in the package vignette ( https://github.com/WMBEdmands/compMS2Miner ) and a version of the published application is available on the shinyapps.io site ( https://wmbedmands.shinyapps.io/compMS2Example ).
Redirecting RNA splicing by SMAD3 turns TGF-β into a tumor promoter.
Tripathi, Veenu; Zhang, Ying E
2017-01-01
Transforming growth factor β (TGF-β) is a well-known growth inhibitor of normal epithelial cells, but it is also secreted by solid tumors to promote cancer progression. Our recent discovery of SMAD3-PCBP1 complex with direct RNA-binding properties has shed light on how this conversion is implemented by controlling pre-mRNA splicing patterns.
Parameter regimes for a single sequential quantum repeater
NASA Astrophysics Data System (ADS)
Rozpędek, F.; Goodenough, K.; Ribeiro, J.; Kalb, N.; Caprara Vivoli, V.; Reiserer, A.; Hanson, R.; Wehner, S.; Elkouss, D.
2018-07-01
Quantum key distribution allows for the generation of a secret key between distant parties connected by a quantum channel such as optical fibre or free space. Unfortunately, the rate of generation of a secret key by direct transmission is fundamentally limited by the distance. This limit can be overcome by the implementation of so-called quantum repeaters. Here, we assess the performance of a specific but very natural setup called a single sequential repeater for quantum key distribution. We offer a fine-grained assessment of the repeater by introducing a series of benchmarks. The benchmarks, which should be surpassed to claim a working repeater, are based on finite-energy considerations, thermal noise and the losses in the setup. In order to boost the performance of the studied repeaters we introduce two methods. The first one corresponds to the concept of a cut-off, which reduces the effect of decoherence during the storage of a quantum state by introducing a maximum storage time. Secondly, we supplement the standard classical post-processing with an advantage distillation procedure. Using these methods, we find realistic parameters for which it is possible to achieve rates greater than each of the benchmarks, guiding the way towards implementing quantum repeaters.
Secure multi-party quantum summation based on quantum Fourier transform
NASA Astrophysics Data System (ADS)
Yang, Hui-Yi; Ye, Tian-Yu
2018-06-01
In this paper, we propose a novel secure multi-party quantum summation protocol based on quantum Fourier transform, where the traveling particles are transmitted in a tree-type mode. The party who prepares the initial quantum states is assumed to be semi-honest, which means that she may misbehave on her own but will not conspire with anyone. The proposed protocol can resist both the outside attacks and the participant attacks. Especially, one party cannot obtain other parties' private integer strings; and it is secure for the colluding attack performed by at most n - 2 parties, where n is the number of parties. In addition, the proposed protocol calculates the addition of modulo d and implements the calculation of addition in a secret-by-secret way rather than a bit-by-bit way.
Gee, Bryan M; Strickland, Jane; Thompson, Kelly; Miller, Lucy Jane
2017-01-01
The purpose of this study was to explore the effectiveness of a series of online, module-based instructional reusable learning objects (RLOs) targeted at entry-level, 1st year, Master of Occupational Therapy students. The content of the RLOs addressed knowledge and implementation of A SECRET, a parental reasoning approach for children with a sensory processing disorder, specifically sensory over responsiveness. Nine RLOs were developed and embedded within a commonly used learning management system. Participants ( n = 8) were evaluated regarding their ability to discriminate between appropriate and inappropriate A SECRET strategies using a selected-response assessment. The participants' overall average score was 68%, a positive finding given the novelty of the instruction, assessment, and the content.
Position-based quantum cryptography over untrusted networks
NASA Astrophysics Data System (ADS)
Nadeem, Muhammad
2014-08-01
In this article, we propose quantum position verification (QPV) schemes where all the channels are untrusted except the position of the prover and distant reference stations of verifiers. We review and analyze the existing QPV schemes containing some pre-shared data between the prover and verifiers. Most of these schemes are based on non-cryptographic assumptions, i.e. quantum/classical channels between the verifiers are secure. It seems impractical in an environment fully controlled by adversaries and would lead to security compromise in practical implementations. However, our proposed formula for QPV is more robust, secure and according to the standard assumptions of cryptography. Furthermore, once the position of the prover is verified, our schemes establish secret keys in parallel and can be used for authentication and secret communication between the prover and verifiers.
Neumann, Cedric; Ramotowski, Robert; Genessay, Thibault
2011-05-13
Forensic examinations of ink have been performed since the beginning of the 20th century. Since the 1960s, the International Ink Library, maintained by the United States Secret Service, has supported those analyses. Until 2009, the search and identification of inks were essentially performed manually. This paper describes the results of a project designed to improve ink samples' analytical and search processes. The project focused on the development of improved standardization procedures to ensure the best possible reproducibility between analyses run on different HPTLC plates. The successful implementation of this new calibration method enabled the development of mathematical algorithms and of a software package to complement the existing ink library. Copyright © 2010 Elsevier B.V. All rights reserved.
Hacking commercial quantum cryptography systems by tailored bright illumination
NASA Astrophysics Data System (ADS)
Lydersen, Lars; Wiechers, Carlos; Wittmann, Christoffer; Elser, Dominique; Skaar, Johannes; Makarov, Vadim
2010-10-01
The peculiar properties of quantum mechanics allow two remote parties to communicate a private, secret key, which is protected from eavesdropping by the laws of physics. So-called quantum key distribution (QKD) implementations always rely on detectors to measure the relevant quantum property of single photons. Here we demonstrate experimentally that the detectors in two commercially available QKD systems can be fully remote-controlled using specially tailored bright illumination. This makes it possible to tracelessly acquire the full secret key; we propose an eavesdropping apparatus built from off-the-shelf components. The loophole is likely to be present in most QKD systems using avalanche photodiodes to detect single photons. We believe that our findings are crucial for strengthening the security of practical QKD, by identifying and patching technological deficiencies.
Simple 2.5 GHz time-bin quantum key distribution
NASA Astrophysics Data System (ADS)
Boaron, Alberto; Korzh, Boris; Houlmann, Raphael; Boso, Gianluca; Rusca, Davide; Gray, Stuart; Li, Ming-Jun; Nolan, Daniel; Martin, Anthony; Zbinden, Hugo
2018-04-01
We present a 2.5 GHz quantum key distribution setup with the emphasis on a simple experimental realization. It features a three-state time-bin protocol based on a pulsed diode laser and a single intensity modulator. Implementing an efficient one-decoy scheme and finite-key analysis, we achieve record breaking secret key rates of 1.5 kbps over 200 km of standard optical fibers.
Gehring, Tobias; Händchen, Vitus; Duhme, Jörg; Furrer, Fabian; Franz, Torsten; Pacher, Christoph; Werner, Reinhard F; Schnabel, Roman
2015-10-30
Secret communication over public channels is one of the central pillars of a modern information society. Using quantum key distribution this is achieved without relying on the hardness of mathematical problems, which might be compromised by improved algorithms or by future quantum computers. State-of-the-art quantum key distribution requires composable security against coherent attacks for a finite number of distributed quantum states as well as robustness against implementation side channels. Here we present an implementation of continuous-variable quantum key distribution satisfying these requirements. Our implementation is based on the distribution of continuous-variable Einstein-Podolsky-Rosen entangled light. It is one-sided device independent, which means the security of the generated key is independent of any memoryfree attacks on the remote detector. Since continuous-variable encoding is compatible with conventional optical communication technology, our work is a step towards practical implementations of quantum key distribution with state-of-the-art security based solely on telecom components.
Gehring, Tobias; Händchen, Vitus; Duhme, Jörg; Furrer, Fabian; Franz, Torsten; Pacher, Christoph; Werner, Reinhard F.; Schnabel, Roman
2015-01-01
Secret communication over public channels is one of the central pillars of a modern information society. Using quantum key distribution this is achieved without relying on the hardness of mathematical problems, which might be compromised by improved algorithms or by future quantum computers. State-of-the-art quantum key distribution requires composable security against coherent attacks for a finite number of distributed quantum states as well as robustness against implementation side channels. Here we present an implementation of continuous-variable quantum key distribution satisfying these requirements. Our implementation is based on the distribution of continuous-variable Einstein–Podolsky–Rosen entangled light. It is one-sided device independent, which means the security of the generated key is independent of any memoryfree attacks on the remote detector. Since continuous-variable encoding is compatible with conventional optical communication technology, our work is a step towards practical implementations of quantum key distribution with state-of-the-art security based solely on telecom components. PMID:26514280
Side-channel-free quantum key distribution.
Braunstein, Samuel L; Pirandola, Stefano
2012-03-30
Quantum key distribution (QKD) offers the promise of absolutely secure communications. However, proofs of absolute security often assume perfect implementation from theory to experiment. Thus, existing systems may be prone to insidious side-channel attacks that rely on flaws in experimental implementation. Here we replace all real channels with virtual channels in a QKD protocol, making the relevant detectors and settings inside private spaces inaccessible while simultaneously acting as a Hilbert space filter to eliminate side-channel attacks. By using a quantum memory we find that we are able to bound the secret-key rate below by the entanglement-distillation rate computed over the distributed states.
Achieving Learning Objectives through E-Voting Case Studies
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bishop, Matt; Frincke, Deb
2007-01-01
The recent explosion in the use of electronic voting machines provides a wonderful opportunity to teach students about computer security. Because voting is the cornerstone of any democracy or republic, the need for secure voting systems is obvious. Further, students are familiar with how to vote. But the complexity of mapping a traditional process of voting using secret ballots to an electronic environment shows the difficulties of implementing secure processes and systems. In this article, we show a high level mapping from selected security and privacy education outcomes into a target ‘case study’ of developing electronic voting machines intended formore » traditional secret ballot elections. Our intent is to motivate both a set of lessons specifically involving e-voting, as well as illustrating the usefulness of having a mapping from outcomes to simplified case studies.« less
Ges, Igor A; Brindley, Rebecca L; Currie, Kevin P M; Baudenbacher, Franz J
2013-12-07
Release of neurotransmitters and hormones by calcium-regulated exocytosis is a fundamental cellular process that is disrupted in a variety of psychiatric, neurological, and endocrine disorders. As such, there is significant interest in targeting neurosecretion for drug and therapeutic development, efforts that will be aided by novel analytical tools and devices that provide mechanistic insight coupled with increased experimental throughput. Here, we report a simple, inexpensive, reusable, microfluidic device designed to analyze catecholamine secretion from small populations of adrenal chromaffin cells in real time, an important neuroendocrine component of the sympathetic nervous system and versatile neurosecretory model. The device is fabricated by replica molding of polydimethylsiloxane (PDMS) using patterned photoresist on silicon wafer as the master. Microfluidic inlet channels lead to an array of U-shaped "cell traps", each capable of immobilizing single or small groups of chromaffin cells. The bottom of the device is a glass slide with patterned thin film platinum electrodes used for electrochemical detection of catecholamines in real time. We demonstrate reliable loading of the device with small populations of chromaffin cells, and perfusion/repetitive stimulation with physiologically relevant secretagogues (carbachol, PACAP, KCl) using the microfluidic network. Evoked catecholamine secretion was reproducible over multiple rounds of stimulation, and graded as expected to different concentrations of secretagogue or removal of extracellular calcium. Overall, we show this microfluidic device can be used to implement complex stimulation paradigms and analyze the amount and kinetics of catecholamine secretion from small populations of neuroendocrine cells in real time.
Mosquera, M.; Geribàs, N.; Bargalló, A.; Llorente, M.; Riba, D.
2012-01-01
Clear hand laterality patterns in humans are widely accepted. However, humans only elicit a significant hand laterality pattern when performing complementary role differentiation (CRD) tasks. Meanwhile, hand laterality in chimpanzees is weaker and controversial. Here we have reevaluated our results on hand laterality in chimpanzees housed in naturalistic environments at Fundació Mona (Spain) and Chimfunshi Wild Orphanage (Zambia). Our results show that the difference between hand laterality in humans and chimpanzees is not as great as once thought. Furthermore, we found a link between hand laterality and task complexity and also an even more interesting connection: CRD tasks elicited not only the hand laterality but also the use of tools. This paper aims to turn attention to the importance of this threefold connection in human evolution: the link between CRD tasks, hand laterality, and tool use, which has important evolutionary implications that may explain the development of complex behaviour in early hominins. PMID:22550466
Mosquera, M; Geribàs, N; Bargalló, A; Llorente, M; Riba, D
2012-01-01
Clear hand laterality patterns in humans are widely accepted. However, humans only elicit a significant hand laterality pattern when performing complementary role differentiation (CRD) tasks. Meanwhile, hand laterality in chimpanzees is weaker and controversial. Here we have reevaluated our results on hand laterality in chimpanzees housed in naturalistic environments at Fundació Mona (Spain) and Chimfunshi Wild Orphanage (Zambia). Our results show that the difference between hand laterality in humans and chimpanzees is not as great as once thought. Furthermore, we found a link between hand laterality and task complexity and also an even more interesting connection: CRD tasks elicited not only the hand laterality but also the use of tools. This paper aims to turn attention to the importance of this threefold connection in human evolution: the link between CRD tasks, hand laterality, and tool use, which has important evolutionary implications that may explain the development of complex behaviour in early hominins.
Extension and transtension in the plate boundary zone of the northeastern Caribbean
DOE Office of Scientific and Technical Information (OSTI.GOV)
Speed, R.C.; Larue, D.K.
1991-03-01
The authors propose that the Caribbean (Ca)-North American (NA) plate boundary zone (pbz) from the Puerto Rico Trench to the Venezuelan Basin from Mona Canyon east has been in left-transtension over the last 15-20 ma. A boundary-normal component of extension occurs throughout the pbz and is a principal cause of the Puerto Rico Trench. Such extension is due to WNW velocity of NA-Ca and the northward pullaway of NA from its S-dipping slab, which is below Puerto Rico. Strike slip motion may be taken up among terranes in the pbz by rigid CCW rotation and by oblique slip at theirmore » boundaries. Rotation of the largest terrane, Puerto Rico-Virgin Islands (PRVI), has caused such major structures as the Muertos thrust and Anegada Passage. The model implies NA-Ca velocity estimated from Cayman transforms is more accurate than that from slip vectors from seisms in the NA slab.« less
2012-08-20
CAPE CANAVERAL, Fla. - A mission science briefing was held at NASA Kennedy Space Center’s Press Site in Florida for the Radiation Belt Storm Probes, or RBSP, mission. From left, are George Diller, public affairs specialist and news conference moderator, Mona Kessel, RBSP program scientist from NASA Headquarters in Washington, Nicola Fox, RBSP deputy project scientist at Johns Hopkins Applied Physics Laboratory in Laurel, Md., Craig Kletzing, principal investigator from the University of Iowa, Harlan Spence, principal investigator from the University of New Hampshire, and Lou Lanzerotti, principal investigator from the New Jersey Institute of Technology. NASA’s RBSP mission will help us understand the sun’s influence on Earth and near-Earth space by studying the Earth’s radiation belts on various scales of space and time. RBSP will begin its mission of exploration of Earth’s Van Allen radiation belts and the extremes of space weather after its launch aboard an Atlas V rocket. Launch is targeted for Aug. 24. For more information, visit http://www.nasa.gov/rbsp. Photo credit: NASA/Glenn Benson
2012-08-20
CAPE CANAVERAL, Fla. - A mission science briefing was held at NASA Kennedy Space Center’s Press Site in Florida for the Radiation Belt Storm Probes, or RBSP, mission. From left, are George Diller, public affairs specialist and news conference moderator, Mona Kessel, RBSP program scientist from NASA Headquarters in Washington, Nicola Fox, RBSP deputy project scientist at Johns Hopkins Applied Physics Laboratory in Laurel, Md., Craig Kletzing, principal investigator from the University of Iowa, Harlan Spence, principal investigator from the University of New Hampshire, and Lou Lanzerotti, principal investigator from the New Jersey Institute of Technology. NASA’s RBSP mission will help us understand the sun’s influence on Earth and near-Earth space by studying the Earth’s radiation belts on various scales of space and time. RBSP will begin its mission of exploration of Earth’s Van Allen radiation belts and the extremes of space weather after its launch aboard an Atlas V rocket. Launch is targeted for Aug. 24. For more information, visit http://www.nasa.gov/rbsp. Photo credit: NASA/Glenn Benson
2012-08-20
CAPE CANAVERAL, Fla. - A mission science briefing was held at NASA Kennedy Space Center’s Press Site in Florida for the Radiation Belt Storm Probes, or RBSP, mission. From left, are George Diller, public affairs specialist and news conference moderator, Mona Kessel, RBSP program scientist from NASA Headquarters in Washington, Nicola Fox, RBSP deputy project scientist at Johns Hopkins Applied Physics Laboratory in Laurel, Md., Craig Kletzing, principal investigator from the University of Iowa, Harlan Spence, principal investigator from the University of New Hampshire, and Lou Lanzerotti, principal investigator from the New Jersey Institute of Technology. NASA’s RBSP mission will help us understand the sun’s influence on Earth and near-Earth space by studying the Earth’s radiation belts on various scales of space and time. RBSP will begin its mission of exploration of Earth’s Van Allen radiation belts and the extremes of space weather after its launch aboard an Atlas V rocket. Launch is targeted for Aug. 24. For more information, visit http://www.nasa.gov/rbsp. Photo credit: NASA/Glenn Benson
Simple and high-speed polarization-based QKD
NASA Astrophysics Data System (ADS)
Grünenfelder, Fadri; Boaron, Alberto; Rusca, Davide; Martin, Anthony; Zbinden, Hugo
2018-01-01
We present a simplified BB84 protocol with only three quantum states and one decoy-state level. We implement this scheme using the polarization degree of freedom at telecom wavelength. Only one pulsed laser is used in order to reduce possible side-channel attacks. The repetition rate of 625 MHz and the achieved secret bit rate of 23 bps over 200 km of standard fiber are the actual state of the art.
NASA Technical Reports Server (NTRS)
Estes, Robert D.
1998-01-01
Our TSS-1/R investigation, which we shall refer to as EMET in this report, was an integral part of the effort by the TSS-1/R Investigators' Working Group (IWG) to come to an understanding of the complex interaction between the tethered satellite system and the ionosphere. All of the space-borne experiments were designed to collect data relevant to the local interaction. Only the ground- based experiments, EMET and its Italian counterpart Observations on the Earth's Surface of Electromagnetic Emissions (OESEE), held out any hope of characterizing the long range effects of the interaction. This was to be done by detecting electromagnetic waves generated by the system in the ionosphere, assuming the signal reached the Earth's surface with sufficient amplitude. As the type of plasma waves excited to carry charge away from the charge-exchange regions of the system at each end of the tether is one of the theoretical points about which there is greatest disagreement, a definitive identification of tether-generated waves could mark significant progress in the so-called current closure problem of electrodynamic tethers. Dr. Mario Grossi of the Smithsonian Astrophysical Observatory (SAO) initiated the investigation, and his experience in the field of ULF-ELF waves and their detection was invaluable throughout its course. Rice University had the responsibility of setting up the EMET ULF-VLF ground stations under a subcontract from SAO. Principal Investigator (PI) for the Rice effort was Prof. William E. Gordon, who was primary observer at the Arecibo Observatory during TSS-LR. Dr. Steve Noble handled major day-to-day operations, training, and planning for the ground-based measurements. Dr. James McCoy of NASA JSC, a member of the Mona/Arecibo team, was pilot for the numerous flights ferrying personnel and equipment between Puerto Rico and Mona Island. Final responsibility for the measurements rested with SAO, and the activities of field personnel and SAO investigators were closely co-ordinated during the mission. Dr. Enrico Lorenzini of SAO served as the eyes, ears, and brain of EMET in the Science Operations Area and PI table during the mission, whenever the PI was absent during the round-the-clock mission operations. The Rice University final report to SAO, which is included as an Appendix, contains details of the remote sites, means of communication, sensors, etc., as well as the affiliations of personnel involved in the data-gathering effort.
Pérez Granda, M J; Barrio, J M; Hortal, J; Muñoz, P; Rincón, C; Bouza, E
2013-12-01
Aspiration of subglottic secretions (ASS) is recommended in patients requiring mechanical ventilation for ≥48h. We assessed the impact of the introduction of ASS routinely in all patients after major heart surgery in an ecological study comparing ventilator-acquired pneumonia (VAP) incidence, days of mechanical ventilation, and cost of antimicrobial agents before and after the implementation of ASS. Before and after the intervention the results (per 1000 days) were: VAP incidence, 23.92 vs 16.46 (P = 0.04); cost of antimicrobials, €71,384 vs €63,446 (P = 0.002); and days of mechanical ventilation, 507.5 vs 377.5 (P = 0.009). From the moment of induction of anaesthesia all patients undergoing major heart surgery should routinely receive ASS. Copyright © 2013 The Healthcare Infection Society. Published by Elsevier Ltd. All rights reserved.
Quantum-noise randomized data encryption for wavelength-division-multiplexed fiber-optic networks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Corndorf, Eric; Liang Chuang; Kanter, Gregory S.
2005-06-15
We demonstrate high-rate randomized data-encryption through optical fibers using the inherent quantum-measurement noise of coherent states of light. Specifically, we demonstrate 650 Mbit/s data encryption through a 10 Gbit/s data-bearing, in-line amplified 200-km-long line. In our protocol, legitimate users (who share a short secret key) communicate using an M-ry signal set while an attacker (who does not share the secret key) is forced to contend with the fundamental and irreducible quantum-measurement noise of coherent states. Implementations of our protocol using both polarization-encoded signal sets as well as polarization-insensitive phase-keyed signal sets are experimentally and theoretically evaluated. Different from the performancemore » criteria for the cryptographic objective of key generation (quantum key-generation), one possible set of performance criteria for the cryptographic objective of data encryption is established and carefully considered.« less
Authentication Based on Non-Interactive Zero-Knowledge Proofs for the Internet of Things.
Martín-Fernández, Francisco; Caballero-Gil, Pino; Caballero-Gil, Cándido
2016-01-07
This paper describes the design and analysis of a new scheme for the authenticated exchange of confidential information in insecure environments within the Internet of Things, which allows a receiver of a message to authenticate the sender and compute a secret key shared with it. The proposal is based on the concept of a non-interactive zero-knowledge proof, so that in a single communication, relevant data may be inferred to verify the legitimacy of the sender. Besides, the new scheme uses the idea under the Diffie-Hellman protocol for the establishment of a shared secret key. The proposal has been fully developed for platforms built on the Android Open Source Project, so it can be used in any device or sensor with this operating system. This work provides a performance study of the implementation and a comparison between its promising results and others obtained with similar schemes.
Authentication Based on Non-Interactive Zero-Knowledge Proofs for the Internet of Things
Martín-Fernández, Francisco; Caballero-Gil, Pino; Caballero-Gil, Cándido
2016-01-01
This paper describes the design and analysis of a new scheme for the authenticated exchange of confidential information in insecure environments within the Internet of Things, which allows a receiver of a message to authenticate the sender and compute a secret key shared with it. The proposal is based on the concept of a non-interactive zero-knowledge proof, so that in a single communication, relevant data may be inferred to verify the legitimacy of the sender. Besides, the new scheme uses the idea under the Diffie–Hellman protocol for the establishment of a shared secret key. The proposal has been fully developed for platforms built on the Android Open Source Project, so it can be used in any device or sensor with this operating system. This work provides a performance study of the implementation and a comparison between its promising results and others obtained with similar schemes. PMID:26751454
High-rate measurement-device-independent quantum cryptography
NASA Astrophysics Data System (ADS)
Pirandola, Stefano; Ottaviani, Carlo; Spedalieri, Gaetana; Weedbrook, Christian; Braunstein, Samuel L.; Lloyd, Seth; Gehring, Tobias; Jacobsen, Christian S.; Andersen, Ulrik L.
2015-06-01
Quantum cryptography achieves a formidable task—the remote distribution of secret keys by exploiting the fundamental laws of physics. Quantum cryptography is now headed towards solving the practical problem of constructing scalable and secure quantum networks. A significant step in this direction has been the introduction of measurement-device independence, where the secret key between two parties is established by the measurement of an untrusted relay. Unfortunately, although qubit-implemented protocols can reach long distances, their key rates are typically very low, unsuitable for the demands of a metropolitan network. Here we show, theoretically and experimentally, that a solution can come from the use of continuous-variable systems. We design a coherent-state network protocol able to achieve remarkably high key rates at metropolitan distances, in fact three orders of magnitude higher than those currently achieved. Our protocol could be employed to build high-rate quantum networks where devices securely connect to nearby access points or proxy servers.
Carter, Eleanor L; Duguid, Alasdair; Ercole, Ari; Matta, Basil; Burnstein, Rowan M; Veenith, Tonny
2014-03-01
Ventilation-associated pneumonia (VAP) is the commonest nosocomial infection in intensive care. Implementation of a VAP prevention care bundle is a proven method to reduce its incidence. The UK care bundle recommends maintenance of the tracheal tube cuff pressure at 20 to 30 cmH₂O with 4-hourly pressure checks and use of tracheal tubes with subglottic aspiration ports in patients admitted for more than 72 h. To evaluate the effects of tracheal tube type and cuff pressure monitoring technique on leakage of subglottic secretions past the tracheal tube cuff. Bench-top study. Laboratory. A model adult trachea with simulated subglottic secretions was intubated with a tracheal tube with the cuff inflated to 25 cmH₂O. Experiments were conducted using a Portex Profile Soft Seal tracheal tube with three cuff pressure monitoring strategies and using a Portex SACETT tracheal tube with intermittent cuff pressure checks. Rate of simulated secretion leakage past the tracheal tube cuff. Mean ± SD leakage of fluid past the Profile Soft Seal tracheal tube cuff was 2.25 ± 1.49 ml min⁻¹ with no monitoring of cuff pressure, 2.98 ± 1.63 ml min⁻¹ with intermittent cuff pressure monitoring and 3.83 ± 2.17 ml min⁻¹ with continuous cuff pressure monitoring (P <0.001). Using a SACETT tracheal tube with a subglottic aspiration port and aspirating the simulated secretions prior to intermittent cuff pressure checks reduced the leakage rate to 0.50 ± 0.48 ml min⁻¹ (P <0.001). Subglottic secretions leaked past the tracheal tube cuff with all tube types and cuff pressure monitoring strategies in this model. Significantly higher rates were observed with continuous cuff pressure monitoring and significantly lower rates were observed when using a tracheal tube with a subglottic aspiration port. Further evaluation of medical device performance is needed in order to design more effective VAP prevention strategies.
Long-distance quantum communication with atomic ensembles and linear optics.
Duan, L M; Lukin, M D; Cirac, J I; Zoller, P
2001-11-22
Quantum communication holds promise for absolutely secure transmission of secret messages and the faithful transfer of unknown quantum states. Photonic channels appear to be very attractive for the physical implementation of quantum communication. However, owing to losses and decoherence in the channel, the communication fidelity decreases exponentially with the channel length. Here we describe a scheme that allows the implementation of robust quantum communication over long lossy channels. The scheme involves laser manipulation of atomic ensembles, beam splitters, and single-photon detectors with moderate efficiencies, and is therefore compatible with current experimental technology. We show that the communication efficiency scales polynomially with the channel length, and hence the scheme should be operable over very long distances.
Entangled state quantum cryptography: eavesdropping on the ekert protocol
Naik; Peterson; White; Berglund; Kwiat
2000-05-15
Using polarization-entangled photons from spontaneous parametric down-conversion, we have implemented Ekert's quantum cryptography protocol. The near-perfect correlations of the photons allow the sharing of a secret key between two parties. The presence of an eavesdropper is continually checked by measuring Bell's inequalities. We investigated several possible eavesdropper strategies, including pseudo-quantum-nondemolition measurements. In all cases, the eavesdropper's presence was readily apparent. We discuss a procedure to increase her detectability.
Ges, Igor A.; Brindley, Rebecca L.; Currie, Kevin P.M.; Baudenbacher, Franz J.
2013-01-01
Release of neurotransmitters and hormones by calcium-regulated exocytosis is a fundamental cellular process that is disrupted in a variety of psychiatric, neurological, and endocrine disorders. As such, there is significant interest in targeting neurosecretion for drug and therapeutic development, efforts that will be aided by novel analytical tools and devices that provide mechanistic insight coupled with increased experimental throughput. Here, we report a simple, inexpensive, reusable, microfluidic device designed to analyze catecholamine secretion from small populations of adrenal chromaffin cells in real time, an important neuroendocrine component of the sympathetic nervous system and versatile neurosecretory model. The device is fabricated by replica molding of polydimethylsiloxane (PDMS) using patterned photoresist on silicon wafer as the master. Microfluidic inlet channels lead to an array of U-shaped “cell traps”, each capable of immobilizing single or small groups of chromaffin cells. The bottom of the device is a glass slide with patterned thin film platinum electrodes used for electrochemical detection of catecholamines in real time. We demonstrate reliable loading of the device with small populations of chromaffin cells, and perfusion / repetitive stimulation with physiologically relevant secretagogues (carbachol, PACAP, KCl) using the microfluidic network. Evoked catecholamine secretion was reproducible over multiple rounds of stimulation, and graded as expected to different concentrations of secretagogue or removal of extracellular calcium. Overall, we show this microfluidic device can be used to implement complex stimulation paradigms and analyze the amount and kinetics of catecholamine secretion from small populations of neuroendocrine cells in real time. PMID:24126415
Clinical applications of somatostatin analogs for growth hormone-secreting pituitary adenomas
Wang, Ji-wen; Li, Ying; Mao, Zhi-gang; Hu, Bin; Jiang, Xiao-bing; Song, Bing-bing; Wang, Xin; Zhu, Yong-hong; Wang, Hai-jun
2014-01-01
Excessive growth hormone (GH) is usually secreted by GH-secreting pituitary adenomas and causes gigantism in juveniles or acromegaly in adults. The clinical complications involving cardiovascular, respiratory, and metabolic systems lead to elevated morbidity in acromegaly. Control of serum GH and insulin-like growth factor (IGF) 1 hypersecretion by surgery or pharmacotherapy can decrease morbidity. Current pharmacotherapy includes somatostatin analogs (SAs) and GH receptor antagonist; the former consists of lanreotide Autogel (ATG) and octreotide long-acting release (LAR), and the latter refers to pegvisomant. As primary medical therapy, lanreotide ATG and octreotide LAR can be supplied in a long-lasting formulation to achieve biochemical control of GH and IGF-1 by subcutaneous injection every 4–6 weeks. Lanreotide ATG and octreotide LAR provide an effective medical treatment, whether as a primary or secondary therapy, for the treatment of GH-secreting pituitary adenoma; however, to maximize benefits with the least cost, several points should be emphasized before the application of SAs. A comprehensive assessment, especially of the observation of clinical predictors and preselection of SA treatment, should be completed in advance. A treatment process lasting at least 3 months should be implemented to achieve a long-term stable blood concentration. More satisfactory surgical outcomes for noninvasive macroadenomas treated with presurgical SA may be achieved, although controversy of such adjuvant therapy exists. Combination of SA and pegvisomant or cabergoline shows advantages in some specific cases. Thus, an individual treatment program should be established for each patient under a full evaluation of the risks and benefits. PMID:24421637
Michaud, B; Aroulandom, J; Baiz, N; Amat, F; Gouvis-Echraghi, R; Candon, S; Foray, A-P; Couderc, R; Bach, J-F; Chatenoud, L; Just, J
2014-11-01
Cow's milk allergy (CMA) is a frequent food allergy in young children. The oral food challenge is the gold standard for diagnosis, and there is currently no reliable biological test. Our aim was to evaluate the diagnostic potential of a functional assay quantifying allergen-specific Th2 cells in CMA children. A total of 29 children aged 2.8-10.5 years underwent a double-blind, placebo-controlled food challenge (DBPCFC) to cow's milk. Blood was collected before performing the DBPCFC, and peripheral mononuclear cells were cultured in an 18-h ELISpot assay with casein, α-lactalbumin, or β-lactoglobulin. Numbers of antigen-specific IL-4- and IL-13-secreting lymphocytes and serum-specific IgE, IgG4, and total IgE levels were assessed. Receiver operating characteristic (ROC) curves were generated. A total of 17 (59%) children reacted to cow's milk and were therefore considered as allergic to cow's milk (CMA). The mean number of casein-specific IL-4- and IL-13-secreting T cells was higher in CMA than in non-CMA children (P = 0.009, 0.004, respectively). Moreover, it was inversely correlated with the cumulative dose of cow's milk tolerated (P = 0.003, 0.0009, respectively). ROC curve of combined IL-4 and IL-13 analysis showed an area under the curve of 0.98 (95% CI 0.90-1.06). For a cutoff of 10 IL-4- and 12 IL-13-secreting T cells, sensitivity and negative predictive value were 100%. Enumeration of casein-specific IL-4- and IL-13-secreting T cells appears a promising tool to improve diagnosis and, if confirmed in larger studies, could permit less frequent use of the oral food challenge. © 2014 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.
A Bitslice Implementation of Anderson's Attack on A5/1
NASA Astrophysics Data System (ADS)
Bulavintsev, Vadim; Semenov, Alexander; Zaikin, Oleg; Kochemazov, Stepan
2018-03-01
The A5/1 keystream generator is a part of Global System for Mobile Communications (GSM) protocol, employed in cellular networks all over the world. Its cryptographic resistance was extensively analyzed in dozens of papers. However, almost all corresponding methods either employ a specific hardware or require an extensive preprocessing stage and significant amounts of memory. In the present study, a bitslice variant of Anderson's Attack on A5/1 is implemented. It requires very little computer memory and no preprocessing. Moreover, the attack can be made even more efficient by harnessing the computing power of modern Graphics Processing Units (GPUs). As a result, using commonly available GPUs this method can quite efficiently recover the secret key using only 64 bits of keystream. To test the performance of the implementation, a volunteer computing project was launched. 10 instances of A5/1 cryptanalysis have been successfully solved in this project in a single week.
The ‘prediction imperative’ as the basis for self-awareness
Llinás, Rodolfo R.; Roy, Sisir
2009-01-01
Here, we propose that global brain function is geared towards the implementation of intelligent motricity. Motricity is the only possible external manifestation of nervous system function (other than endocrine and exocrine secretion and the control of vascular tone). The intelligence component of motricity requires, for its successful wheeling, a prediction imperative to approximate the consequences of the impending motion. We address how such predictive function may originate from the dynamic properties of neuronal networks. PMID:19528011
National Authentication Framework Implementation Study
2009-12-01
Identifiers RA Registration Authority SAML Security Assertion Markup Language SFA Single-factor Authentication SMS Short Messaging System SOA ...written on paper disclosed; passwords stored in electronic file copied. 1,2,3,4 Eaves‐ dropping The token secret or authenticator is revealed to...Internet 2.0 and the growing interest in systems developed based upon the Service- Oriented Architecture ( SOA ). While core specifications upon which
Enzymatic aspects in ENT cancer-Matrix metalloproteinases
Zamfir Chiru, AA; Popescu, CR; Gheorghe, DC
2014-01-01
Abstract The study of ENT cancer allows the implementation of molecular biology methods in diagnosis, predicting the evolution of the disease and suggesting a certain treatment. MMPs are proteolytic enzymes, zinc dependent endopeptidases, secreted by tissues and proinflammatory cells that play a role in the clearance of cell surface receptors. They are expressed as zymogens (inactive forms). Proteolytic enzymes cleave zymogens generating active forms. They are involved in cell proliferation, adhesion, differentiation, migration, angiogenesis, apoptosis and host defense. PMID:25408759
1987-02-04
implementing SDI. The results of the investigations are secret, of course. But, as the magazine ATLANTIC writes, it is clear from what has seeped into the...Apparently it means not in accordance with Soviet people’s wishes and bidding of people on the other side of the Atlantic , ideas accepted in the...Christian Social Union, was even prepared to make a pilgrimage "with a candle in his hands" to Altoetting (a place of worship of the Holy Virgin Mary
Interleukin-5 regulates genes involved in B-cell terminal maturation.
Horikawa, Keisuke; Takatsu, Kiyoshi
2006-08-01
Interleukin (IL)-5 induces CD38-activated splenic B cells to differentiate into immunoglobulin M-secreting cells and undergo micro to gamma 1 class switch recombination (CSR) at the DNA level, resulting in immunoglobulin G1 (IgG1) production. Interestingly, IL-4, a well-known IgG1-inducing factor does not induce immunoglobulin production or micro to gamma 1 CSR in CD38-activated B cells. In the present study, we implemented complementary DNA microarrays to investigate the contribution of IL-5-induced gene expression in CD38-stimulated B cells to immunoglobulin-secreting cell differentiation and micro to gamma 1 CSR. IL-5 and IL-4 stimulation of CD38-activated B cells induced the expression of 418 and 289 genes, respectively, that consisted of several clusters. Surprisingly, IL-5-inducible 78 genes were redundantly regulated by IL-4. IL-5 and IL-4 also suppressed the gene expression of 319 and 325 genes, respectively, 97 of which were overlapped. Genes critically regulated by IL-5 include immunoglobulin-related genes such as J chain and immunoglobulinkappa, and genes involved in B-cell maturation such as BCL6, activation-induced cytidine deaminase (Aid) and B lymphocyte-induced maturation protein-1 (Blimp-1) and tend to be induced slowly after IL-5 stimulation. Intriguingly, among genes, the retroviral induction of Blimp-1 and Aid in CD38-activated B cells could induce IL-4-dependent maturation to Syndecan-1+ antibody-secreting cells and micro to gamma 1 CSR, respectively, in CD38-activated B cells. Taken together, preferential Aid and Blimp-1 expression plays a critical role in IL-5-induced immunoglobulin-secreting cell differentiation and micro to gamma 1 CSR in CD38-activated B cells.
Genome-wide screen for modulation of hepatic apolipoprotein A-I (ApoA-I) secretion.
Miles, Rebecca R; Perry, William; Haas, Joseph V; Mosior, Marian K; N'Cho, Mathias; Wang, Jian W J; Yu, Peng; Calley, John; Yue, Yong; Carter, Quincy; Han, Bomie; Foxworthy, Patricia; Kowala, Mark C; Ryan, Timothy P; Solenberg, Patricia J; Michael, Laura F
2013-03-01
Control of plasma cholesterol levels is a major therapeutic strategy for management of coronary artery disease (CAD). Although reducing LDL cholesterol (LDL-c) levels decreases morbidity and mortality, this therapeutic intervention only translates into a 25-40% reduction in cardiovascular events. Epidemiological studies have shown that a high LDL-c level is not the only risk factor for CAD; low HDL cholesterol (HDL-c) is an independent risk factor for CAD. Apolipoprotein A-I (ApoA-I) is the major protein component of HDL-c that mediates reverse cholesterol transport from tissues to the liver for excretion. Therefore, increasing ApoA-I levels is an attractive strategy for HDL-c elevation. Using genome-wide siRNA screening, targets that regulate hepatocyte ApoA-I secretion were identified through transfection of 21,789 siRNAs into hepatocytes whereby cell supernatants were assayed for ApoA-I. Approximately 800 genes were identified and triaged using a convergence of information, including genetic associations with HDL-c levels, tissue-specific gene expression, druggability assessments, and pathway analysis. Fifty-nine genes were selected for reconfirmation; 40 genes were confirmed. Here we describe the siRNA screening strategy, assay implementation and validation, data triaging, and example genes of interest. The genes of interest include known and novel genes encoding secreted enzymes, proteases, G-protein-coupled receptors, metabolic enzymes, ion transporters, and proteins of unknown function. Repression of farnesyltransferase (FNTA) by siRNA and the enzyme inhibitor manumycin A caused elevation of ApoA-I secretion from hepatocytes and from transgenic mice expressing hApoA-I and cholesterol ester transfer protein transgenes. In total, this work underscores the power of functional genetic assessment to identify new therapeutic targets.
Lipavská, Helena; Žárský, Viktor
2009-01-01
The concept of plant intelligence, as proposed by Anthony Trewavas, has raised considerable discussion. However, plant intelligence remains loosely defined; often it is either perceived as practically synonymous to Darwinian fitness, or reduced to a mere decorative metaphor. A more strict view can be taken, emphasizing necessary prerequisites such as memory and learning, which requires clarifying the definition of memory itself. To qualify as memories, traces of past events have to be not only stored, but also actively accessed. We propose a criterion for eliminating false candidates of possible plant intelligence phenomena in this stricter sense: an “intelligent” behavior must involve a component that can be approximated by a plausible algorithmic model involving recourse to stored information about past states of the individual or its environment. Re-evaluation of previously presented examples of plant intelligence shows that only some of them pass our test. “You were hurt?” Kumiko said, looking at the scar. Sally looked down. “Yeah.” “Why didn't you have it removed?” “Sometimes it's good to remember.” “Being hurt?” “Being stupid.”—(W. Gibson: Mona Lisa Overdrive) PMID:19816094
Laser cleaning of works of art: evaluation of the thermal stress induced by Er:YAG laser
NASA Astrophysics Data System (ADS)
De Cruz, A.; Andreotti, A.; Ceccarini, A.; Colombini, M. P.
2014-06-01
The Er:YAG laser has proven particularly efficient in cleaning procedures of works of art. The removal of the superficial deposits is achieved through melting, thermal decomposition and evaporation. However, the energy absorbed by vibrational modes is dissipated as heat, increasing the temperature of the surface coating that could cause damage on the object. The aim of this study was to evaluate the temperature increase induced by a Er:YAG MonaLaser (LLC., Orlando, FL, USA). To that purpose, we designed a dedicated device to perform the tests in an inert atmosphere or with a wetting agent, to measure the radiant energy per laser pulse. Tests were carried out both on graphite, which absorbs IR radiation and showed a very intense flash emission, and on different kind of samples representative of materials with different levels of conductivity and thermal diffusivity. Results obtained showed that the temperature increase in the irradiated surface depends on the substrate but never causes the damage of the organic and inorganic material. The use of a solvent as wetting agent has been also tested.
Charged Particle Identification for Prefragmentation Studies
NASA Astrophysics Data System (ADS)
Hu, Jonathan; MoNA Collaboration
2017-09-01
Projectile fragmentation refers to high energy (>50 MeV/u) heavy ion beams on production targets to generate intermediate mass and target fragments at facilities like the NSCL, FRIB, GSI, GANIL and RIKEN. The resulting secondary beams can then be isolated by fragment separators like the NCSL's A1900 and that secondary beam then used on reaction targets for a variety of experiments. Predictions of beam intensities for experiment planning depend on models and data. The MoNA Collaboration performed an experiment at the NSCL in which a 48Ca primary beam was used with a 9Be target to produce a 32Mg secondary beam with energy 86 MeV/u that was incident on a second target of 9Be. By characterizing the energy distributions of final fragments of neon, sodium, and fluorine in coincidence with neutrons created both by prefragmentation processes and reaction mechanisms, we are able to extract information about prefragmentation dynamics. The identification of charged fragments is a multi-step process crucial to this analysis. This work is supported by the National Science Foundation under Grant No. PHY-1613429.
NASA Astrophysics Data System (ADS)
Zaharov, A. A.; Nissenbaum, O. V.; Ponomaryov, K. Y.; Nesgovorov, E. S.
2018-01-01
In this paper we study application of Internet of Thing concept and devices to secure automated process control systems. We review different approaches in IoT (Internet of Things) architecture and design and propose them for several applications in security of automated process control systems. We consider an Attribute-based encryption in context of access control mechanism implementation and promote a secret key distribution scheme between attribute authorities and end devices.
Entangled State Quantum Cryptography: Eavesdropping on the Ekert Protocol
DOE Office of Scientific and Technical Information (OSTI.GOV)
Naik, D. S.; Peterson, C. G.; White, A. G.
2000-05-15
Using polarization-entangled photons from spontaneous parametric down-conversion, we have implemented Ekert's quantum cryptography protocol. The near-perfect correlations of the photons allow the sharing of a secret key between two parties. The presence of an eavesdropper is continually checked by measuring Bell's inequalities. We investigated several possible eavesdropper strategies, including pseudo-quantum-nondemolition measurements. In all cases, the eavesdropper's presence was readily apparent. We discuss a procedure to increase her detectability. (c) 2000 The American Physical Society.
Authentication based on gestures with smartphone in hand
NASA Astrophysics Data System (ADS)
Varga, Juraj; Švanda, Dominik; Varchola, Marek; Zajac, Pavol
2017-08-01
We propose a new method of authentication for smartphones and similar devices based on gestures made by user with the device itself. The main advantage of our method is that it combines subtle biometric properties of the gesture (something you are) with a secret information that can be freely chosen by the user (something you know). Our prototype implementation shows that the scheme is feasible in practice. Further development, testing and fine tuning of parameters is required for deployment in the real world.
Spacetime Replication of Quantum Information Using (2 , 3) Quantum Secret Sharing and Teleportation
NASA Astrophysics Data System (ADS)
Wu, Yadong; Khalid, Abdullah; Davijani, Masoud; Sanders, Barry
The aim of this work is to construct a protocol to replicate quantum information in any valid configuration of causal diamonds and assess resources required to physically realize spacetime replication. We present a set of codes to replicate quantum information along with a scheme to realize these codes using continuous-variable quantum optics. We use our proposed experimental realizations to determine upper bounds on the quantum and classical resources required to simulate spacetime replication. For four causal diamonds, our implementation scheme is more efficient than the one proposed previously. Our codes are designed using a decomposition algorithm for complete directed graphs, (2 , 3) quantum secret sharing, quantum teleportation and entanglement swapping. These results show the simulation of spacetime replication of quantum information is feasible with existing experimental methods. Alberta Innovates, NSERC, China's 1000 Talent Plan and the Institute for Quantum Information and Matter, which is an NSF Physics Frontiers Center (NSF Grant PHY-1125565) with support of the Gordon and Betty Moore Foundation (GBMF-2644).
Illumination of growth, division and secretion by metabolic labeling of the bacterial cell surface
Siegrist, M. Sloan; Swarts, Benjamin M.; Fox, Douglas M.; Lim, Shion An; Bertozzi, Carolyn R.
2015-01-01
The cell surface is the essential interface between a bacterium and its surroundings. Composed primarily of molecules that are not directly genetically encoded, this highly dynamic structure accommodates the basic cellular processes of growth and division as well as the transport of molecules between the cytoplasm and the extracellular milieu. In this review, we describe aspects of bacterial growth, division and secretion that have recently been uncovered by metabolic labeling of the cell envelope. Metabolite derivatives can be used to label a variety of macromolecules, from proteins to non-genetically-encoded glycans and lipids. The embedded metabolite enables precise tracking in time and space, and the versatility of newer chemoselective detection methods offers the ability to execute multiple experiments concurrently. In addition to reviewing the discoveries enabled by metabolic labeling of the bacterial cell envelope, we also discuss the potential of these techniques for translational applications. Finally, we offer some guidelines for implementing this emerging technology. PMID:25725012
Experimental Demonstration of Counterfactual Quantum Communication
NASA Astrophysics Data System (ADS)
Liu, Yang; Ju, Lei; Liang, Xiao-Lei; Tang, Shi-Biao; Tu, Guo-Liang Shen; Zhou, Lei; Peng, Cheng-Zhi; Chen, Kai; Chen, Teng-Yun; Chen, Zeng-Bing; Pan, Jian-Wei
2012-07-01
Quantum effects, besides offering substantial superiority in many tasks over classical methods, are also expected to provide interesting ways to establish secret keys between remote parties. A striking scheme called “counterfactual quantum cryptography” proposed by Noh [Phys. Rev. Lett. 103, 230501 (2009).PRLTAO0031-900710.1103/PhysRevLett.103.230501] allows one to maintain secure key distributions, in which particles carrying secret information are seemingly not being transmitted through quantum channels. We have experimentally demonstrated, for the first time, a faithful implementation for such a scheme with an on-table realization operating at telecom wavelengths. To verify its feasibility for extension over a long distance, we have furthermore reported an illustration on a 1 km fiber. In both cases, high visibilities of more than 98% are achieved through active stabilization of interferometers. Our demonstration is crucial as a direct verification of such a remarkable application, and this procedure can become a key communication module for revealing fundamental physics through counterfactuals.
A concept of dynamic permission mechanism on android
NASA Astrophysics Data System (ADS)
Aron, Lukas; Hanacek, Petr
2016-02-01
This paper discuss the main security topic in mobile security area and this topic is protect user against the leakage of data. This work primarily contains the proposal of concept of dynamic permission mechanism for Android operating system. This mechanism deals with assignment or enforcement permissions to the application according to files that the application works with. Application has set of permissions that can use, but if the user opens confident files the application permissions should change its permission set and there should not be possible leakage of this secret data. The permissions set should be stricter according to opened confidential file or more open (without restriction) if the file is not secret file. The concept proposes the solution for protecting this data leakage. Idea covers rule that user should be avoided of change this permissions himself, but this behavior should be dynamic, automatic and independent. This proposal is mainly aimed to Android operating system, but the concept can be applied to other mobile platforms with some implementation changes.
Links between early child maltreatment, mental disorders, and cortisol secretion anomalies.
Bronsard, Guillaume; Auquier, Pascal; Boyer, Laurent
2016-11-01
Early child maltreatment has been widely associated with the development of mental disorders in both childhood and adulthood. However, such association cannot be systematically established, as only few factors are observed regularly, such as high prevalence of comorbidities and externalized disorders. Similarly, the association between early abuse and cortisol secretion anomalies has been well-documented. Whereas early hypercortisolism followed by hypocortisolism was often described, the results proved inconsistent and at times contradictory. The physiopathological mechanisms are quite complex and varied, including mixed neurotoxicity and stress response anomalies, linked to circadian rhythm disturbances. One of the difficulties inherent to research on this topic is to better define maltreatment in childhood. Studying children's groups at risk of maltreatment, such as children followed by juvenile justice or in child welfare systems, could be a very good tool, provided that social, judiciary, and mental health professionals are able to work together and implement common research objectives. Copyright © 2017 Elsevier Ltd. All rights reserved.
A Cryptographic SoC for Robust Protection of Secret Keys in IPTV DRM Systems
NASA Astrophysics Data System (ADS)
Lee, Sanghan; Yang, Hae-Yong; Yeom, Yongjin; Park, Jongsik
The security level of an internet protocol television (IPTV) digital right management (DRM) system ultimately relies on protection of secret keys. Well known devices for the key protection include smartcards and battery backup SRAMs (BB-SRAMs); however, these devices could be vulnerable to various physical attacks. In this paper, we propose a secure and cost-effective design of a cryptographic system on chip (SoC) that integrates the BB-SRAM with a cell-based design technique. The proposed SoC provides robust safeguard against the physical attacks, and satisfies high-speed and low-price requirements of IPTV set-top boxes. Our implementation results show that the maximum encryption rate of the SoC is 633Mb/s. In order to verify the data retention capabilities, we made a prototype chip using 0.18µm standard cell technology. The experimental results show that the integrated BB-SRAM can reliably retain data with a 1.4µA leakage current.
NASA Astrophysics Data System (ADS)
Hu, Guiqiang; Xiao, Di; Wang, Yong; Xiang, Tao; Zhou, Qing
2017-11-01
Recently, a new kind of image encryption approach using compressive sensing (CS) and double random phase encoding has received much attention due to the advantages such as compressibility and robustness. However, this approach is found to be vulnerable to chosen plaintext attack (CPA) if the CS measurement matrix is re-used. Therefore, designing an efficient measurement matrix updating mechanism that ensures resistance to CPA is of practical significance. In this paper, we provide a novel solution to update the CS measurement matrix by altering the secret sparse basis with the help of counter mode operation. Particularly, the secret sparse basis is implemented by a reality-preserving fractional cosine transform matrix. Compared with the conventional CS-based cryptosystem that totally generates all the random entries of measurement matrix, our scheme owns efficiency superiority while guaranteeing resistance to CPA. Experimental and analysis results show that the proposed scheme has a good security performance and has robustness against noise and occlusion.
NASA Astrophysics Data System (ADS)
Yuan, Sheng; Yang, Yangrui; Liu, Xuemei; Zhou, Xin; Wei, Zhenzhuo
2018-01-01
An optical image transformation and encryption scheme is proposed based on double random-phase encoding (DRPE) and compressive ghost imaging (CGI) techniques. In this scheme, a secret image is first transformed into a binary image with the phase-retrieval-based DRPE technique, and then encoded by a series of random amplitude patterns according to the ghost imaging (GI) principle. Compressive sensing, corrosion and expansion operations are implemented to retrieve the secret image in the decryption process. This encryption scheme takes the advantage of complementary capabilities offered by the phase-retrieval-based DRPE and GI-based encryption techniques. That is the phase-retrieval-based DRPE is used to overcome the blurring defect of the decrypted image in the GI-based encryption, and the CGI not only reduces the data amount of the ciphertext, but also enhances the security of DRPE. Computer simulation results are presented to verify the performance of the proposed encryption scheme.
Advanced technologies for encryption of satellite links
NASA Astrophysics Data System (ADS)
McMahan, Sherry S.
The use of encryption on satellite links is discussed. Advanced technology exists to provide transmission security for large earth station with data rates up to 50 megabits per second. One of the major concerns in the use of encryption equipment with very small aperture terminals (VSAT) is the key management issue and the related operational costs. The low cost requirement and the lack of physical protection of remote VSATs place severe constraints on the design of encryption equipment. Encryption may be accomplished by embedding a tamper proof encryption module into the baseband unit of each VSAT. VSAT networks are usually star networks where there is a single large earth station that serves as a hub and all satellite communications takes place between each VSAT and the hub earth station. The hub earth station has the secret master key of each VSAT. These master keys are used to downline load encrypted session keys to each VSAT. A more secure alternative is to use public key techniques where each embedded VSAT encryption module internally generates its own secret and public numbers. The secret number never leaves the module while the public number is sent to the hub at the time of initialization of the encryption module into the VSAT. Physical access control to encryption modules of VSAT systems can be implemented using passwords, smart cards or biometrics.
Measurement device-independent quantum dialogue
NASA Astrophysics Data System (ADS)
Maitra, Arpita
2017-12-01
Very recently, the experimental demonstration of quantum secure direct communication (QSDC) with state-of-the-art atomic quantum memory has been reported (Zhang et al. in Phys Rev Lett 118:220501, 2017). Quantum dialogue (QD) falls under QSDC where the secrete messages are communicated simultaneously between two legitimate parties. The successful experimental demonstration of QSDC opens up the possibilities for practical implementation of QD protocols. Thus, it is necessary to analyze the practical security issues of QD protocols for future implementation. Since the very first proposal for QD by Nguyen (Phys Lett A 328:6-10, 2004), a large number of variants and extensions have been presented till date. However, all of those leak half of the secret bits to the adversary through classical communications of the measurement results. In this direction, motivated by the idea of Lo et al. (Phys Rev Lett 108:130503, 2012), we propose a measurement device-independent quantum dialogue scheme which is resistant to such information leakage as well as side-channel attacks. In the proposed protocol, Alice and Bob, two legitimate parties, are allowed to prepare the states only. The states are measured by an untrusted third party who may himself behave as an adversary. We show that our protocol is secure under this adversarial model. The current protocol does not require any quantum memory, and thus, it is inherently robust against memory attacks. Such robustness might not be guaranteed in the QSDC protocol with quantum memory (Zhang et al. 2017).
Hidden Treasures and Secret Pitfalls: Application of the Capability Approach to ParkinsonNet.
Canoy, Marcel; Faber, Marjan J; Munneke, Marten; Oortwijn, Wija; Nijkrake, Maarten J; Bloem, Bastiaan R
2015-01-01
In the Netherlands, the largest health technology assessment (HTA) program funds mainly (cost-)effectiveness studies and implementation research. The cost-effectiveness studies are usually controlled clinical trials which simultaneously collect cost data. The success of a clinical trial typically depends on the effect size for the primary outcome, such as health gains or mortality rates. A drawback is that in case of a negative primary outcome, relevant other (and perhaps more implicit) benefits might be missed. Conversely, positive trials can contain adverse outcomes that may also remain hidden. The capability approach (developed by Nobel Prize winner and philosopher Sen) is an instrument that may reveal such "hidden treasures and secret pitfalls" that lie embedded within clinical trials, beyond the more traditional outcomes. Here, we exemplify the possible merits of the capability approach using a large clinical trial (funded by the HTA program in the Netherlands) that aimed to evaluate the ParkinsonNet concept, an innovative network approach for Parkinson patients. This trial showed no effects for the primary outcome, but the ParkinsonNet concept tested in this study was nevertheless met with great enthusiasm and was rapidly implemented throughout an entire country, and meanwhile also internationally. We applied the capability approach to the ParkinsonNet concept, and this analysis yielded additional benefits within several capability domains. These findings seems to substantiate the claim that richer policy debates may ensue by applying the capability approach to clinical trial data, in addition to traditional outcomes.
Measures to prevent nosocomial infections during mechanical ventilation.
Ramirez, Paula; Bassi, Gianluigi L; Torres, Antonio
2012-02-01
Endotracheal intubation and mechanical ventilation are lifesaving measures in critically ill patients. However, these interventions increase the risk of respiratory infections, particularly ventilator-associated pneumonia (VAP). VAP constitutes a serious burden for the healthcare system and worsens the patient's outcomes; thus, several preventive strategies have been implemented. This communication reviews the current knowledge on VAP pathogenesis and the latest preventive measures. Pathogen-laden oropharyngeal secretions leak across the endotracheal tube (ETT) cuff; thus, a continuous control of the internal cuff pressure and cuffs made of polyurethane improve sealing effectiveness and associated risks of infections. Subglottic secretions aspiration prevents VAP, and the latest evidence demonstrated a reduction in the incidence of late-onset VAP. The role of ETT biofilm in the pathogenesis of VAP is not fully elucidated. Nevertheless, antimicrobial-coated ETTs have showed beneficial effects in VAP incidence. Recent experimental evidence has challenged the benefits associated with the use of the semirecumbent position; yet, these findings need to be corroborated in clinical trials. The latest results from trials testing the effects of selective digestive decontamination (SDD) showed beneficial effects on patients' outcomes, but concerns remain regarding the emergence of bacterial resistance, specifically upon digestive tract re-colonization. The use of oropharyngeal decontamination with antiseptics and the use of probiotics are potential alternatives to SDD. There is consistent evidence that strategies affecting the primary mechanisms of VAP pathogenesis efficiently reduce the occurrence of the disease. Preventive measures should be implemented grouped into bundles to improve overall efficacy.
Will They or Won't They? Secret Telling in Interpersonal Interactions.
Kowalski, Robin Marie; Morgan, Chad Alan; Whittaker, Elizabeth; Zaremba, Brittany; Frazee, Laura; Dean, Jessica
2015-01-01
This study investigated predictors of within-gender secret telling. Eighty-eight participants were exposed to either a "positive" or a "negative" secret about another individual. Just under 20% of participants told the secret. Conscientiousness, secret condition, empathy, and the conscientiousness by secret condition interaction had effects on the rate of secret telling, χ(2) (5,82) = 17.78, p = .003, AIC = 80.60. Conscientiousness had a negative effect on secret telling among participants that told the "negative" secret.
A quantum proxy group signature scheme based on an entangled five-qubit state
NASA Astrophysics Data System (ADS)
Wang, Meiling; Ma, Wenping; Wang, Lili; Yin, Xunru
2015-09-01
A quantum proxy group signature (QPGS) scheme based on controlled teleportation is presented, by using the entangled five-qubit quantum state functions as quantum channel. The scheme uses the physical characteristics of quantum mechanics to implement delegation, signature and verification. The security of the scheme is guaranteed by the entanglement correlations of the entangled five-qubit state, the secret keys based on the quantum key distribution (QKD) and the one-time pad algorithm, all of which have been proven to be unconditionally secure and the signature anonymity.
Counterfactual quantum cryptography network with untrusted relay
NASA Astrophysics Data System (ADS)
Chen, Yuanyuan; Gu, Xuemei; Jiang, Dong; Xie, Ling; Chen, Lijun
2015-07-01
Counterfactual quantum cryptography allows two remote parties to share a secret key even though a physical particle is not in fact transmitted through the quantum channel. In order to extend the scope of counterfactual quantum cryptography, we use an untrusted relay to construct a multi-user network. The implementation issues are discussed to show that the scheme can be realized with current technologies. We also prove the practical security advantages of the scheme by eliminating the probability that an eavesdropper can directly access the signal or an untrusted relay can perform false operations.
Bagheri-Nesami, Masoumeh; Amiri-Abchuyeh, Maryam; Gholipour-Baradari, Afshin; Yazdani-Cherati, Jamshid; Nikkhah, Attieh
2015-08-01
The implementation of guidelines for the prevention of Ventilator-associated pneumonia has been shown to have a significant effect in reducing the incidence of VAP. The aim of the present study was to evaluate the implementation of the preventive strategies for VAP in ICUs of university hospitals of Sari, Iran. This cross-sectional study was carried out in 600 beds/day in the ICUs of university hospitals of Sari from April to June 2012. Sampling was done by availability technique in patients receiving mechanical ventilation in the ICU. The implementation of the preventive measures was assessed by a standard checklist with previously approved validity and reliability. The percentage of implementing each of the measures was as follows: sterile suction, 88.44%; semi-recumbent position, 76.8%; oral hygiene, 58.45%; using heat and moisture exchanges (HMEs), 58%; controlling cuff pressure, 46.8%; hand hygiene, 32.8%; using anti-coagulants, 26.8% and physiotherapy, 25.5%. Closed suction system, continuous drainage of subglottic secretions and kinetic beds were not used at all. The overall mean percentage of implementing preventive measures was low and required designing integrated guidelines by considering the conditions of the ICUs in each country, as well as educating and encouraging the staffs to use the recommended guidelines.
Three-step semiquantum secure direct communication protocol
NASA Astrophysics Data System (ADS)
Zou, XiangFu; Qiu, DaoWen
2014-09-01
Quantum secure direct communication is the direct communication of secret messages without need for establishing a shared secret key first. In the existing schemes, quantum secure direct communication is possible only when both parties are quantum. In this paper, we construct a three-step semiquantum secure direct communication (SQSDC) protocol based on single photon sources in which the sender Alice is classical. In a semiquantum protocol, a person is termed classical if he (she) can measure, prepare and send quantum states only with the fixed orthogonal quantum basis {|0>, |1>}. The security of the proposed SQSDC protocol is guaranteed by the complete robustness of semiquantum key distribution protocols and the unconditional security of classical one-time pad encryption. Therefore, the proposed SQSDC protocol is also completely robust. Complete robustness indicates that nonzero information acquired by an eavesdropper Eve on the secret message implies the nonzero probability that the legitimate participants can find errors on the bits tested by this protocol. In the proposed protocol, we suggest a method to check Eves disturbing in the doves returning phase such that Alice does not need to announce publicly any position or their coded bits value after the photons transmission is completed. Moreover, the proposed SQSDC protocol can be implemented with the existing techniques. Compared with many quantum secure direct communication protocols, the proposed SQSDC protocol has two merits: firstly the sender only needs classical capabilities; secondly to check Eves disturbing after the transmission of quantum states, no additional classical information is needed.
De Nardi, Frédéric; Lefort, Claudie; Bréard, Dimitri; Richomme, Pascal; Legros, Christian; Guérineau, Nathalie C.
2017-01-01
Catecholamine (CA) secretion from the adrenal medullary tissue is a key step of the adaptive response triggered by an organism to cope with stress. Whereas molecular and cellular secretory processes have been extensively studied at the single chromaffin cell level, data available for the whole gland level are much scarcer. We tackled this issue in rat by developing an easy to implement experimental strategy combining the adrenal acute slice supernatant collection with a high-performance liquid chromatography-based epinephrine and norepinephrine (NE) assay. This technique affords a convenient method for measuring basal and stimulated CA release from single acute slices, allowing thus to individually address the secretory function of the left and right glands. Our data point that the two glands are equally competent to secrete epinephrine and NE, exhibiting an equivalent epinephrine:NE ratio, both at rest and in response to a cholinergic stimulation. Nicotine is, however, more efficient than acetylcholine to evoke NE release. A pharmacological challenge with hexamethonium, an α3-containing nicotinic acetylcholine receptor antagonist, disclosed that epinephrine- and NE-secreting chromaffin cells distinctly expressed α3 nicotinic receptors, with a dominant contribution in NE cells. As such, beyond the novelty of CA assays from acute slice supernatants, our study contributes at refining the secretory behavior of the rat adrenal medullary tissue, and opens new perspectives for monitoring the release of other hormones and transmitters, especially those involved in the stress response. PMID:28993760
A sampling design framework for monitoring secretive marshbirds
Johnson, D.H.; Gibbs, J.P.; Herzog, M.; Lor, S.; Niemuth, N.D.; Ribic, C.A.; Seamans, M.; Shaffer, T.L.; Shriver, W.G.; Stehman, S.V.; Thompson, W.L.
2009-01-01
A framework for a sampling plan for monitoring marshbird populations in the contiguous 48 states is proposed here. The sampling universe is the breeding habitat (i.e. wetlands) potentially used by marshbirds. Selection protocols would be implemented within each of large geographical strata, such as Bird Conservation Regions. Site selection will be done using a two-stage cluster sample. Primary sampling units (PSUs) would be land areas, such as legal townships, and would be selected by a procedure such as systematic sampling. Secondary sampling units (SSUs) will be wetlands or portions of wetlands in the PSUs. SSUs will be selected by a randomized spatially balanced procedure. For analysis, the use of a variety of methods as a means of increasing confidence in conclusions that may be reached is encouraged. Additional effort will be required to work out details and implement the plan.
Multimode entanglement in reconfigurable graph states using optical frequency combs
Cai, Y.; Roslund, J.; Ferrini, G.; Arzani, F.; Xu, X.; Fabre, C.; Treps, N.
2017-01-01
Multimode entanglement is an essential resource for quantum information processing and quantum metrology. However, multimode entangled states are generally constructed by targeting a specific graph configuration. This yields to a fixed experimental setup that therefore exhibits reduced versatility and scalability. Here we demonstrate an optical on-demand, reconfigurable multimode entangled state, using an intrinsically multimode quantum resource and a homodyne detection apparatus. Without altering either the initial squeezing source or experimental architecture, we realize the construction of thirteen cluster states of various sizes and connectivities as well as the implementation of a secret sharing protocol. In particular, this system enables the interrogation of quantum correlations and fluctuations for any multimode Gaussian state. This initiates an avenue for implementing on-demand quantum information processing by only adapting the measurement process and not the experimental layout. PMID:28585530
Secure password-based authenticated key exchange for web services
DOE Office of Scientific and Technical Information (OSTI.GOV)
Liang, Fang; Meder, Samuel; Chevassut, Olivier
This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options inmore » the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.« less
On protection against a bright-pulse attack in the two-pass quantum cryptography system
NASA Astrophysics Data System (ADS)
Balygin, K. A.; Klimov, A. N.; Korol'kov, A. V.; Kulik, S. P.; Molotkov, S. N.
2016-06-01
The security of keys in quantum cryptography systems, in contrast to mathematical cryptographic algorithms, is guaranteed by fundamental quantum-mechanical laws. However, the cryptographic resistance of such systems, which are distributed physical devices, fundamentally depends on the method of their implementation and particularly on the calibration and control of critical parameters. The most important parameter is the number of photons in quasi-single-photon information states in a communication channel. The sensitivity to a bright-pulse attack has been demonstrated in an explicit form for a number of systems. A method guaranteeing the resistance to such attacks has been proposed and implemented. Furthermore, the relation of physical observables used and obtained at the control of quantum states to the length of final secret keys has been obtained for the first time.
Secure multi-party communication with quantum key distribution managed by trusted authority
Nordholt, Jane Elizabeth; Hughes, Richard John; Peterson, Charles Glen
2013-07-09
Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.
Secure multi-party communication with quantum key distribution managed by trusted authority
Hughes, Richard John; Nordholt, Jane Elizabeth; Peterson, Charles Glen
2015-01-06
Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.
Trade secrets in life science and pharmaceutical companies.
Nealey, Tara; Daignault, Ronald M; Cai, Yu
2014-11-20
Trade secret protection arises under state common law and state statutes. In general, a trade secret is information that is not generally known to the public and is maintained as a secret, and it provides a competitive advantage or economic benefit to the trade secret holder. Trade secrets can be worth tens or hundreds of millions of dollars, and damage awards in trade secret litigation have been high; often, there is a lot at stake. Obtaining a trade secret through "improper means" is misappropriation. If the alleged trade secret, however, was developed independently, known publicly, or not maintained as a secret, then those defenses may successfully overcome a claim for trade secret misappropriation. With today's interconnectedness in the biotechnology and pharmaceutical fields, more collaborations, joint ventures, and outsourcing arrangements among firms, and increased mobility of employees' careers, life science companies need to not only understand how to protect their trade secrets, but also know how to defend against a claim for trade secret theft. Copyright © 2015 Cold Spring Harbor Laboratory Press; all rights reserved.
Trade Secrets in Life Science and Pharmaceutical Companies
Nealey, Tara; Daignault, Ronald M.; Cai, Yu
2015-01-01
Trade secret protection arises under state common law and state statutes. In general, a trade secret is information that is not generally known to the public and is maintained as a secret, and it provides a competitive advantage or economic benefit to the trade secret holder. Trade secrets can be worth tens or hundreds of millions of dollars, and damage awards in trade secret litigation have been high; often, there is a lot at stake. Obtaining a trade secret through “improper means” is misappropriation. If the alleged trade secret, however, was developed independently, known publicly, or not maintained as a secret, then those defenses may successfully overcome a claim for trade secret misappropriation. With today’s interconnectedness in the biotechnology and pharmaceutical fields, more collaborations, joint ventures, and outsourcing arrangements among firms, and increased mobility of employees’ careers, life science companies need to not only understand how to protect their trade secrets, but also know how to defend against a claim for trade secret theft. PMID:25414378
1982-04-01
the secret . In each, we shall consider * the plausible interpretations of the utterance "Do you know the secret ?" Setting 1: If S knows the secret and...believes that H doesn’t know the secret , then "Do you know the secret ?" is probably an offer to tell H the secret . Setting 2: If S doesn’t know the ... secret and believes that H does know the secret then "Do you know the
Molecular Mechanism of Pancreatic and Salivary Glands Fluid and HCO3− Secretion
Lee, Min Goo; Ohana, Ehud; Park, Hyun Woo; Yang, Dongki; Muallem, Shmuel
2013-01-01
Fluid and HCO3− secretion is a vital function of all epithelia and is required for the survival of the tissue. Aberrant fluid and HCO3− secretion is associated with many epithelial diseases, such as cystic fibrosis, pancreatitis, Sjögren’s syndrome and other epithelial inflammatory and autoimmune diseases. Significant progress has been made over the last 20 years in our understanding of epithelial fluid and HCO3− secretion, in particular by secretory glands. Fluid and HCO3− secretion by secretory glands is a two step process. Acinar cells secrete isotonic fluid in which the major salt is NaCl. Subsequently, the duct modifies the volume and electrolyte composition of the fluid to absorb the Cl− and secrete HCO3−. The relative volume secreted by acinar and duct cells and modification of electrolyte composition of the secreted fluids varies among secretory glands to meet their physiological functions. In the pancreas, acinar cells secrete small amount of NaCl-rich fluid, while the duct absorbs the Cl− and secretes HCO3− and the bulk of the fluid in the pancreatic juice. Fluid secretion appears to be driven by active HCO3− secretion. In the salivary glands, acinar cells secrete the bulk of the fluid in the saliva that contains high concentrations of Na+ and Cl− and fluid secretion is mediated by active Cl− secretion. The salivary glands duct absorbs both the Na+ and Cl− and secretes K+ and HCO3−. In this review, we focus on the molecular mechanism of fluid and HCO3− secretion by the pancreas and salivary glands, to highlight the similarities of the fundamental mechanisms of acinar and duct cell functions, and point the differences to meet glands specific secretions. PMID:22298651
Eom, Joong Sik; Lee, Mi-Suk; Chun, Hee-Kyung; Choi, Hee Jung; Jung, Sun-Young; Kim, Yeon-Sook; Yoon, Seon Jin; Kwak, Yee Gyung; Oh, Gang-Bok; Jeon, Min-Hyok; Park, Sun-Young; Koo, Hyun-Sook; Ju, Young-Su; Lee, Jin Seo
2014-01-01
For prevention of ventilator-associated pneumonia (VAP), a bundle approach was applied to patients receiving mechanical ventilation in intensive care units. The incidence of VAP and the preventive efficacy of the VAP bundle were investigated. A quasi-experimental study was conducted in adult intensive care units of 6 university hospitals with similar VAP rates. We implemented the VAP bundle between March 2011 and June 2011, then compared the rate of VAP after implementation of the VAP bundle with the rate in the previous 8 months. Our ventilator bundle included head of bed elevation, peptic ulcer disease prophylaxis, deep venous thrombosis prophylaxis, and oral decontamination with chlorhexidine 0.12%. Continuous aspiration of subglottic secretions was an option. Implementation of the VAP bundle reduced the VAP rate from a mean of 4.08 cases per 1,000 ventilator-days to 1.16 cases per 1,000 ventilator-days. The incidence density ratio (rate) was 0.28 (95% confidence interval, 0.275-0.292). Implementing the appropriate VAP bundle significantly decreased the incidence of VAP in patients with mechanical ventilation. Copyright © 2014 Association for Professionals in Infection Control and Epidemiology, Inc. Published by Mosby, Inc. All rights reserved.
Seyedsayamdost, Mohammad R; Traxler, Matthew F; Clardy, Jon; Kolter, Roberto
2012-01-01
Actinomycetes, a group of filamentous, Gram-positive bacteria, have long been a remarkable source of useful therapeutics. Recent genome sequencing and transcriptomic studies have shown that these bacteria, responsible for half of the clinically used antibiotics, also harbor a large reservoir of gene clusters, which have the potential to produce novel secreted small molecules. Yet, many of these clusters are not expressed under common culture conditions. One reason why these clusters have not been linked to a secreted small molecule lies in the way that actinomycetes have typically been studied: as pure cultures in nutrient-rich media that do not mimic the complex environments in which these bacteria evolved. New methods based on multispecies culture conditions provide an alternative approach to investigating the products of these gene clusters. We have recently implemented binary interspecies interaction assays to mine for new secondary metabolites and to study the underlying biology of interactinomycete interactions. Here, we describe the detailed biological and chemical methods comprising these studies. Copyright © 2012 Elsevier Inc. All rights reserved.
Counterfactual quantum cryptography based on weak coherent states
NASA Astrophysics Data System (ADS)
Yin, Zhen-Qiang; Li, Hong-Wei; Yao, Yao; Zhang, Chun-Mei; Wang, Shuang; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu
2012-08-01
In the “counterfactual quantum cryptography” scheme [T.-G. Noh, Phys. Rev. Lett.PRLTAO0031-900710.1103/PhysRevLett.103.230501 103, 230501 (2009)], two legitimate distant peers may share secret-key bits even when the information carriers do not travel in the quantum channel. The security of this protocol with an ideal single-photon source has been proved by Yin [Z.-Q. Yin, H. W. Li, W. Chen, Z. F. Han, and G. C. Guo, Phys. Rev. APLRAAN1050-294710.1103/PhysRevA.82.042335 82, 042335 (2010)]. In this paper, we prove the security of the counterfactual-quantum-cryptography scheme based on a commonly used weak-coherent-laser source by considering a general collective attack. The basic assumption of this proof is that the efficiency and dark-counting rate of a single-photon detector are consistent for any n-photon Fock states. Then through randomizing the phases of the encoding weak coherent states, Eve's ancilla will be transformed into a classical mixture. Finally, the lower bound of the secret-key-bit rate and a performance analysis for the practical implementation are both given.
Quantum state sharing against the controller's cheating
NASA Astrophysics Data System (ADS)
Shi, Run-hua; Zhong, Hong; Huang, Liu-sheng
2013-08-01
Most existing QSTS schemes are equivalent to the controlled teleportation, in which a designated agent (i.e., the recoverer) can recover the teleported state with the help of the controllers. However, the controller may attempt to cheat the recoverer during the phase of recovering the secret state. How can we detect this cheating? In this paper, we considered the problem of detecting the controller's cheating in Quantum State Sharing, and further proposed an effective Quantum State Sharing scheme against the controller's cheating. We cleverly use Quantum Secret Sharing, Multiple Quantum States Sharing and decoy-particle techniques. In our scheme, via a previously shared entanglement state Alice can teleport multiple arbitrary multi-qubit states to Bob with the help of Charlie. Furthermore, by the classical information shared previously, Alice and Bob can check whether there is any cheating of Charlie. In addition, our scheme only needs to perform Bell-state and single-particle measurements, and to apply C-NOT gate and other single-particle unitary operations. With the present techniques, it is feasible to implement these necessary measurements and operations.
An AES chip with DPA resistance using hardware-based random order execution
NASA Astrophysics Data System (ADS)
Bo, Yu; Xiangyu, Li; Cong, Chen; Yihe, Sun; Liji, Wu; Xiangmin, Zhang
2012-06-01
This paper presents an AES (advanced encryption standard) chip that combats differential power analysis (DPA) side-channel attack through hardware-based random order execution. Both decryption and encryption procedures of an AES are implemented on the chip. A fine-grained dataflow architecture is proposed, which dynamically exploits intrinsic byte-level independence in the algorithm. A novel circuit called an HMF (Hold-Match-Fetch) unit is proposed for random control, which randomly sets execution orders for concurrent operations. The AES chip was manufactured in SMIC 0.18 μm technology. The average energy for encrypting one group of plain texts (128 bits secrete keys) is 19 nJ. The core area is 0.43 mm2. A sophisticated experimental setup was built to test the DPA resistance. Measurement-based experimental results show that one byte of a secret key cannot be disclosed from our chip under random mode after 64000 power traces were used in the DPA attack. Compared with the corresponding fixed order execution, the hardware based random order execution is improved by at least 21 times the DPA resistance.
32 CFR 154.77 - Reporting requirements.
Code of Federal Regulations, 2010 CFR
2010-07-01
... took the action, using the enclosed format: (1) Number of Top Secret, Secret, and Confidential clearances issued; (2) Number of Top Secret, Secret, and Confidential clearances denied; (3) Number of Top...) Total number of personnel holding a clearance for Top Secret, Secret, Confidential and Sensitive...
The real code of leonardo da vinci.
Ose, Leiv
2008-02-01
Leonardo da Vinci was born in Italy. Among the researchers and scientists, he is favourably known for his remarkable efforts in scientific work. His investigations of atherosclerosis judiciously combine three separate fields of research. In 1506, he finished his masterpiece, painting of Mona Lisa. A careful clinical examination of the famous painting reveals a yellow irregular leather-like spot at the inner end of the left upper eyelid and a soft bumpy well-defined swelling of the dorsum of the right hand beneath the index finger about 3 cm long. This is probably the first case of familial hypercholesterolemia (FH). The FH code of Leonardo da Vinci was given immense consideration by scientists like Carl Muller, who described the xanthomas tuberosum and angina pectoris. On the contrary, Akira Endo searched for microbial metabolites that would inhibit HMG-CoA reductase, the rate-limiting enzyme in the synthesis of cholesterol and finally, Michael Brown and Joseph Goldstein published a remarkable series of elegant and insightful papers in the 70s and 80s. They established that the cellular uptake of low-density lipoprotein (LDL) essentially requires the LDL receptor. this was the real Code of Leonardo da Vinci.
The Real Code of Leonardo da Vinci
Ose, Leiv
2008-01-01
Leonardo da Vinci was born in Italy. Among the researchers and scientists, he is favourably known for his remarkable efforts in scientific work. His investigations of atherosclerosis judiciously combine three separate fields of research. In 1506, he finished his masterpiece, painting of Mona Lisa. A careful clinical examination of the famous painting reveals a yellow irregular leather-like spot at the inner end of the left upper eyelid and a soft bumpy well-defined swelling of the dorsum of the right hand beneath the index finger about 3 cm long. This is probably the first case of familial hypercholesterolemia (FH). The FH code of Leonardo da Vinci was given immense consideration by scientists like Carl Muller, who described the xanthomas tuberosum and angina pectoris. On the contrary, Akira Endo searched for microbial metabolites that would inhibit HMG-CoA reductase, the rate-limiting enzyme in the synthesis of cholesterol and finally, Michael Brown and Joseph Goldstein published a remarkable series of elegant and insightful papers in the 70s and 80s. They established that the cellular uptake of low-density lipoprotein (LDL) essentially requires the LDL receptor. In conclusion: this was the real Code of Leonardo da Vinci. PMID:19924278
Code of Federal Regulations, 2010 CFR
2010-07-01
... Security Policy Board. (b) Requirements for physical protection—(1) Top Secret. Top Secret information... of the alarm annunciation. (2) Secret. Secret information shall be stored in the same manner as Top.... Confidential information shall be stored in the same manner as prescribed for Top Secret or Secret information...
Cheng, Yali; Avis, Tyler J; Bolduc, Sébastien; Zhao, Yingyi; Anguenot, Raphaël; Neveu, Bertrand; Labbé, Caroline; Belzile, François; Bélanger, Richard R
2008-12-01
Secretion of recombinant proteins aims to reproduce the correct posttranslational modifications of the expressed protein while simplifying its recovery. In this study, secretion signal sequences from an abundantly secreted 34-kDa protein (P34) from Pseudozyma flocculosa were cloned. The efficiency of these sequences in the secretion of recombinant green fluorescent protein (GFP) was investigated in two Pseudozyma species and compared with other secretion signal sequences, from S. cerevisiae and Pseudozyma spp. The results indicate that various secretion signal sequences were functional and that the P34 signal peptide was the most effective secretion signal sequence in both P. flocculosa and P. antarctica. The cells correctly processed the secretion signal sequences, including P34 signal peptide, and mature GFP was recovered from the culture medium. This is the first report of functional secretion signal sequences in P. flocculosa. These sequences can be used to test the secretion of other recombinant proteins and for studying the secretion pathway in P. flocculosa and P. antarctica.
A new potential secretion pathway for recombinant proteins in Bacillus subtilis.
Wang, Guangqiang; Xia, Yongjun; Gu, Zhennan; Zhang, Hao; Chen, Yong Q; Chen, Haiqin; Ai, Lianzhong; Chen, Wei
2015-11-10
Secretion of cytoplasmic expressed proteins into growth media has significant advantages. Due to the lack of an outer membrane, Bacillus subtilis is considered as a desirable 'cell factory' for the secretion of recombinant proteins. However, bottlenecks in the classical pathway for the secretion of recombinant proteins limit its use on a wide scale. In this study, we attempted to use four typical non-classically secreted proteins as signals to export three recombinant model proteins to the culture medium. All four non-classically secreted proteins can direct the export of the intrinsically disordered nucleoskeletal-like protein (Nsp). Two of them can guide the secretion of alkaline phosphatase (PhoA). One can lead the secretion of the thermostable β-galactosidase BgaB, which cannot be secreted with the aid of typical Sec-dependent signal peptides. Our results show that the non-classically secreted proteins lead the recombinant proteins to the culture medium, and thus non-classical protein secretion pathways can be exploited as a novel secretion pathway for recombinant proteins.
Computing on quantum shared secrets
NASA Astrophysics Data System (ADS)
Ouyang, Yingkai; Tan, Si-Hui; Zhao, Liming; Fitzsimons, Joseph F.
2017-11-01
A (k ,n )-threshold secret-sharing scheme allows for a string to be split into n shares in such a way that any subset of at least k shares suffices to recover the secret string, but such that any subset of at most k -1 shares contains no information about the secret. Quantum secret-sharing schemes extend this idea to the sharing of quantum states. Here we propose a method of performing computation securely on quantum shared secrets. We introduce a (n ,n )-quantum secret sharing scheme together with a set of algorithms that allow quantum circuits to be evaluated securely on the shared secret without the need to decode the secret. We consider a multipartite setting, with each participant holding a share of the secret. We show that if there exists at least one honest participant, no group of dishonest participants can recover any information about the shared secret, independent of their deviations from the algorithm.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lee, Je Min, E-mail: jemin@knu.ac.kr; Department of Horticultural Science, Kyungpook National University, Daegu; Lee, Sang-Jik
Highlights: • Yeast secretion trap (YST) is a valuable tool for mining secretome. • A total of 80 secreted proteins are newly identified via YST in pepper fruits. • The secreted proteins are differentially regulated during pepper development and ripening. • Transient GFP-fusion assay and in planta secretion trap can effectively validate the secretion of proteins. - Abstract: Plant cells secrete diverse sets of constitutively- and conditionally-expressed proteins under various environmental and developmental states. Secreted protein populations, or secretomes have multiple functions, including defense responses, signaling, metabolic processes, and developmental regulation. To identify genes encoding secreted proteins that function inmore » fruit development and ripening, a yeast secretion trap (YST) screen was employed using pepper (Capsicum annuum) fruit cDNAs. The YST screen revealed 80 pepper fruit-related genes (CaPFRs) encoding secreted proteins including cell wall proteins, several of which have not been previously described. Transient GFP-fusion assay and an in planta secretion trap were used to validate the secretion of proteins encoded by selected YST clones. In addition, RNA gel blot analyses provided further insights into their expression and regulation during fruit development and ripening. Integrating our data, we conclude that the YST provides a valuable functional genomics tool for the identification of substantial numbers of novel secreted plant proteins that are associated with biological processes, including fruit development and ripening.« less
29 CFR 14.20 - Dissemination to individuals and firms outside the executive branch.
Code of Federal Regulations, 2010 CFR
2010-07-01
... following guidelines: (a) Top Secret information. All requests for Top Secret information by an individual... Confidential, Secret, or Top Secret information, a report providing all available details must be immediately... outside the United States. All requests from outside the United States for Top Secret, Secret or...
Byun, Hyunjong; Park, Jiyeon; Kim, Sun Chang; Ahn, Jung Hoon
2017-12-01
Efficient protein production for industrial and academic purposes often involves engineering microorganisms to produce and secrete target proteins into the culture. Pseudomonas fluorescens has a TliDEF ATP-binding cassette transporter, a type I secretion system, which recognizes C-terminal LARD3 signal sequence of thermostable lipase TliA. Many proteins are secreted by TliDEF in vivo when recombined with LARD3, but there are still others that cannot be secreted by TliDEF even when LARD3 is attached. However, the factors that determine whether or not a recombinant protein can be secreted through TliDEF are still unknown. Here, we recombined LARD3 with several proteins and examined their secretion through TliDEF. We found that the proteins secreted via LARD3 are highly negatively charged with highly-acidic isoelectric points (pI) lower than 5.5. Attaching oligo-aspartate to lower the pI of negatively-charged recombinant proteins improved their secretion, and attaching oligo-arginine to negatively-charged proteins blocked their secretion by LARD3. In addition, negatively supercharged green fluorescent protein (GFP) showed improved secretion, whereas positively supercharged GFP did not secrete. These results disclosed that proteins' acidic pI and net negative charge are major factors that determine their secretion through TliDEF. Homology modeling for TliDEF revealed that TliD dimer forms evolutionarily-conserved positively-charged clusters in its pore and substrate entrance site, which also partially explains the pI dependence of the TliDEF-dependent secretions. In conclusion, lowering the isoelectric point improved LARD3-mediated protein secretion, both widening the range of protein targets for efficient production via secretion and signifying an important aspect of ABC transporter-mediated secretions. © 2017 by The American Society for Biochemistry and Molecular Biology, Inc.
The Classification of E-Authentication Protocols for Targeted Applicability
2009-12-01
that the secret is only known to the Claimant and either the Verifier or Relying Party (V/RP), and serves as a form of identifier to the... secret against unauthorized observation. The protection of the secret is critical to prevent potential impersonation attacks. The secret is usually...confident that the Claimant is who he claims, if he is able to prove possession of this secret. 1. Symmetric vs. Asymmetric Secret The secret used by
40 CFR 370.64 - What information can I claim as trade secret or confidential?
Code of Federal Regulations, 2011 CFR
2011-07-01
... secret or confidential? 370.64 Section 370.64 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY... secret or confidential? (a) Trade secrets. You may be able to withhold the name of a specific chemical... trade secret. The requirements for withholding trade secret information are set forth in EPCRA section...
40 CFR 370.64 - What information can I claim as trade secret or confidential?
Code of Federal Regulations, 2010 CFR
2010-07-01
... secret or confidential? 370.64 Section 370.64 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY... secret or confidential? (a) Trade secrets. You may be able to withhold the name of a specific chemical... trade secret. The requirements for withholding trade secret information are set forth in EPCRA section...
40 CFR 370.64 - What information can I claim as trade secret or confidential?
Code of Federal Regulations, 2012 CFR
2012-07-01
... secret or confidential? 370.64 Section 370.64 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY... secret or confidential? (a) Trade secrets. You may be able to withhold the name of a specific chemical... trade secret. The requirements for withholding trade secret information are set forth in EPCRA section...
40 CFR 370.64 - What information can I claim as trade secret or confidential?
Code of Federal Regulations, 2013 CFR
2013-07-01
... secret or confidential? 370.64 Section 370.64 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY... secret or confidential? (a) Trade secrets. You may be able to withhold the name of a specific chemical... trade secret. The requirements for withholding trade secret information are set forth in EPCRA section...
40 CFR 370.64 - What information can I claim as trade secret or confidential?
Code of Federal Regulations, 2014 CFR
2014-07-01
... secret or confidential? 370.64 Section 370.64 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY... secret or confidential? (a) Trade secrets. You may be able to withhold the name of a specific chemical... trade secret. The requirements for withholding trade secret information are set forth in EPCRA section...
24-Hour Relativistic Bit Commitment.
Verbanis, Ephanielle; Martin, Anthony; Houlmann, Raphaël; Boso, Gianluca; Bussières, Félix; Zbinden, Hugo
2016-09-30
Bit commitment is a fundamental cryptographic primitive in which a party wishes to commit a secret bit to another party. Perfect security between mistrustful parties is unfortunately impossible to achieve through the asynchronous exchange of classical and quantum messages. Perfect security can nonetheless be achieved if each party splits into two agents exchanging classical information at times and locations satisfying strict relativistic constraints. A relativistic multiround protocol to achieve this was previously proposed and used to implement a 2-millisecond commitment time. Much longer durations were initially thought to be insecure, but recent theoretical progress showed that this is not so. In this Letter, we report on the implementation of a 24-hour bit commitment solely based on timed high-speed optical communication and fast data processing, with all agents located within the city of Geneva. This duration is more than 6 orders of magnitude longer than before, and we argue that it could be extended to one year and allow much more flexibility on the locations of the agents. Our implementation offers a practical and viable solution for use in applications such as digital signatures, secure voting and honesty-preserving auctions.
Sun, Hongxin; Niisato, Naomi; Nishio, Kyosuke; Hamilton, Kirk L.; Marunaka, Yoshinori
2014-01-01
Epithelial Cl− secretion plays important roles in water secretion preventing bacterial/viral infection and regulation of body fluid. We previously suggested that quercetin would be a useful compound for maintaining epithelial Cl− secretion at a moderate level irrespective of cAMP-induced stimulation. However, we need a compound that stimulates epithelial Cl− secretion even under cAMP-stimulated conditions, since in some cases epithelial Cl− secretion is not large enough even under cAMP-stimulated conditions. We demonstrated that quercetin and myricetin, flavonoids, stimulated epithelial Cl− secretion under basal conditions in epithelial A6 cells. We used forskolin, which activates adenylyl cyclase increasing cytosolic cAMP concentrations, to study the effects of quercetin and myricetin on cAMP-stimulated epithelial Cl− secretion. In the presence of forskolin, quercetin diminished epithelial Cl− secretion to a level similar to that with quercetin alone without forskolin. Conversely, myricetin further stimulated epithelial Cl− secretion even under forskolin-stimulated conditions. This suggests that the action of myricetin is via a cAMP-independent pathway. Therefore, myricetin may be a potentially useful compound to increase epithelial Cl− secretion under cAMP-stimulated conditions. In conclusion, myricetin would be a useful compound for prevention from bacterial/viral infection even under conditions that the amount of water secretion driven by cAMP-stimulated epithelial Cl− secretion is insufficient. PMID:24818160
Secure multi-party communication with quantum key distribution managed by trusted authority
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hughes, Richard John; Nordholt, Jane Elizabeth; Peterson, Charles Glen
Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD aremore » extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.« less
All-Optical Implementation of the Ant Colony Optimization Algorithm
Hu, Wenchao; Wu, Kan; Shum, Perry Ping; Zheludev, Nikolay I.; Soci, Cesare
2016-01-01
We report all-optical implementation of the optimization algorithm for the famous “ant colony” problem. Ant colonies progressively optimize pathway to food discovered by one of the ants through identifying the discovered route with volatile chemicals (pheromones) secreted on the way back from the food deposit. Mathematically this is an important example of graph optimization problem with dynamically changing parameters. Using an optical network with nonlinear waveguides to represent the graph and a feedback loop, we experimentally show that photons traveling through the network behave like ants that dynamically modify the environment to find the shortest pathway to any chosen point in the graph. This proof-of-principle demonstration illustrates how transient nonlinearity in the optical system can be exploited to tackle complex optimization problems directly, on the hardware level, which may be used for self-routing of optical signals in transparent communication networks and energy flow in photonic systems. PMID:27222098
YscU/FlhB of Yersinia pseudotuberculosis Harbors a C-terminal Type III Secretion Signal*
Login, Frédéric H.; Wolf-Watz, Hans
2015-01-01
All type III secretion systems (T3SS) harbor a member of the YscU/FlhB family of proteins that is characterized by an auto-proteolytic process that occurs at a conserved cytoplasmic NPTH motif. We have previously demonstrated that YscUCC, the C-terminal peptide generated by auto-proteolysis of Yersinia pseudotuberculosis YscU, is secreted by the T3SS when bacteria are grown in Ca2+-depleted medium at 37 °C. Here, we investigated the secretion of this early T3S-substrate and showed that YscUCC encompasses a specific C-terminal T3S signal within the 15 last residues (U15). U15 promoted C-terminal secretion of reporter proteins like GST and YopE lacking its native secretion signal. Similar to the “classical” N-terminal secretion signal, U15 interacted with the ATPase YscN. Although U15 is critical for YscUCC secretion, deletion of the C-terminal secretion signal of YscUCC did neither affect Yop secretion nor Yop translocation. However, these deletions resulted in increased secretion of YscF, the needle subunit. Thus, these results suggest that YscU via its C-terminal secretion signal is involved in regulation of the YscF secretion. PMID:26338709
Facilitating and securing offline e-medicine service through image steganography.
Kamal, A H M; Islam, M Mahfuzul
2014-06-01
E-medicine is a process to provide health care services to people using the Internet or any networking technology. In this Letter, a new idea is proposed to model the physical structure of the e-medicine system to better provide offline health care services. Smart cards are used to authenticate the user singly. A very unique technique is also suggested to verify the card owner's identity and to embed secret data to the card while providing patients' reports either at booths or at the e-medicine server system. The simulation results of card authentication and embedding procedure justify the proposed implementation.
Finite-key analysis for the 1-decoy state QKD protocol
NASA Astrophysics Data System (ADS)
Rusca, Davide; Boaron, Alberto; Grünenfelder, Fadri; Martin, Anthony; Zbinden, Hugo
2018-04-01
It has been shown that in the asymptotic case of infinite-key length, the 2-decoy state Quantum Key Distribution (QKD) protocol outperforms the 1-decoy state protocol. Here, we present a finite-key analysis of the 1-decoy method. Interestingly, we find that for practical block sizes of up to 108 bits, the 1-decoy protocol achieves for almost all experimental settings higher secret key rates than the 2-decoy protocol. Since using only one decoy is also easier to implement, we conclude that it is the best choice for QKD, in most common practical scenarios.
Hempel, Franziska; Maurer, Michael; Brockmann, Björn; Mayer, Christian; Biedenkopf, Nadine; Kelterbaum, Anne; Becker, Stephan; Maier, Uwe G
2017-07-27
The ideal protein expression system should provide recombinant proteins in high quality and quantity involving low production costs only. However, especially for complex therapeutic proteins like monoclonal antibodies many challenges remain to meet this goal and up to now production of monoclonal antibodies is very costly and delicate. Particularly, emerging disease outbreaks like Ebola virus in Western Africa in 2014-2016 make it necessary to reevaluate existing production platforms and develop robust and cheap alternatives that are easy to handle. In this study, we engineered the microalga Phaeodactylum tricornutum to produce monoclonal IgG antibodies against the nucleoprotein of Marburg virus, a close relative of Ebola virus causing severe hemorrhagic fever with high fatality rates in humans. Sequences for both chains of a mouse IgG antibody were retrieved from a murine hybridoma cell line and implemented in the microalgal system. Fully assembled antibodies were shown to be secreted by the alga and antibodies were proven to be functional in western blot, ELISA as well as IFA studies just like the original hybridoma produced IgG. Furthermore, synthetic variants with constant regions of a rabbit IgG and human IgG with optimized codon usage were produced and characterized. This study highlights the potential of microalgae as robust and low cost expression platform for monoclonal antibodies secreting IgG antibodies directly into the culture medium. Microalgae possess rapid growth rates, need basically only water, air and sunlight for cultivation and are very easy to handle.
Harris, David T; Sakiestewa, Debbie; Titone, Dominic; Witten, Mark
2007-05-01
The US Air Force has implemented the widespread use of JP-8 jet fuel in its operations, although a thorough understanding of its potential effects upon exposed personnel is unclear. Previous work has demonstrated that JP-8 exposure is immunosuppressive. In the present study, the potential mechanisms for the effects of JP-8 exposure on the immune system were investigated. Exposure of mice to JP-8 for 1 h/day resulted in immediate secretion of two immunosuppressive agents; namely, interleukin-10 (IL-10) and prostaglandin E2 (PGE2). JP-8 exposure rapidly induced a persistently high level of serum IL-10 and PGE2 at an exposure concentration of 1000 mg/m3. IL-10 levels peaked at 2 h post-JP-8 exposure and then stabilized at significantly elevated serum levels, while PGE2 levels peaked after 2-3 days of exposure and then stabilized. Elevated IL-10 and PGE2 levels may at least partially explain the effects of JP-8 exposure on immune function. Elevated IL-10 and PGE2 levels, however, cannot explain all of the effects due to JP-8 exposure (e.g., decreased organ weights and decreased viable immune cells), as treatment with a PGE2 inhibitor did not completely reverse the immunosuppressive effects of jet fuel exposure. Thus, low concentration JP-8 jet fuel exposures have significant effects on the immune system, which can be partially explained by the secretion of immunosuppressive modulators, which are cumulative over time.
Zou, Lingyun; Nan, Chonghan; Hu, Fuquan
2013-12-15
Various human pathogens secret effector proteins into hosts cells via the type IV secretion system (T4SS). These proteins play important roles in the interaction between bacteria and hosts. Computational methods for T4SS effector prediction have been developed for screening experimental targets in several isolated bacterial species; however, widely applicable prediction approaches are still unavailable In this work, four types of distinctive features, namely, amino acid composition, dipeptide composition, .position-specific scoring matrix composition and auto covariance transformation of position-specific scoring matrix, were calculated from primary sequences. A classifier, T4EffPred, was developed using the support vector machine with these features and their different combinations for effector prediction. Various theoretical tests were performed in a newly established dataset, and the results were measured with four indexes. We demonstrated that T4EffPred can discriminate IVA and IVB effectors in benchmark datasets with positive rates of 76.7% and 89.7%, respectively. The overall accuracy of 95.9% shows that the present method is accurate for distinguishing the T4SS effector in unidentified sequences. A classifier ensemble was designed to synthesize all single classifiers. Notable performance improvement was observed using this ensemble system in benchmark tests. To demonstrate the model's application, a genome-scale prediction of effectors was performed in Bartonella henselae, an important zoonotic pathogen. A number of putative candidates were distinguished. A web server implementing the prediction method and the source code are both available at http://bioinfo.tmmu.edu.cn/T4EffPred.
Matroids and quantum-secret-sharing schemes
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sarvepalli, Pradeep; Raussendorf, Robert
A secret-sharing scheme is a cryptographic protocol to distribute a secret state in an encoded form among a group of players such that only authorized subsets of the players can reconstruct the secret. Classically, efficient secret-sharing schemes have been shown to be induced by matroids. Furthermore, access structures of such schemes can be characterized by an excluded minor relation. No such relations are known for quantum secret-sharing schemes. In this paper we take the first steps toward a matroidal characterization of quantum-secret-sharing schemes. In addition to providing a new perspective on quantum-secret-sharing schemes, this characterization has important benefits. While previousmore » work has shown how to construct quantum-secret-sharing schemes for general access structures, these schemes are not claimed to be efficient. In this context the present results prove to be useful; they enable us to construct efficient quantum-secret-sharing schemes for many general access structures. More precisely, we show that an identically self-dual matroid that is representable over a finite field induces a pure-state quantum-secret-sharing scheme with information rate 1.« less
YscU/FlhB of Yersinia pseudotuberculosis Harbors a C-terminal Type III Secretion Signal.
Login, Frédéric H; Wolf-Watz, Hans
2015-10-23
All type III secretion systems (T3SS) harbor a member of the YscU/FlhB family of proteins that is characterized by an auto-proteolytic process that occurs at a conserved cytoplasmic NPTH motif. We have previously demonstrated that YscUCC, the C-terminal peptide generated by auto-proteolysis of Yersinia pseudotuberculosis YscU, is secreted by the T3SS when bacteria are grown in Ca(2+)-depleted medium at 37 °C. Here, we investigated the secretion of this early T3S-substrate and showed that YscUCC encompasses a specific C-terminal T3S signal within the 15 last residues (U15). U15 promoted C-terminal secretion of reporter proteins like GST and YopE lacking its native secretion signal. Similar to the "classical" N-terminal secretion signal, U15 interacted with the ATPase YscN. Although U15 is critical for YscUCC secretion, deletion of the C-terminal secretion signal of YscUCC did neither affect Yop secretion nor Yop translocation. However, these deletions resulted in increased secretion of YscF, the needle subunit. Thus, these results suggest that YscU via its C-terminal secretion signal is involved in regulation of the YscF secretion. © 2015 by The American Society for Biochemistry and Molecular Biology, Inc.
Autocrine effect of Zn²⁺ on the glucose-stimulated insulin secretion.
Slepchenko, Kira G; Daniels, Nigel A; Guo, Aili; Li, Yang V
2015-09-01
It is well known that zinc (Zn(2+)) is required for the process of insulin biosynthesis and the maturation of insulin secretory granules in pancreatic beta (β)-cells, and that changes in Zn(2+) levels in the pancreas have been found to be associated with diabetes. Glucose-stimulation causes a rapid co-secretion of Zn(2+) and insulin with similar kinetics. However, we do not know whether Zn(2+) regulates insulin availability and secretion. Here we investigated the effect of Zn(2+) on glucose-stimulated insulin secretion (GSIS) in isolated mouse pancreatic islets. Whereas Zn(2+) alone (control) had no effect on the basal secretion of insulin, it significantly inhibited GSIS. The application of CaEDTA, by removing the secreted Zn(2+) from the extracellular milieu of the islets, resulted in significantly increased GSIS, suggesting an overall inhibitory role of secreted Zn(2+) on GSIS. The inhibitory action of Zn(2+) was mostly mediated through the activities of KATP/Ca(2+) channels. Furthermore, during brief paired-pulse glucose-stimulated Zn(2+) secretion (GSZS), Zn(2+) secretion following the second pulse was significantly attenuated, probably by the secreted endogenous Zn(2+) after the first pulse. Such an inhibition on Zn(2+) secretion following the second pulse was completely reversed by Zn(2+) chelation, suggesting a negative feedback mechanism, in which the initial glucose-stimulated Zn(2+) release inhibits subsequent Zn(2+) secretion, subsequently inhibiting insulin co-secretion as well. Taken together, these data suggest a negative feedback mechanism on GSZS and GSIS by Zn(2+) secreted from β-cells, and the co-secreted Zn(2+) may act as an autocrine inhibitory modulator.
10 CFR 1045.17 - Classification levels.
Code of Federal Regulations, 2010 CFR
2010-01-01
...) Top Secret. The Director of Classification shall classify RD information Top Secret if it is vital to... exceptionally grave damage to the national security. Examples of RD information that warrant Top Secret... comprehensive to warrant designation as Top Secret. Examples of RD information that warrant Secret...
Salmonella-secreted Virulence Factors
DOE Office of Scientific and Technical Information (OSTI.GOV)
Heffron, Fred; Niemann, George; Yoon, Hyunjin
In this short review we discuss secreted virulence factors of Salmonella, which directly affect Salmonella interaction with its host. Salmonella secretes protein to subvert host defenses but also, as discussed, to reduce virulence thereby permitting the bacteria to persist longer and more successfully disperse. The type III secretion system (TTSS) is the best known and well studied of the mechanisms that enable secretion from the bacterial cytoplasm to the host cell cytoplasm. Other secretion systems include outer membrane vesicles, which are present in all Gram-negative bacteria examined to date, two-partner secretion, and type VI secretion will also be addressed. Excellentmore » reviews of Salmonella secreted effectors have focused on themes such as actin rearrangements, vesicular trafficking, ubiquitination, and the activities of the virulence factors themselves. This short review is based on S. Typhimurium infection of mice because it is a model of typhoid like disease in humans. We have organized effectors in terms of events that happen during the infection cycle and how secreted effectors may be involved.« less
Verifiable Secret Redistribution
2001-10-01
but they are not trusted with secret. Thus, we require a protocol for redistribution without reconstruction of the secret . We also require...verification that the new shareholders have valid shares (ones that can be used to reconstruct the secret ). We present a new protocol to perform non...secret to shareholders in Shamir’s (m,n) threshold scheme (one in which we require m of n shares to reconstruct the secret ), and wish to redistribute the
Unitary reconstruction of secret for stabilizer-based quantum secret sharing
NASA Astrophysics Data System (ADS)
Matsumoto, Ryutaroh
2017-08-01
We propose a unitary procedure to reconstruct quantum secret for a quantum secret sharing scheme constructed from stabilizer quantum error-correcting codes. Erasure correcting procedures for stabilizer codes need to add missing shares for reconstruction of quantum secret, while unitary reconstruction procedures for certain class of quantum secret sharing are known to work without adding missing shares. The proposed procedure also works without adding missing shares.
Megli, Christina J.
2013-01-01
Type IV pili are important for microcolony formation, biofilm formation, twitching motility, and attachment. We and others have shown that type IV pili are important for protein secretion across the outer membrane, similar to type II secretion systems. This study explored the relationship between protein secretion and pilus formation in Vibrio cholerae. The toxin-coregulated pilus (TCP), a type IV pilus required for V. cholerae pathogenesis, is necessary for the secretion of the colonization factor TcpF (T. J. Kirn, N. Bose, and R. K. Taylor, Mol. Microbiol. 49:81–92, 2003). This phenomenon is not unique to V. cholerae; secreted virulence factors that are dependent on the presence of components of the type IV pilus biogenesis apparatus for secretion have been reported with Dichelobacter nodosus (R. M. Kennan, O. P. Dhungyel, R. J. Whittington, J. R. Egerton, and J. I. Rood, J. Bacteriol. 183:4451–4458, 2001) and Francisella tularensis (A. J. Hager et al., Mol. Microbiol. 62:227–237, 2006). Using site-directed mutagenesis, we demonstrated that the secretion of TcpF is dependent on the presence of selected amino acid R groups at position five. We were unable to find other secretion determinants, suggesting that Y5 is the major secretion determinant within TcpF. We also report that proteins secreted in a type IV pilus biogenesis apparatus-dependent manner have a YXS motif within the first 15 amino acids following the Sec cleavage site. The YXS motif is not present in proteins secreted by type II secretion systems, indicating that this is unique to type IV pilus-mediated secretion. Moreover, we show that TcpF interacts with the pilin TcpA, suggesting that these proteins are secreted by the type IV pilus biogenesis system. These data provide a starting point for understanding how type IV pili can mediate secretion of virulence factors important for bacterial pathogenesis. PMID:23564177
5 CFR 1312.27 - Top secret control.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 5 Administrative Personnel 3 2011-01-01 2011-01-01 false Top secret control. 1312.27 Section 1312... Classified Information § 1312.27 Top secret control. The EOP Security Officer serves as the Top Secret... Top Secret material. The ATSCOs will be responsible for the accountability and custodianship of Top...
5 CFR 1312.27 - Top secret control.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 5 Administrative Personnel 3 2013-01-01 2013-01-01 false Top secret control. 1312.27 Section 1312... Classified Information § 1312.27 Top secret control. The EOP Security Officer serves as the Top Secret... Top Secret material. The ATSCOs will be responsible for the accountability and custodianship of Top...
30 CFR 47.81 - Provisions for withholding trade secrets.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Provisions for withholding trade secrets. 47.81... TRAINING HAZARD COMMUNICATION (HazCom) Trade Secret Hazardous Chemical § 47.81 Provisions for withholding trade secrets. (a) Operators may withhold the identity of a trade secret chemical, including the name...
18 CFR 401.75 - Protection of trade secrets; Confidential information.
Code of Federal Regulations, 2010 CFR
2010-04-01
... secrets; Confidential information. 401.75 Section 401.75 Conservation of Power and Water Resources... to Decisions of the Executive Director in Water Qualtity Cases § 401.75 Protection of trade secrets; Confidential information. No person shall be required in such report to divulge trade secrets or secret...
5 CFR 1312.27 - Top secret control.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 5 Administrative Personnel 3 2012-01-01 2012-01-01 false Top secret control. 1312.27 Section 1312... Classified Information § 1312.27 Top secret control. The EOP Security Officer serves as the Top Secret... Top Secret material. The ATSCOs will be responsible for the accountability and custodianship of Top...
30 CFR 47.81 - Provisions for withholding trade secrets.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 30 Mineral Resources 1 2014-07-01 2014-07-01 false Provisions for withholding trade secrets. 47.81... TRAINING HAZARD COMMUNICATION (HazCom) Trade Secret Hazardous Chemical § 47.81 Provisions for withholding trade secrets. (a) Operators may withhold the identity of a trade secret chemical, including the name...
30 CFR 47.81 - Provisions for withholding trade secrets.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 30 Mineral Resources 1 2011-07-01 2011-07-01 false Provisions for withholding trade secrets. 47.81... TRAINING HAZARD COMMUNICATION (HazCom) Trade Secret Hazardous Chemical § 47.81 Provisions for withholding trade secrets. (a) Operators may withhold the identity of a trade secret chemical, including the name...
5 CFR 1312.27 - Top secret control.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 5 Administrative Personnel 3 2014-01-01 2014-01-01 false Top secret control. 1312.27 Section 1312... Classified Information § 1312.27 Top secret control. The EOP Security Officer serves as the Top Secret... Top Secret material. The ATSCOs will be responsible for the accountability and custodianship of Top...
30 CFR 47.81 - Provisions for withholding trade secrets.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 30 Mineral Resources 1 2013-07-01 2013-07-01 false Provisions for withholding trade secrets. 47.81... TRAINING HAZARD COMMUNICATION (HazCom) Trade Secret Hazardous Chemical § 47.81 Provisions for withholding trade secrets. (a) Operators may withhold the identity of a trade secret chemical, including the name...
18 CFR 401.75 - Protection of trade secrets; Confidential information.
Code of Federal Regulations, 2012 CFR
2012-04-01
... secrets; Confidential information. 401.75 Section 401.75 Conservation of Power and Water Resources... to Decisions of the Executive Director in Water Qualtity Cases § 401.75 Protection of trade secrets; Confidential information. No person shall be required in such report to divulge trade secrets or secret...
18 CFR 401.75 - Protection of trade secrets; Confidential information.
Code of Federal Regulations, 2014 CFR
2014-04-01
... secrets; Confidential information. 401.75 Section 401.75 Conservation of Power and Water Resources... to Decisions of the Executive Director in Water Qualtity Cases § 401.75 Protection of trade secrets; Confidential information. No person shall be required in such report to divulge trade secrets or secret...
18 CFR 401.75 - Protection of trade secrets; Confidential information.
Code of Federal Regulations, 2013 CFR
2013-04-01
... secrets; Confidential information. 401.75 Section 401.75 Conservation of Power and Water Resources... to Decisions of the Executive Director in Water Qualtity Cases § 401.75 Protection of trade secrets; Confidential information. No person shall be required in such report to divulge trade secrets or secret...
5 CFR 1312.27 - Top secret control.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Top secret control. 1312.27 Section 1312... Classified Information § 1312.27 Top secret control. The EOP Security Officer serves as the Top Secret... Top Secret material. The ATSCOs will be responsible for the accountability and custodianship of Top...
Mechanisms of bicarbonate secretion: lessons from the airways.
Bridges, Robert J
2012-08-01
Early studies showed that airway cells secrete HCO(3)(-) in response to cAMP-mediated agonists and HCO(3)(-) secretion was impaired in cystic fibrosis (CF). Studies with Calu-3 cells, an airway serous model with high expression of CFTR, also show the secretion of HCO(3)(-) when cells are stimulated with cAMP-mediated agonists. Activation of basolateral membrane hIK-1 K(+) channels inhibits HCO(3)(-) secretion and stimulates Cl(-) secretion. CFTR mediates the exit of both HCO(3)(-) and Cl(-) across the apical membrane. Entry of HCO(3)(-) on a basolateral membrane NBC or Cl(-) on the NKCC determines which anion is secreted. Switching between these two secreted anions is determined by the activity of hIK-1 K(+) channels.
Semiquantum secret sharing using entangled states
DOE Office of Scientific and Technical Information (OSTI.GOV)
Li Qin; Department of Computer Science, Sun Yat-sen University, Guangzhou 510006; Department of Mathematics, Hong Kong Baptist University, Kowloon
Secret sharing is a procedure for sharing a secret among a number of participants such that only the qualified subsets of participants have the ability to reconstruct the secret. Even in the presence of eavesdropping, secret sharing can be achieved when all the members are quantum. So what happens if not all the members are quantum? In this paper, we propose two semiquantum secret sharing protocols by using maximally entangled Greenberger-Horne-Zeilinger-type states in which quantum Alice shares a secret with two classical parties, Bob and Charlie, in a way that both parties are sufficient to obtain the secret, but onemore » of them cannot. The presented protocols are also shown to be secure against eavesdropping.« less
Hoopoes color their eggs with antimicrobial uropygial secretions
NASA Astrophysics Data System (ADS)
Soler, Juan J.; Martín-Vivaldi, M.; Peralta-Sánchez, J. M.; Arco, L.; Juárez-García-Pelayo, N.
2014-09-01
Uropygial gland secretions are used as cosmetics by some species of birds to color and enhance properties of feathers and teguments, which may signal individual quality. Uropygial secretions also reach eggshells during incubation and, therefore, may influence the coloration of birds' eggs, a trait that has attracted the attention of evolutionary biologists for more than one century. The color of hoopoe eggs typically changes along incubation, from bluish-gray to greenish-brown. Here, we test experimentally the hypothesis that dark uropygial secretion of females is responsible for such drastic color change. Moreover, since uropygial secretion of hoopoes has antimicrobial properties, we also explore the association between color and antimicrobial activity of the uropygial secretion of females. We found that eggs stayed bluish-gray in nests where female access to the uropygial secretion was experimentally blocked. Furthermore, experimental eggs that were maintained in incubators and manually smeared with uropygial secretion experienced similar color changes that naturally incubated eggs did, while control eggs that were not in contact with the secretions did not experience such color changes. All these results strongly support the hypothesis that female hoopoes use their uropygial gland secretion to color the eggs. Moreover, saturation of the uropygial secretion was associated with antimicrobial activity against Bacillus licheniformis. Given the known antimicrobial potential of uropygial secretions of birds, this finding opens the possibility that in scenarios of sexual selection, hoopoes in particular and birds in general signal antimicrobial properties of their uropygial secretion by mean of changes in egg coloration along incubation.
Case, R. M.; Scratcherd, T.
1974-01-01
1. The secretion of sodium, potassium and lithium has been studied in the isolated cat pancreas, perfused with bicarbonate buffered saline solutions of varying composition and osmolality, and stimulated maximally with secretin. 2. Under isosmolal conditions, when perfusate sodium chloride was replaced by sucrose, sodium secretion and potassium secretion were directly related to perfusate sodium concentration, [Na]p. 3. When osmolality was varied by increasing or decreasing perfusate sodium chloride concentration, the secretion of sodium and of potassium were maximal at [Na]p of about 120 and 80 mM respectively. 4. At a given [Na]p, sodium secretion was greater under hypo-osmolal conditions than under isosmolal conditions. 5. When potassium concentration was varied over the range 0-130 mM under isosmolal conditions, by adjusting perfusate NaCl concentration, the secretion of potassium and of sodium were maximal at [K]p of about 50 and 10 mM respectively. Water flux was maximal at a [K]p of 10-15 mM. The concentration of potassium in the secretion was almost identical with that in the perfusate over the whole concentration range. 6. Replacement of perfusate sodium by lithium reduced the volume of secretion, though a small secretion was maintained even in the complete absence of sodium. The concentration of lithium in the secretion was generally slightly greater than that in the perfusate. 7. Omission of potassium from the perfusate reduced secretion by about 65%. Rubidium was a complete substitute for potassium; caesium was not. 8. Energy for secretion is derived largely from oxidative phosphorylation. Secretion was reduced by more than 90% under anaerobic conditions and in the presence of dinitrophenol or cyanide. Removal of glucose from the perfusate reduced secretion by more than 50% within 30 min; lactate was a complete substitute for glucose. 9. Ouabain, ethacrinic acid and frusimide, known inhibitors of Na+, K+-ATPase activity, all inhibited pancreatic electrolyte secretion. 10. The observations are interpreted with reference to the nature of active transport processes involved in pancreatic electrolyte secretion. PMID:4281836
Topics in quantum cryptography, quantum error correction, and channel simulation
NASA Astrophysics Data System (ADS)
Luo, Zhicheng
In this thesis, we mainly investigate four different topics: efficiently implementable codes for quantum key expansion [51], quantum error-correcting codes based on privacy amplification [48], private classical capacity of quantum channels [44], and classical channel simulation with quantum side information [49, 50]. For the first topic, we propose an efficiently implementable quantum key expansion protocol, capable of increasing the size of a pre-shared secret key by a constant factor. Previously, the Shor-Preskill proof [64] of the security of the Bennett-Brassard 1984 (BB84) [6] quantum key distribution protocol relied on the theoretical existence of good classical error-correcting codes with the "dual-containing" property. But the explicit and efficiently decodable construction of such codes is unknown. We show that we can lift the dual-containing constraint by employing the non-dual-containing codes with excellent performance and efficient decoding algorithms. For the second topic, we propose a construction of Calderbank-Shor-Steane (CSS) [19, 68] quantum error-correcting codes, which are originally based on pairs of mutually dual-containing classical codes, by combining a classical code with a two-universal hash function. We show, using the results of Renner and Koenig [57], that the communication rates of such codes approach the hashing bound on tensor powers of Pauli channels in the limit of large block-length. For the third topic, we prove a regularized formula for the secret key assisted capacity region of a quantum channel for transmitting private classical information. This result parallels the work of Devetak on entanglement assisted quantum communication capacity. This formula provides a new family protocol, the private father protocol, under the resource inequality framework that includes the private classical communication without the assisted secret keys as a child protocol. For the fourth topic, we study and solve the problem of classical channel simulation with quantum side information at the receiver. Our main theorem has two important corollaries: rate-distortion theory with quantum side information and common randomness distillation. Simple proofs of achievability of classical multi-terminal source coding problems can be made via a unified approach using the channel simulation theorem as building blocks. The fully quantum generalization of the problem is also conjectured with outer and inner bounds on the achievable rate pairs.
75 FR 735 - Original Classification Authority
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-05
... classify information originally as ``Top Secret'' or ``Secret'': TOP SECRET Executive Office of the... Space Administration The Director, Information Security Oversight Office SECRET Executive Office of the...
Chida, Koji; Morohashi, Gembu; Fuji, Hitoshi; Magata, Fumihiko; Fujimura, Akiko; Hamada, Koki; Ikarashi, Dai; Yamamoto, Ryuichi
2014-01-01
Background and objective While the secondary use of medical data has gained attention, its adoption has been constrained due to protection of patient privacy. Making medical data secure by de-identification can be problematic, especially when the data concerns rare diseases. We require rigorous security management measures. Materials and methods Using secure computation, an approach from cryptography, our system can compute various statistics over encrypted medical records without decrypting them. An issue of secure computation is that the amount of processing time required is immense. We implemented a system that securely computes healthcare statistics from the statistical computing software ‘R’ by effectively combining secret-sharing-based secure computation with original computation. Results Testing confirmed that our system could correctly complete computation of average and unbiased variance of approximately 50 000 records of dummy insurance claim data in a little over a second. Computation including conditional expressions and/or comparison of values, for example, t test and median, could also be correctly completed in several tens of seconds to a few minutes. Discussion If medical records are simply encrypted, the risk of leaks exists because decryption is usually required during statistical analysis. Our system possesses high-level security because medical records remain in encrypted state even during statistical analysis. Also, our system can securely compute some basic statistics with conditional expressions using ‘R’ that works interactively while secure computation protocols generally require a significant amount of processing time. Conclusions We propose a secure statistical analysis system using ‘R’ for medical data that effectively integrates secret-sharing-based secure computation and original computation. PMID:24763677
Chida, Koji; Morohashi, Gembu; Fuji, Hitoshi; Magata, Fumihiko; Fujimura, Akiko; Hamada, Koki; Ikarashi, Dai; Yamamoto, Ryuichi
2014-10-01
While the secondary use of medical data has gained attention, its adoption has been constrained due to protection of patient privacy. Making medical data secure by de-identification can be problematic, especially when the data concerns rare diseases. We require rigorous security management measures. Using secure computation, an approach from cryptography, our system can compute various statistics over encrypted medical records without decrypting them. An issue of secure computation is that the amount of processing time required is immense. We implemented a system that securely computes healthcare statistics from the statistical computing software 'R' by effectively combining secret-sharing-based secure computation with original computation. Testing confirmed that our system could correctly complete computation of average and unbiased variance of approximately 50,000 records of dummy insurance claim data in a little over a second. Computation including conditional expressions and/or comparison of values, for example, t test and median, could also be correctly completed in several tens of seconds to a few minutes. If medical records are simply encrypted, the risk of leaks exists because decryption is usually required during statistical analysis. Our system possesses high-level security because medical records remain in encrypted state even during statistical analysis. Also, our system can securely compute some basic statistics with conditional expressions using 'R' that works interactively while secure computation protocols generally require a significant amount of processing time. We propose a secure statistical analysis system using 'R' for medical data that effectively integrates secret-sharing-based secure computation and original computation. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.
Diverse C-Terminal Sequences Involved in Flavobacterium johnsoniae Protein Secretion
Kulkarni, Surashree S.; Zhu, Yongtao; Brendel, Colton J.
2017-01-01
ABSTRACT Flavobacterium johnsoniae and many related bacteria secrete proteins across the outer membrane using the type IX secretion system (T9SS). Proteins secreted by T9SSs have amino-terminal signal peptides for export across the cytoplasmic membrane by the Sec system and carboxy-terminal domains (CTDs) targeting them for secretion across the outer membrane by the T9SS. Most but not all T9SS CTDs belong to the family TIGR04183 (type A CTDs). We functionally characterized diverse CTDs for secretion by the F. johnsoniae T9SS. Attachment of the CTDs from F. johnsoniae RemA, AmyB, and ChiA to the foreign superfolder green fluorescent protein (sfGFP) that had a signal peptide at the amino terminus resulted in secretion across the outer membrane. In each case, approximately 80 to 100 amino acids from the extreme carboxy termini were needed for efficient secretion. Several type A CTDs from distantly related members of the phylum Bacteroidetes functioned in F. johnsoniae, supporting the secretion of sfGFP by the F. johnsoniae T9SS. F. johnsoniae SprB requires the T9SS for secretion but lacks a type A CTD. It has a conserved C-terminal domain belonging to the family TIGR04131, which we refer to as a type B CTD. The CTD of SprB was required for its secretion, but attachment of C-terminal regions of SprB of up to 1,182 amino acids to sfGFP failed to result in secretion. Additional features outside the C-terminal region of SprB may be required for its secretion. IMPORTANCE Type IX protein secretion systems (T9SSs) are common in but limited to members of the phylum Bacteroidetes. Most proteins that are secreted by T9SSs have conserved carboxy-terminal domains that belong to the protein domain family TIGR04183 (type A CTDs) or TIGR04131 (type B CTDs). Here, we identify features of T9SS CTDs of F. johnsoniae that are required for protein secretion and demonstrate that type A CTDs from distantly related members of the phylum function with the F. johnsoniae T9SS to secrete the foreign protein sfGFP. In contrast, type B CTDs failed to target sfGFP for secretion, suggesting a more complex association with the T9SS. PMID:28396348
Martens, Chelsea J.; Inglis, Sarah K.; Valentine, Vincent G.; Garrison, Jennifer; Conner, Gregory E.
2011-01-01
To better understand how airways produce thick airway mucus, nonvolatile solids were measured in liquid secreted by bronchi from normal pig, cystic fibrosis (CF) human, and non-CF human lungs. Bronchi were exposed to various secretagogues and anion secretion inhibitors to induce a range of liquid volume secretion rates. In all three groups, the relationship of solids concentration (percent nonvolatile solids) to liquid volume secretion rate was curvilinear, with higher solids concentration associated with lower rates of liquid volume secretion. In contrast, the secretion rates of solids mass and water mass as functions of liquid volume secretion rates exhibited positive linear correlations. The y-intercepts of the solids mass-liquid volume secretion relationships for all three groups were positive, thus accounting for the higher solids concentrations in airway liquid at low rates of secretion. Predictive models derived from the solids mass and water mass linear equations fit the experimental percent solids data for the three groups. The ratio of solids mass secretion to liquid volume secretion was 5.2 and 2.4 times higher for CF bronchi than for pig and non-CF bronchi, respectively. These results indicate that normal pig, non-CF human, and CF human bronchi produce a high-percent-solids mucus (>8%) at low rates of liquid volume secretion (≤1.0 μl·cm−2·h−1). However, CF bronchi produce mucus with twice the percent solids (∼8%) of pig or non-CF human bronchi at liquid volume secretion rates ≥4.0 μl·cm−2·h−1. PMID:21622844
An Image Secret Sharing Method
2006-07-01
the secret image in lossless manner and (2) any or fewer image shares cannot get sufficient information to reveal the ... secret image. It is an effective, reliable and secure method to prevent the secret image from being lost, stolen or corrupted. In comparison with...other image secret sharing methods, this approach’s advantages are its large compression rate on the size of the image shares, its strong protection of the secret image and its ability for real-time
Fändriks, L; Stage, L
1986-12-01
Chloralosed cats were acutely vagotomized, their splanchnic nerves cut and the adrenal glands ligated. The gastric lumen was perfused with isotonic NaCl and gastric motility was monitored as changes in hydrostatic pressure within the perfusion circuit. Gastric secretion of H+ and HCO3- were calculated from continuous measurements of pH and PCO2. Methodological tests ex vivo showed good accuracy of the estimations. Recovery of H+ after HCl instillation into the stomach in vivo was almost complete, while HCO3- recovery after NaHCO3 instillations was 85-95%. Pentagastrin (10 micrograms kg-1 h-1 i.v.) stimulated gastric contractile activity and increased gastric H+ secretion 30-fold, while HCO3- secretion decreased somewhat. Carbachol (4 micrograms kg-1 h-1) induced gastric contractions and increased H+ secretion by 400% and HCO3- output by 100-130%. Electrical stimulation of the cut vagal nerves (10 Hz for 10 min) induced well known gastric motor responses and increased gastric H+ secretion 20-fold preceded by a transient doubling of HCO3- secretion. Omeprazole, a selective inhibitor of gastric H+ secretion, decreased the vagally induced H+ secretion, while recorded gastric HCO3- secretion was clearly enhanced. In conclusion, the technique permits simultaneous recordings of rapid alterations of gastric motility and H+ and HCO3- secretions. However, HCO3- secretion was modestly underestimated, probably due to mucosal CO2 absorption.
Khawaja, A M; Liu, Y C; Rogers, D F
1999-01-01
Neural mechanisms contribute to control of mucus secretion in the airways. Fenspiride is a non-steroidal antiinflammatory agent which has a variety of actions, including inhibition of neurogenic bronchoconstriction. The effect of fenspiride on neurally-mediated mucus secretion was investigated in vitro in electrically-stimulated ferret trachea, using(35)SO(4)as a mucus marker. Cholinergic secretory responses were isolated using adrenoceptor and tachykinin receptor antagonists. Tachykinin responses were isolated using cholinoceptor and adrenoceptor antagonists. Electrical stimulation increased cholinergic secretion by;90% and tachykininergic secretion by;40%. Fenspiride (1 microM-1 mM) tended to inhibit cholinergic secretion in a concentration-dependent manner, although only at 1 mM was inhibition (by 87%) significant. Inhibition by fenspiride of tachykininergic secretion was not concentration-dependent, and again significant inhibition (by 85%) was only at 1 mM. Inhibition was not due to loss of tissue viability, as assessed by restitution of secretory response after washout. Fenspiride also inhibited secretion induced by acetylcholine, but did not inhibit substance P-induced secretion. Histamine receptor antagonists increased basal secretion by 164%, whereas fenspiride did not affect basal secretion. We conclude that, in ferret trachea in vitro, fenspiride inhibits neurally-mediated mucus secretion, with antimuscarinic action the most plausible mechanism of action, but not necessarily the only mechanism. Copyright 1999 Academic Press.
31 CFR 401.1 - Secret Service agents authorized to make seizures.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 31 Money and Finance:Treasury 2 2012-07-01 2012-07-01 false Secret Service agents authorized to... Finance (Continued) SECRET SERVICE, DEPARTMENT OF THE TREASURY SEIZURE AND FORFEITURE OF VESSELS, VEHICLES... Secret Service agents authorized to make seizures. All officers of the U.S. Secret Service engaged in the...
30 CFR 47.81 - Provisions for withholding trade secrets.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 30 Mineral Resources 1 2012-07-01 2012-07-01 false Provisions for withholding trade secrets. 47.81... withholding trade secrets. (a) Operators may withhold the identity of a trade secret chemical, including the... trade secret, (2) Identifies the chemical in a way that it can be referred to without disclosing the...
31 CFR 401.1 - Secret Service agents authorized to make seizures.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 31 Money and Finance: Treasury 2 2014-07-01 2014-07-01 false Secret Service agents authorized to... Finance (Continued) SECRET SERVICE, DEPARTMENT OF THE TREASURY SEIZURE AND FORFEITURE OF VESSELS, VEHICLES... Secret Service agents authorized to make seizures. All officers of the U.S. Secret Service engaged in the...
31 CFR 401.1 - Secret Service agents authorized to make seizures.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 31 Money and Finance:Treasury 2 2013-07-01 2013-07-01 false Secret Service agents authorized to... Finance (Continued) SECRET SERVICE, DEPARTMENT OF THE TREASURY SEIZURE AND FORFEITURE OF VESSELS, VEHICLES... Secret Service agents authorized to make seizures. All officers of the U.S. Secret Service engaged in the...
31 CFR Appendix D to Subpart C of... - United States Secret Service
Code of Federal Regulations, 2010 CFR
2010-07-01
... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false United States Secret Service D... Secret Service 1. In general. This appendix applies to the United States Secret Service. It sets forth... requests for notification and access to records and accountings of disclosures for the United States Secret...
31 CFR Appendix D to Subpart C of... - United States Secret Service
Code of Federal Regulations, 2011 CFR
2011-07-01
... 31 Money and Finance: Treasury 1 2011-07-01 2011-07-01 false United States Secret Service D... Secret Service 1. In general. This appendix applies to the United States Secret Service. It sets forth... requests for notification and access to records and accountings of disclosures for the United States Secret...
31 CFR 401.1 - Secret Service agents authorized to make seizures.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Secret Service agents authorized to... Finance (Continued) SECRET SERVICE, DEPARTMENT OF THE TREASURY SEIZURE AND FORFEITURE OF VESSELS, VEHICLES... Secret Service agents authorized to make seizures. All officers of the U.S. Secret Service engaged in the...
31 CFR Appendix D to Subpart C of... - United States Secret Service
Code of Federal Regulations, 2012 CFR
2012-07-01
... 31 Money and Finance: Treasury 1 2012-07-01 2012-07-01 false United States Secret Service D... Secret Service 1. In general. This appendix applies to the United States Secret Service. It sets forth... requests for notification and access to records and accountings of disclosures for the United States Secret...
31 CFR 401.1 - Secret Service agents authorized to make seizures.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 31 Money and Finance:Treasury 2 2011-07-01 2011-07-01 false Secret Service agents authorized to... Finance (Continued) SECRET SERVICE, DEPARTMENT OF THE TREASURY SEIZURE AND FORFEITURE OF VESSELS, VEHICLES... Secret Service agents authorized to make seizures. All officers of the U.S. Secret Service engaged in the...
31 CFR Appendix D to Subpart C of... - United States Secret Service
Code of Federal Regulations, 2013 CFR
2013-07-01
... 31 Money and Finance: Treasury 1 2013-07-01 2013-07-01 false United States Secret Service D... Secret Service 1. In general. This appendix applies to the United States Secret Service. It sets forth... requests for notification and access to records and accountings of disclosures for the United States Secret...
31 CFR Appendix D to Subpart C of... - United States Secret Service
Code of Federal Regulations, 2014 CFR
2014-07-01
... 31 Money and Finance: Treasury 1 2014-07-01 2014-07-01 false United States Secret Service D... Secret Service 1. In general. This appendix applies to the United States Secret Service. It sets forth... requests for notification and access to records and accountings of disclosures for the United States Secret...
Authentication Without Secrets
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pierson, Lyndon G.; Robertson, Perry J.
This work examines a new approach to authentication, which is the most fundamental security primitive that underpins all cyber security protections. Current Internet authentication techniques require the protection of one or more secret keys along with the integrity protection of the algorithms/computations designed to prove possession of the secret without actually revealing it. Protecting a secret requires physical barriers or encryption with yet another secret key. The reason to strive for "Authentication without Secret Keys" is that protecting secrets (even small ones only kept in a small corner of a component or device) is much harder than protecting the integritymore » of information that is not secret. Promising methods are examined for authentication of components, data, programs, network transactions, and/or individuals. The successful development of authentication without secret keys will enable far more tractable system security engineering for high exposure, high consequence systems by eliminating the need for brittle protection mechanisms to protect secret keys (such as are now protected in smart cards, etc.). This paper is a re-release of SAND2009-7032 with new figures numerous edits.« less
Investment in secreted enzymes during nutrient-limited growth is utility dependent.
Cezairliyan, Brent; Ausubel, Frederick M
2017-09-12
Pathogenic bacteria secrete toxins and degradative enzymes that facilitate their growth by liberating nutrients from the environment. To understand bacterial growth under nutrient-limited conditions, we studied resource allocation between cellular and secreted components by the pathogenic bacterium Pseudomonas aeruginosa during growth on a protein substrate that requires extracellular digestion by secreted proteases. We identified a quantitative relationship between the rate of increase of cellular biomass under nutrient-limiting growth conditions and the rate of increase in investment in secreted proteases. Production of secreted proteases is stimulated by secreted signals that convey information about the utility of secreted proteins during nutrient-limited growth. Growth modeling using this relationship recapitulated the observed kinetics of bacterial growth on a protein substrate. The proposed regulatory strategy suggests a rationale for quorum-sensing-dependent stimulation of the production of secreted enzymes whereby investment in secreted enzymes occurs in proportion to the utility they confer. Our model provides a framework that can be applied toward understanding bacterial growth in many environments where growth rate is limited by the availability of nutrients.
Prevention of ventilator-associated pneumonia.
Li Bassi, Gianluigi; Senussi, Tarek; Aguilera Xiol, Eli
2017-04-01
Ventilator-associated pneumonia (VAP) is an iatrogenic disease. Here we appraise recent advancements in the development and testing of strategies to prevent VAP. We also provide recommendations on the most promising interventions that should be applied. In the last year, preventive bundles have consistently let to a reduction of VAP. A few trials on endotracheal tubes (ETTs) with novel cuffs failed to translate positive bench findings into clinical settings. In addition, meta-analyses confirmed the primary role of subglottic secretion aspiration in VAP prevention. A relatively new ETT, with an innovative cuff design, has been tested in clinical trials confirming potential value. Meta-analyses confirmed reduction of VAP with the use of chlorhexidine for oropharyngeal decontamination. However, prophylactic inhaled or oral antibiotics are ineffective. Finally, there is growing interest in orally ingested probiotics to prevent VAP. The results of ongoing studies on probiotics are much-awaited. In conclusion, in the past year, new evidence elucidated limitations of new ETT cuffs in the prevention of VAP; whereas, subglottic secretion aspiration proved consistent benefits. Modulation of oropharyngeal colonization with chlorhexidine decreases risks of VAP and should be widely implemented. Finally, preventive measures with proven preventive value should be grouped into bundles.
Avoiding or coping with severe hypoglycemia in patients with type 2 diabetes
Yun, Jae-Seung
2015-01-01
Hypoglycemia is a major barrier to achieving the glycemic goal in patients with type 2 diabetes. In particular, severe hypoglycemia, which is defined as an event that requires the assistance of another person to actively administer carbohydrates, glucagon, or take other corrective actions, is a serious clinical concern in patients with diabetes. If severe hypoglycemia is not managed promptly, it can be life threatening. Hypoglycemia-associated autonomic failure (HAAF) is the main pathogenic mechanism behind severe hypoglycemia. Defective glucose counter-regulation (altered insulin secretion, glucagon secretion, and an attenuated increase in epinephrine during hypoglycemia) and a lack of awareness regarding hypoglycemia (attenuated sympathoadrenal activity) are common components of HAAF in patients with diabetes. There is considerable evidence that hypoglycemia is an independent risk factor for cardiovascular disease. In addition, hypoglycemia has a significant influence on the quality of life of patients with diabetes. To prevent hypoglycemic events, the setting of glycemic goals should be individualized, particularly in elderly individuals or patients with complicated or advanced type 2 diabetes. Patients at high-risk for the future development of severe hypoglycemia should be selected carefully, and intensive education with reinforcement should be implemented. PMID:25589828
Diarrhoeal disease through enterocyte secretion: a doctrine untroubled by proof.
Lucas, Michael L
2010-04-01
For almost 40 years, one of the principal causes of diarrhoeal disease has been thought to be fluid secretion emanating from the epithelial cells of the small and large intestine. Given the extremely large fluid losses seen in cholera, where secretion can be up to several litres per day, this seems a plausible hypothesis. The enterocyte (epithelial cell) secretion hypothesis rapidly displaced all other alternatives, such as vasodilatation coupled with enhanced paracellular permeability. An essential mechanism underlying enterocyte secretion has always been assumed to be electrogenic chloride secretion, leading to a localized osmotic imbalance at the mucosal surface of the enterocytes that causes fluid entry into the lumen by osmosis. The chloride secretion basis for enterotoxin-deranged secretion is assumed to be measurable by changes in electrical currents and by altered transport of chloride ion. These can be detected after the small intestine is exposed to a heat-stable enterotoxin (STa) produced by Escherichia coli. However, in vivo, when the recovered volume technique is used, STa is found not to be secretory. The heat-stable enterotoxin is therefore a test case toxin, because the complex techniques used to demonstrate enterocyte secretion after STa exposure show apparent secretion, while the simplest technique based on fluid recovery and genuinely measuring the mass transport of fluid does not. This review scrutinizes the nature of the evidence put forward for enterocyte secretion and reaches the conclusion that there is no evidence for it. Debilitating secretion undoubtedly does take place in severe diarrhoeal disease, but secretion from enterocytes is unlikely to be the cause.
Fan, Wei; Xu, Jia-Meng; Lou, He-Qiang; Xiao, Chuan; Chen, Wei-Wei; Yang, Jian-Li
2016-01-01
Grain amaranth (Amaranthus hypochondriacus L.) is abundant in oxalate and can secrete oxalate under aluminium (Al) stress. However, the features of Al-induced secretion of organic acid anions (OA) and potential genes responsible for OA secretion are poorly understood. Here, Al-induced OA secretion in grain amaranth roots was characterized by ion charomatography and enzymology methods, and suppression subtractive hybridization (SSH) together with quantitative real-time PCR (qRT-PCR) was used to identify up-regulated genes that are potentially involved in OA secretion. The results showed that grain amaranth roots secrete both oxalate and citrate in response to Al stress. The secretion pattern, however, differs between oxalate and citrate. Neither lanthanum chloride (La) nor cadmium chloride (Cd) induced OA secretion. A total of 84 genes were identified as up-regulated by Al, in which six genes were considered as being potentially involved in OA secretion. The expression pattern of a gene belonging to multidrug and toxic compound extrusion (MATE) family, AhMATE1, was in close agreement with that of citrate secretion. The expression of a gene encoding tonoplast dicarboxylate transporter and four genes encoding ATP-binding cassette transporters was differentially regulated by Al stress, but the expression pattern was not correlated well with that of oxalate secretion. Our results not only reveal the secretion pattern of oxalate and citrate from grain amaranth roots under Al stress, but also provide some genetic information that will be useful for further characterization of genes involved in Al toxicity and tolerance mechanisms. PMID:27144562
Fan, Wei; Xu, Jia-Meng; Lou, He-Qiang; Xiao, Chuan; Chen, Wei-Wei; Yang, Jian-Li
2016-04-30
Grain amaranth (Amaranthus hypochondriacus L.) is abundant in oxalate and can secrete oxalate under aluminium (Al) stress. However, the features of Al-induced secretion of organic acid anions (OA) and potential genes responsible for OA secretion are poorly understood. Here, Al-induced OA secretion in grain amaranth roots was characterized by ion charomatography and enzymology methods, and suppression subtractive hybridization (SSH) together with quantitative real-time PCR (qRT-PCR) was used to identify up-regulated genes that are potentially involved in OA secretion. The results showed that grain amaranth roots secrete both oxalate and citrate in response to Al stress. The secretion pattern, however, differs between oxalate and citrate. Neither lanthanum chloride (La) nor cadmium chloride (Cd) induced OA secretion. A total of 84 genes were identified as up-regulated by Al, in which six genes were considered as being potentially involved in OA secretion. The expression pattern of a gene belonging to multidrug and toxic compound extrusion (MATE) family, AhMATE1, was in close agreement with that of citrate secretion. The expression of a gene encoding tonoplast dicarboxylate transporter and four genes encoding ATP-binding cassette transporters was differentially regulated by Al stress, but the expression pattern was not correlated well with that of oxalate secretion. Our results not only reveal the secretion pattern of oxalate and citrate from grain amaranth roots under Al stress, but also provide some genetic information that will be useful for further characterization of genes involved in Al toxicity and tolerance mechanisms.
Kohler, Petra L; Hamilton, Holly L; Cloud-Hansen, Karen; Dillard, Joseph P
2007-08-01
Type IV secretion systems require peptidoglycan lytic transglycosylases for efficient secretion, but the function of these enzymes is not clear. The type IV secretion system gene cluster of Neisseria gonorrhoeae encodes two peptidoglycan transglycosylase homologues. One, LtgX, is similar to peptidoglycan transglycosylases from other type IV secretion systems. The other, AtlA, is similar to endolysins from bacteriophages and is not similar to any described type IV secretion component. We characterized the enzymatic function of AtlA in order to examine its role in the type IV secretion system. Purified AtlA was found to degrade macromolecular peptidoglycan and to produce 1,6-anhydro peptidoglycan monomers, characteristic of lytic transglycosylase activity. We found that AtlA can functionally replace the lambda endolysin to lyse Escherichia coli. In contrast, a sensitive measure of lysis demonstrated that AtlA does not lyse gonococci expressing it or gonococci cocultured with an AtlA-expressing strain. The gonococcal type IV secretion system secretes DNA during growth. A deletion of ltgX or a substitution in the putative active site of AtlA severely decreased DNA secretion. These results indicate that AtlA and LtgX are actively involved in type IV secretion and that AtlA is not involved in lysis of gonococci to release DNA. This is the first demonstration that a type IV secretion peptidoglycanase has lytic transglycosylase activity. These data show that AtlA plays a role in type IV secretion of DNA that requires peptidoglycan breakdown without cell lysis.
Air Force UAV’s: The Secret History
2010-07-01
iA Mitchell Institute Study i Air Force UAVs The Secret History A Mitchell Institute Study July 2010 By Thomas P. Ehrhard Report Documentation Page...DATES COVERED 00-00-2010 to 00-00-2010 4. TITLE AND SUBTITLE Air Force UAVs The Secret History 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c... The Secret History 2 Air Force UAVs: The Secret History2 air Force uaVs: The secret history Has any airplane in the past decade captured the public
Hawken, P A R; Luckins, N; Tilbrook, A; Fiol, C; Martin, G B; Blache, D
2013-01-01
We investigated the effect of genetic selection for temperament on the way that stressors affect the behaviour and the adrenal and reproductive axes of sheep. We tested three hypotheses: (i) isolation would increase cortisol secretion and decrease luteinising hormone (LH) secretion more in nervous sheep than in calm sheep; (ii) isolation combined with simulated human presence would increase cortisol secretion and decrease LH secretion more in nervous sheep than in calm sheep and (iii) isolation combined with stressors that were not specific to the selection process (i.e. non-selection stressors) would increase cortisol secretion and decrease LH secretion equally in calm and nervous sheep. Isolation alone increased cortisol secretion and decreased LH secretion in nervous sheep but not in calm sheep. Compared to calm sheep, nervous sheep were more agitated during the first 2 h of isolation but not during the second 2 h of isolation. Exposure to non-selection stressors increased cortisol secretion, decreased LH pulse amplitude and the mean plasma concentrations of LH in both calm and nervous sheep. We conclude that genetic selection for temperament affects the behavioural expression of the stress response and the secretion of adrenal and reproductive hormones during isolation, but has less impact on their reactivity to non-selection stressors.
Bernard, J; Jeannesson, P; Thiernesse, N; Zagury, D; Ternynck, T; Avrameas, S
1979-01-01
Mice were injected in their hind footpads with peroxidase (PO) emulsified in Freund's complete adjuvant. The development of cells secreting anti-peroxidase antibody (Ab) and cells secreting immunoglobulins (Ig) were detected in the draining popliteal lymph nodes in the subsequent 35 days, using local haemolysis plaque assay with sheep red cell blood cells coated with either PO or anti-mouse Ig antibody. Plaque-forming cells (PFC) were isolated from the centre of plaques by micromanipulation and after appropriate treatment, were examined by electron microscopy for their intracellular Ab content and in corporation of [3H]-thymidine. Four subpopulations of Ig secreting cells were distinguished: (1) cells secreting Ig without Ab function and not containing intracellular Ab detectable between days 5 and 20; (2) cells secreting Ig without Ab function but containing Ab appearing on day 6 and present throughout the immune response; (3) cells secreting Ab and containing Ab; (4) cells secreting Ab, but without detectable intracellular Ab. These last subpopulations appeared on day 7 and were found in all subsequent assays. The analysis of the kinetics of these subpopulations suggest that cells secreting Ig without Ab function might be precursors of Ab secreting cells. Images Figure 2a Figure 2b Figure 4 PMID:374259
Code of Federal Regulations, 2012 CFR
2012-04-01
... 21 Food and Drugs 1 2012-04-01 2012-04-01 false Trade secrets and commercial or financial... secrets and commercial or financial information which is privileged or confidential. (a) A trade secret... either innovation or substantial effort. There must be a direct relationship between the trade secret and...
Wrapped up in Covers: Preschoolers' Secrets and Secret Hiding Places
ERIC Educational Resources Information Center
Corson, Kimberly; Colwell, Malinda J.; Bell, Nancy J.; Trejos-Castillo, Elizabeth
2014-01-01
In this qualitative study, interviews about children's secret hiding places were conducted with 3-5-year-olds (n?=?17) in a university sponsored preschool programme using art narratives. Since prior studies indicate that children understand the concept of a secret as early as five and that they associate secrets with hiding places, the purpose of…
Code of Federal Regulations, 2010 CFR
2010-04-01
... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Trade secrets and commercial or financial... secrets and commercial or financial information which is privileged or confidential. (a) A trade secret... either innovation or substantial effort. There must be a direct relationship between the trade secret and...
Code of Federal Regulations, 2011 CFR
2011-04-01
... 21 Food and Drugs 1 2011-04-01 2011-04-01 false Trade secrets and commercial or financial... secrets and commercial or financial information which is privileged or confidential. (a) A trade secret... either innovation or substantial effort. There must be a direct relationship between the trade secret and...
31 CFR Appendix D to Subpart A of... - United States Secret Service
Code of Federal Regulations, 2010 CFR
2010-07-01
... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false United States Secret Service D...—United States Secret Service 1. In general. This appendix applies to the United States Secret Service. 2. Public reading room. The United States Secret Service will provide a room on an ad hoc basis when...
31 CFR Appendix D to Subpart A of... - United States Secret Service
Code of Federal Regulations, 2011 CFR
2011-07-01
... 31 Money and Finance: Treasury 1 2011-07-01 2011-07-01 false United States Secret Service D...—United States Secret Service 1. In general. This appendix applies to the United States Secret Service. 2. Public reading room. The United States Secret Service will provide a room on an ad hoc basis when...
Code of Federal Regulations, 2014 CFR
2014-04-01
... 21 Food and Drugs 1 2014-04-01 2014-04-01 false Trade secrets and commercial or financial... secrets and commercial or financial information which is privileged or confidential. (a) A trade secret... either innovation or substantial effort. There must be a direct relationship between the trade secret and...
31 CFR Appendix D to Subpart A of... - United States Secret Service
Code of Federal Regulations, 2013 CFR
2013-07-01
... 31 Money and Finance: Treasury 1 2013-07-01 2013-07-01 false United States Secret Service D...—United States Secret Service 1. In general. This appendix applies to the United States Secret Service. 2. Public reading room. The United States Secret Service will provide a room on an ad hoc basis when...
31 CFR Appendix D to Subpart A of... - United States Secret Service
Code of Federal Regulations, 2012 CFR
2012-07-01
... 31 Money and Finance: Treasury 1 2012-07-01 2012-07-01 false United States Secret Service D...—United States Secret Service 1. In general. This appendix applies to the United States Secret Service. 2. Public reading room. The United States Secret Service will provide a room on an ad hoc basis when...
Code of Federal Regulations, 2013 CFR
2013-04-01
... 21 Food and Drugs 1 2013-04-01 2013-04-01 false Trade secrets and commercial or financial... secrets and commercial or financial information which is privileged or confidential. (a) A trade secret... either innovation or substantial effort. There must be a direct relationship between the trade secret and...
31 CFR Appendix D to Subpart A of... - United States Secret Service
Code of Federal Regulations, 2014 CFR
2014-07-01
... 31 Money and Finance: Treasury 1 2014-07-01 2014-07-01 false United States Secret Service D...—United States Secret Service 1. In general. This appendix applies to the United States Secret Service. 2. Public reading room. The United States Secret Service will provide a room on an ad hoc basis when...
41 CFR 105-62.102 - Authority to originally classify.
Code of Federal Regulations, 2012 CFR
2012-01-01
... originally classify. (a) Top secret, secret, and confidential. The authority to originally classify information as Top Secret, Secret, or Confidential may be exercised only by the Administrator and is delegable...
41 CFR 105-62.102 - Authority to originally classify.
Code of Federal Regulations, 2010 CFR
2010-07-01
... originally classify. (a) Top secret, secret, and confidential. The authority to originally classify information as Top Secret, Secret, or Confidential may be exercised only by the Administrator and is delegable...
NASA Astrophysics Data System (ADS)
Wang, Xiao-Jun; An, Long-Xi; Yu, Xu-Tao; Zhang, Zai-Chen
2017-10-01
A multilayer quantum secret sharing protocol based on GHZ state is proposed. Alice has the secret carried by quantum state and wants to distribute this secret to multiple agent nodes in the network. In this protocol, the secret is transmitted and shared layer by layer from root Alice to layered agents. The number of agents in each layer is a geometric sequence with a specific common ratio. By sharing GHZ maximally entangled states and making generalized Bell basis measurement, one qubit state can be distributed to multiparty agents and the secret is shared. Only when all agents at the last layer cooperate together, the secret can be recovered. Compared with other protocols based on the entangled state, this protocol adopts layered construction so that secret can be distributed to more agents with fewer particles GHZ state. This quantum secret sharing protocol can be used in wireless network to ensure the security of information delivery.
Létoffé, S; Wandersman, C
1992-01-01
Protease B from Erwinia chrysanthemi was shown previously to have a C-terminal secretion signal located downstream of a domain that contains six glycine-rich repeats. This domain is conserved in all known bacterial proteins secreted by the signal peptide-independent pathway. The role of these repeats in the secretion process is controversial. We compared the secretion processes of various heterologous polypeptides fused either directly to the signal or separated from it by the glycine-rich domain. Although the repeats are not involved in the secretion of small truncated protease B carboxy-terminal peptides, they are required for the secretion of higher-molecular-weight fusion proteins. Secretion efficiency was also dependent on the size of the passenger polypeptide. Images PMID:1629152
Soldani, G; Del Tacca, M; Bambini, G; Polloni, A; Bernardini, C; Martinotti, E; Martino, E
1982-01-01
The effects of GnRH on gastric secretion and gastrin release from dogs provided with gastric fistulae and Heidenhain pouches have been investigated. A transient yet significant inhibition of pentagastrin-stimulated secretion from gastric fistulae was observed, while secretion from Heidenhain pouches was unchanged. The maximal inhibitory effect of GnRH on both acid and pepsin secretion stimulated by 2-deoxy-D-glucose was obtained from gastric fistulae. On the contrary, GnRH failed to affect either acid secretion stimulated by bethanechol or acid secretion and gastrin release induced by bombesin. The present results indicate that GnRH possesses an inhibitory action on gastric secretion from the vagally innervated stomach of the dog. The most likely inhibitory mechanism seems to be represented by a decrease of the vagal activity.
Abu-Basha, E A; Yibchok-Anun, S; Hopper, D L; Hsu, W H
1999-11-01
The study purpose was to investigate the direct effect of amitraz, a formamidine insecticide/acaricide, and its active metabolite BTS 27271 on insulin and glucagon secretion from the perfused rat pancreas. Amitraz and BTS 27271 (0.01, 0.1, 1, and 10 micromol/L) inhibited insulin secretion in a concentration-dependent manner. Amitraz increased glucagon secretion at 10 micromol/L, whereas BTS 27271 increased glucagon secretion at 1 and 10 micromol/L. Amitraz- and BTS 27271-induced decreases in insulin secretion and increases in glucagon secretion were not abolished during the 10-minute washout period. During the arginine treatment, both amitraz and BTS 27271 groups (0.1, 1, and 10 micromol/L) had lower insulin secretion and higher glucagon secretion than the control group. Idazoxan, an alpha2A/2D-adrenergic receptor (AR) antagonist, prevented the inhibitory effect of amitraz on insulin secretion in a concentration-dependent manner, but prazosin, an alpha1- and alpha2B/2C-AR antagonist, failed to antagonize the effect of amitraz. These results demonstrate that (1) amitraz and BTS 27271 inhibit insulin and stimulate glucagon secretion from the perfused rat pancreas, (2) amitraz inhibits insulin secretion by activation of alpha2D-ARs, since rats have alpha2D- but not alpha2A-ARs, and (3) amitraz and BTS 27271 may have a high binding affinity to the alpha2D-ARs of pancreatic islets.
Ning, Xiaojun; Luckenbaugh, Laurie; Liu, Kuancheng; Bruss, Volker; Sureau, Camille; Hu, Jianming
2018-05-09
During the morphogenesis of hepatitis B virus (HBV), an enveloped virus, two types of virions are secreted: (1) a minor population of complete virions containing a mature nucleocapsid with the characteristic, partially double-stranded, relaxed circular DNA genome and (2) a major population containing an empty capsid with no DNA or RNA (empty virions). Secretion of both types of virions requires interactions between the HBV capsid or core protein (HBc) and the viral surface or envelope proteins. We have studied the requirements from both HBc and envelope proteins for empty virion secretion, in comparison with those for secretion of complete virions. Substitutions within the N-terminal domain of HBc that block secretion of DNA-containing virions reduced but did not prevent secretion of empty virions. The HBc C-terminal domain was not essential for empty virion secretion. Among the three viral envelope proteins, the smallest, S, alone was sufficient for empty virion secretion at a basal level. The largest protein, L, essential for complete virion secretion, was not required for, but could stimulate empty virion secretion. Also, substitutions in L that eliminate secretion of complete virions reduced but did not eliminate empty virion secretion. S mutations that block secretion of the hepatitis D virus (HDV), an HBV satellite, did not block secretion of either empty or complete HBV virions. Together, these results indicate that both common and distinct signals on empty capsids vs. mature nucleocapsids interact with the S and L proteins during the formation of complete vs. empty virions. IMPORTANCE Hepatitis B virus (HBV) is a major cause of severe liver diseases including cirrhosis and cancer. In addition to the complete infectious virion particle, which contains an outer envelope layer and an interior capsid that, in turn, encloses a DNA genome, HBV infected cells also secrete non-infectious, incomplete viral particles in large excess over the complete virions. In particular, the empty (or genome-free) virion share with the complete virion the outer envelope and interior capsid but contain no genome. We have carried out a comparative study on the capsid and envelope requirements for the secretion of these two types of virion particles and uncovered both shared and distinct determinants on the capsid and envelope for their secretion. These results provide new information on HBV morphogenesis, and have implications for efforts to develop empty HBV virions as a novel biomarker and a new generation of HBV vaccine. Copyright © 2018 American Society for Microbiology.
Extracellular secretion of recombinant proteins
Linger, Jeffrey G.; Darzins, Aldis
2014-07-22
Nucleic acids encoding secretion signals, expression vectors containing the nucleic acids, and host cells containing the expression vectors are disclosed. Also disclosed are polypeptides that contain the secretion signals and methods of producing polypeptides, including methods of directing the extracellular secretion of the polypeptides. Exemplary embodiments include cellulase proteins fused to secretion signals, methods to produce and isolate these polypeptides, and methods to degrade lignocellulosic biomass.
Mechanophysical Stimulations of Mucin Secretion in Cultures of Nasal Epithelial Cells
Even-Tzur Davidovich, Nurit; Kloog, Yoel; Wolf, Michael; Elad, David
2011-01-01
Nasal epithelial cells secret mucins and are exposed in vivo to airflow-induced mechanophysical stresses, including wall shear stress (WSS), temperature, and humidity. In this work, human nasal epithelial cells cultured under air-liquid interface conditions were subjected to fields of airflow-induced oscillatory WSS at different temperature and humidity conditions. Changes in mucin secretion due to WSS were measured and the role of the cytoskeleton in mucin secretion was explored. Mucin secretion significantly increased in response to WSS in a magnitude-dependent manner with respect to static cultures and independently of the airflow temperature and humidity. In static cultures, mucin secretion decreased at high humidity with or without elevation of the temperature with respect to cultures at a comfortable climate. In cultures exposed to WSS, mucin secretion increased at high temperature with respect to cultures at comfortable climate conditions. The polymerization of actin microfilaments was shown to increase mucin secretion under WSS, whereas the dynamics of microtubule polymerization did not affect secretion. In conclusion, the data in this study show that mucin secretion is sensitive to oscillatory WSS as well as high temperature and humidity conditions. PMID:21689518
Effect of alpha 2-adrenoceptor agonists on gastric pepsin and acid secretion in the rat.
Tazi-Saad, K.; Chariot, J.; Del Tacca, M.; Rozé, C.
1992-01-01
1. The purpose of the present study was to analyze the effects of the alpha 2-adrenoceptor agonists clonidine, guanabenz, detomidine and medetomidine on pepsin secretion in conscious rats provided with gastric chronic fistula and to compare this with acid secretion. 2. Basal interdigestive gastric secretion, which is mainly neurally driven in the rat, and the secretion directly stimulated by the two main stimulants of chief cells, cholecystokinin octapeptide (CCK8) and methacholine, were studied. 3. Basal secretion of pepsin and acid was inhibited by all four drugs with comparable EC50S. 4. CCK-stimulated pepsin and acid secretion was less sensitive than basal pepsin and acid secretion to alpha 2-adrenoceptor inhibition. 5. Methacholine-stimulated pepsin and acid secretion was not changed by clonidine and guanabenz; methacholine-stimulated acid was even marginally increased by clonidine. 6. These results do not favour the presence of alpha 2-receptors on chief cells in the rat stomach. They rather suggest that pepsin inhibition by alpha 2-adrenoceptor agonists is indirect and due to central or peripheral inhibition of the discharge of nerve fibres activating pepsin secretion. PMID:1356566
Efficient multiparty quantum-secret-sharing schemes
DOE Office of Scientific and Technical Information (OSTI.GOV)
Xiao Li; Deng Fuguo; Key Laboratory for Quantum Information and Measurements, MOE, Beijing 100084
In this work, we generalize the quantum-secret-sharing scheme of Hillery, Buzek, and Berthiaume [Phys. Rev. A 59, 1829 (1999)] into arbitrary multiparties. Explicit expressions for the shared secret bit is given. It is shown that in the Hillery-Buzek-Berthiaume quantum-secret-sharing scheme the secret information is shared in the parity of binary strings formed by the measured outcomes of the participants. In addition, we have increased the efficiency of the quantum-secret-sharing scheme by generalizing two techniques from quantum key distribution. The favored-measuring-basis quantum-secret-sharing scheme is developed from the Lo-Chau-Ardehali technique [H. K. Lo, H. F. Chau, and M. Ardehali, e-print quant-ph/0011056] wheremore » all the participants choose their measuring-basis asymmetrically, and the measuring-basis-encrypted quantum-secret-sharing scheme is developed from the Hwang-Koh-Han technique [W. Y. Hwang, I. G. Koh, and Y. D. Han, Phys. Lett. A 244, 489 (1998)] where all participants choose their measuring basis according to a control key. Both schemes are asymptotically 100% in efficiency, hence nearly all the Greenberger-Horne-Zeilinger states in a quantum-secret-sharing process are used to generate shared secret information.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ahren, B.
The thyroid gland is known to harbor cholinergic and VIPergic nerves. In the present study, the influences of cholinergic stimulation by carbachol, cholinergic blockade by methylatropine and stimulation with various VIP sequences on basal, TSH-induced and VIP-induced thyroid hormone secretion were investigated in vivo in mice. The mice were pretreated with /sup 125/I and thyroxine; the subsequent release of /sup 125/I is an estimation of thyroid hormone secretion. It was found that basal radioiodine secretion was inhibited by both carbachol and methylatropine. Furthermore, TSH-induced radioiodine secretion was inhibited already by a low dose of carbachol. Moreover, a high dose ofmore » carbachol could inhibit VIP-induced radioiodine secretion. Methylatropine did not influence TSH- or VIP-stimulated radioiodine secretion, but counteracted the inhibitory action of carbachol on TSH- and VIP-induced radioiodine release. In addition, contrary to VIP, six various synthesized VIP fragments had no effect on basal or stimulated radioiodine release. It is concluded that basal thyroid hormone secretion is inhibited by both cholinergic activation and blockade. Furthermore, TSH-induced thyroid hormone secretion is more sensitive to inhibition with cholinergic stimulation than is VIP-induced thyroid hormone secretion. In addition, the VIP stimulation of thyroid hormone secretion seems to require the full VIP sequence.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Coleman, R.A.; Haynes, E.B.; Sand, T.M.
1987-05-01
The development of the liver's ability to coordinately express the synthesis and secretion of the two major components of very low density lipoproteins (VLDL): triacylglycerol (TG) and apolipoprotein B (apo B) was examined in cultured hepatocytes obtained from fetal, suckling and adult rats. Hepatocytes from fetal and suckling rats synthesized and secreted TG at rates lower than that displayed by adult cells. When TG synthesis was equalized by adding oleic acid to the culture medium, fetal cells still secreted only 39% as much TG as did adult cells. To determine the basis for the apparent defect in VLDL assembly/secretion displayedmore » by fetal cells, the synthesis and secretion of (TVS)methionine-labeled apo B was quantified by immunoprecipitation. Although adult and fetal cells synthesized and secreted large molecular weight apo B at similar rates, the synthesis and secretion of small molecular weight apo B was 2-fold greater in adult cells. These data suggest that the ability to assemble/secrete VLDL triacylglycerol varies in parallel with the developmental expression of small molecular weight apo B. Furthermore, these studies show the usefulness of the cultured rat hepatocyte model for examining the ontogeny and regulation of VLDL assembly/secretion.« less
Fluoroquinolone (ciprofloxacin) secretion by human intestinal epithelial (Caco-2) cells
Cavet, M E; West, M; Simmons, N L
1997-01-01
Human intestinal epithelial Caco-2 cells were used to investigate the mechanistic basis of transepithelial secretion of the fluoroquinolone antibiotic ciprofloxacin. Net secretion and cellular uptake of ciprofloxacin (at 0.1 mM) were not subject to competitive inhibition by sulphate, thiosulphate, oxalate, succinate and para-amino hippurate, probenecid (10 mM), taurocholate (100 μM) or bromosulphophthalein (100 μM). Similarly tetraethylammonium and N-′methylnicotinamide (10 mM) were without effect. Net secretion of ciprofloxacin was inhibited by the organic exchange inhibitor 4,4′-diisothiocyanostilbene-2-2′-disulphonic acid (DIDS, 400 μM). Net secretion of ciprofloxacin was partially inhibited by 100 μM verapamil, whilst net secretion of the P-glycoprotein substrate vinblastine was totally abolished under these conditions. Ciprofloxacin secretion was unaltered after preincubation of cells with two anti-P-glycoprotein antibodies (UIC2 and MRK16), which both significantly reduced secretory vinblastine flux (measured in the same cell batch). Ciprofloxacin (3 mM) failed to inhibit vinblastine net secretion in Caco-2 epithelia, and was not itself secreted by the P-glycoprotein expressing and vinblastine secreting dog kidney cell line, MDCK. Net secretion and cellular uptake of ciprofloxacin (at 0.1 mM) were not subject to alterations of either cytosolic or medium pH, or dependent on the presence of medium Na+, Cl− or K+ in the bathing media. The substrate specificity of the ciprofloxacin secretory transport in Caco-2 epithelia is distinct from both the renal organic anion and cation transport. A role for P-glycoprotein in ciprofloxacin secretion may also be excluded. A novel transport mechanism, sensitive to both DIDS and verapamil mediates secretion of ciprofloxacin by human intestinal Caco-2 epithelia. PMID:9283689
Barreto, Savio G; Woods, Charmaine M; Carati, Colin J; Schloithe, Ann C; Jaya, Surendra R; Toouli, James; Saccone, Gino T P
2009-08-01
Pancreatic exocrine secretion is affected by galanin, but the mechanisms involved are unclear. We aimed to determine the effect and elucidate the mechanism of action of exogenous galanin on basal and stimulated pancreatic amylase secretion in vitro. The effect of galanin on basal-, carbachol-, and caerulein-stimulated amylase secretion from isolated murine pancreatic lobules was measured. Carbachol and caerulein concentration-response relationships were established. Lobules were coincubated with galanin (10(-12) M to 10(-7) M), carbachol (10(-6) M), or caerulein (10(-10) M). Lobules were preincubated with atropine (10(-5) M), tetrodotoxin (10(-5) M), hexamethonium (10(-5) M), or diazoxide (10(-7) M and 10(-4) M) for 30 min followed by incubation with caerulein (10(-10) M) alone or combined with galanin (10(-12) M). Amylase secretion was expressed as percent of total lobular amylase. Immunohistochemical studies used the antigen retrieval technique and antisera for galanin receptor (GALR) 1, 2, and 3. Carbachol and caerulein stimulated amylase secretion in a concentration-dependent manner with maximal responses of two- and 1.7-fold over control evoked at 10(-6) M and 10(-10) M, respectively. Galanin (10(-12) M) completely inhibited caerulein-stimulated amylase secretion but had no effect on carbachol-stimulated or basal secretion. Atropine and tetrodotoxin pretreatment abolished the caerulein-stimulated amylase secretion, whereas hexamethonium had no significant effect. Diazoxide significantly reduced caerulein-stimulated amylase secretion by approximately 80%. Galanin did not affect caerulein-stimulated amylase secretion in the presence of hexamethonium or diazoxide. Glucose-stimulated amylase secretion was also inhibited by galanin. Immunohistochemistry revealed islet cells labeled for GALR2. These data suggest that galanin may modulate caerulein-stimulated amylase secretion by acting on cholinergic nerves and/or islet cells possibly via GALR2 to regulate insulin release.
Counterfactual attack on counterfactual quantum key distribution
NASA Astrophysics Data System (ADS)
Zhang, Sheng; Wnang, Jian; Tang, Chao Jing
2012-05-01
It is interesting that counterfactual quantum cryptography protocols allow two remotely separated parties to share a secret key without transmitting any signal particles. Generally, these protocols, expected to provide security advantages, base their security on a translated no-cloning theorem. Therefore, they potentially exhibit unconditional security in theory. In this letter, we propose a new Trojan horse attack, by which an eavesdropper Eve can gain full information about the key without being noticed, to real implementations of a counterfactual quantum cryptography system. Most importantly, the presented attack is available even if the system has negligible imperfections. Therefore, it shows that the present realization of counterfactual quantum key distribution is vulnerable.
Project - line interaction implementing projects in JPL's Matrix
NASA Technical Reports Server (NTRS)
Baroff, Lynn E.
2006-01-01
Can programmatic and line organizations really work interdependently, to accomplish their work as a community? Does the matrix produce a culture in which individuals take personal responsibility for both immediate mission success and long-term growth? What is the secret to making a matrix enterprise actually work? This paper will consider those questions, and propose that developing an effective project-line partnership demands primary attention to personal interactions among people. Many potential problems can be addressed by careful definition of roles, responsibilities, and work processes for both parts of the matrix -- and by deliberate and clear communication between project and line organizations and individuals.
Facilitating and securing offline e-medicine service through image steganography
Islam, M. Mahfuzul
2014-01-01
E-medicine is a process to provide health care services to people using the Internet or any networking technology. In this Letter, a new idea is proposed to model the physical structure of the e-medicine system to better provide offline health care services. Smart cards are used to authenticate the user singly. A very unique technique is also suggested to verify the card owner's identity and to embed secret data to the card while providing patients' reports either at booths or at the e-medicine server system. The simulation results of card authentication and embedding procedure justify the proposed implementation. PMID:26609382
High performance frame synchronization for continuous variable quantum key distribution systems.
Lin, Dakai; Huang, Peng; Huang, Duan; Wang, Chao; Peng, Jinye; Zeng, Guihua
2015-08-24
Considering a practical continuous variable quantum key distribution(CVQKD) system, synchronization is of significant importance as it is hardly possible to extract secret keys from unsynchronized strings. In this paper, we proposed a high performance frame synchronization method for CVQKD systems which is capable to operate under low signal-to-noise(SNR) ratios and is compatible with random phase shift induced by quantum channel. A practical implementation of this method with low complexity is presented and its performance is analysed. By adjusting the length of synchronization frame, this method can work well with large range of SNR values which paves the way for longer distance CVQKD.
A novel quantum steganography scheme for color images
NASA Astrophysics Data System (ADS)
Li, Panchi; Liu, Xiande
In quantum image steganography, embedding capacity and security are two important issues. This paper presents a novel quantum steganography scheme using color images as cover images. First, the secret information is divided into 3-bit segments, and then each 3-bit segment is embedded into the LSB of one color pixel in the cover image according to its own value and using Gray code mapping rules. Extraction is the inverse of embedding. We designed the quantum circuits that implement the embedding and extracting process. The simulation results on a classical computer show that the proposed scheme outperforms several other existing schemes in terms of embedding capacity and security.
Bicarbonate secretion by rabbit cortical collecting tubules in vitro.
McKinney, T D; Burg, M B
1978-06-01
We previously reported that rabbit renal cortical collecting tubules can secrete bicarbonate in vitro (i.e., there can be net transport from bath to lumen, causing the concentration in the lumen to increase). Net bicarbonate secretion was observed most often when rabbits had been pretreated with NaHCO(3) and were excreting alkaline urine before being killed for experiments. The purpose of the present studies was to elucidate the mechanism involved by testing the effects of ion substitutions and drugs on collecting tubules that were secreting bicarbonate. Acetazolamide inhibited net bicarbonate secretion, suggesting that the process is dependent upon carbonic anhydrase. Net bicarbonate secretion also decreased when sodium in the perfusate and bath was replaced by choline, but not when chloride was replaced by nitrate or methylsulfate. Ouabain had no significant effect. Amiloride caused net bicarbonate secretion to increase. The rate of net secretion did not correlate with transepithelial voltage. The results are compared to those in turtle urinary bladders that also secrete bicarbonate. There are no direct contradictions between the results in the two tissues, i.e., in turtle bladders acetazolamide also inhibited bicarbonate secretion and ouabain had no effect. Nevertheless, it seems unlikely that net secretion of bicarbonate by collecting tubules involves specific exchange for chloride, as has been proposed for turtle bladders, because replacement of chloride by other anions did not inhibit bicarbonate secretion by collecting tubules. It was previously shown that the collecting tubules in vitro also may absorb bicarbonate, especially when the rabbits have been treated with NH(4)Cl and are excreting acid urine before being killed. The effects of drugs on net bicarbonate secretion found in the present studies are compared to their previously reported effects on net bicarbonate absorption and the possibility is discussed that bicarbonate absorption and secretion are independent processes, as was previously proposed for turtle bladders.
Bicarbonate Secretion by Rabbit Cortical Collecting Tubules in Vitro
McKinney, Thurman D.; Burg, Maurice B.
1978-01-01
We previously reported that rabbit renal cortical collecting tubules can secrete bicarbonate in vitro (i.e., there can be net transport from bath to lumen, causing the concentration in the lumen to increase). Net bicarbonate secretion was observed most often when rabbits had been pretreated with NaHCO3 and were excreting alkaline urine before being killed for experiments. The purpose of the present studies was to elucidate the mechanism involved by testing the effects of ion substitutions and drugs on collecting tubules that were secreting bicarbonate. Acetazolamide inhibited net bicarbonate secretion, suggesting that the process is dependent upon carbonic anhydrase. Net bicarbonate secretion also decreased when sodium in the perfusate and bath was replaced by choline, but not when chloride was replaced by nitrate or methylsulfate. Ouabain had no significant effect. Amiloride caused net bicarbonate secretion to increase. The rate of net secretion did not correlate with transepithelial voltage. The results are compared to those in turtle urinary bladders that also secrete bicarbonate. There are no direct contradictions between the results in the two tissues, i.e., in turtle bladders acetazolamide also inhibited bicarbonate secretion and ouabain had no effect. Nevertheless, it seems unlikely that net secretion of bicarbonate by collecting tubules involves specific exchange for chloride, as has been proposed for turtle bladders, because replacement of chloride by other anions did not inhibit bicarbonate secretion by collecting tubules. It was previously shown that the collecting tubules in vitro also may absorb bicarbonate, especially when the rabbits have been treated with NH4Cl and are excreting acid urine before being killed. The effects of drugs on net bicarbonate secretion found in the present studies are compared to their previously reported effects on net bicarbonate absorption and the possibility is discussed that bicarbonate absorption and secretion are independent processes, as was previously proposed for turtle bladders. PMID:659604
Regulation of Retinoschisin Secretion in Weri-Rb1 Cells by the F-Actin and Microtubule Cytoskeleton
Kitamura, Eiko; Gribanova, Yekaterina E.; Farber, Debora B.
2011-01-01
Retinoschisin is encoded by the gene responsible for X-linked retinoschisis (XLRS), an early onset macular degeneration that results in a splitting of the inner layers of the retina and severe loss in vision. Retinoschisin is predominantly expressed and secreted from photoreceptor cells as a homo-oligomer protein; it then associates with the surface of retinal cells and maintains the retina cellular architecture. Many missense mutations in the XLRS1 gene are known to cause intracellular retention of retinoschisin, indicating that the secretion process of the protein is a critical step for its normal function in the retina. However, the molecular mechanisms underlying retinoschisin's secretion remain to be fully elucidated. In this study, we investigated the role of the F-actin cytoskeleton in the secretion of retinoschisin by treating Weri-Rb1 cells, which are known to secrete retinoschisin, with cytochalasin D, jasplakinolide, Y-27632, and dibutyryl cGMP. Our results show that cytochalasin D and jasplakinolide inhibit retinoschisin secretion, whereas Y-27632 and dibutyryl cGMP enhance secretion causing F-actin alterations. We also demonstrate that high concentrations of taxol, which hyperpolymerizes microtubules, inhibit retinoschisin secretion. Our data suggest that retinoschisin secretion is regulated by the F-actin cytoskeleton, that cGMP or inhibition of ROCK alters F-actin structure enhancing the secretion, and that the microtubule cytoskeleton is also involved in this process. PMID:21738583
The enteric nervous system modulates mammalian duodenal mucosal bicarbonate secretion.
Hogan, D L; Yao, B; Steinbach, J H; Isenberg, J I
1993-08-01
Interaction of the enteric nerves in regulating mammalian duodenal mucosal bicarbonate secretion is not well understood. The purpose of the present experiments was to evaluate the role of the enteric nervous system on bicarbonate secretion from rabbit duodenal mucosa in vitro. Proximal duodenum from male New Zealand White rabbits was stripped of seromuscular layers, mounted in Ussing chambers, and studied under short-circuited conditions. Effects of electrical field stimulation, vasoactive intestinal polypeptide (VIP), carbachol, prostaglandin E2 (PGE2), dibutyryl-cyclic adenosine monophosphate (db-cAMP), and the neurotoxin tetrodotoxin (TTX) and muscarinic blockade by atropine were studied. Electrical field stimulation significantly (P < 0.01) stimulated bicarbonate secretion, short-circuit current (Isc), and electrical potential difference (PD) that was sensitive to both TTX and atropine. VIP-stimulated bicarbonate secretion was significantly inhibited by TTX (-73%), yet Isc and PD remained unchanged. Atropine decreased VIP-induced bicarbonate secretion (-69%) and Isc (-43%). Carbachol-stimulated bicarbonate secretion, Isc, and PD were abolished by atropine, whereas TTX was without affect. Neither TTX nor atropine had a significant effect on PGE2 or db-cAMP-stimulated bicarbonate secretion. These results suggest that (1) enteric nerve stimulation activates an acetylcholine receptor that in turn stimulates duodenal epithelial bicarbonate secretion; (2) VIP stimulates bicarbonate secretion, in large part, via the enteric nervous system; and (3) PGE2 and cAMP stimulate bicarbonate secretion independent of the enteric nervous system.
Proteases induce secretion of collagenase and plasminogen activator by fibroblasts
DOE Office of Scientific and Technical Information (OSTI.GOV)
Werb, Z.; Aggeler, J.
1978-04-01
We have observed that treatment of rabbit synovial fibroblasts with proteolytic enzymes can induce secretion of collagenase (EC 3.4.24.7) and plasminogen activator (EC 3.4.21.-). Cells treated for 2 to 24 hr with plasmin, trypsin, chymotrypsin, pancreatic elastase, papain, bromelain, thermolysin, or ..cap alpha..-protease but not with thrombin or neuraminidase secreted detectable amounts of collagenase within 16 to 48 hr. Treatment of fibroblasts with trypsin also induced secretion of plasminogen activator. Proteases initiated secretion of collagenase (up to 20 units per 10/sup 6/ cells per 24 hr) only when treatment produced decreased cell adhesion. Collagenase production did not depend on continuedmore » presence of proteolytic activity or on subsequent cell adhesion, spreading, or proliferation. Routine subculturing with crude trypsin also induced collagenase secretion by cells. Secretion of collagenase was prevented and normal spreading was obtained if the trypsinized cells were placed into medium containing fetal calf serum. Soybean trypsin inhibitor, ..cap alpha../sub 1/-antitrypsin, bovine serum albumin, collagen, and fibronectin did not inhibit collagenase production. Although proteases that induced collagenase secretion also removed surface glycoprotein, the kinetics of induction of cell protease secretion were different from those for removal of fibronectin. Physiological inducers of secretion of collagenase and plasminogen activator by cells have not been identified. These results suggest that extracellular proteases in conjunction with plasma proteins may govern protease secretion by cells.« less
Potential differentiation of islet-like cells from pregnant cow-derived placental stem cells.
Peng, Shao-Yu; Chou, Chien-Wen; Kuo, Yu-Hsuan; Shen, Perng-Chih; Shaw, S W Steven
2017-06-01
Type 1 diabetes is an autoimmune disease that destroys islet cells and results in insufficient insulin secretion by pancreatic β-cells. Islet transplantation from donors is an approach used for treating patients with diabetes; however, this therapy is difficult to implement because of the lack of donors. Nevertheless, several stem cells have the potential to differentiate from islet-like cells and enable insulin secretion for treating diabetes in animal models. For example, placenta is considered a waste material and can be harvested noninvasively during delivery without ethical or moral concerns. To date, the differentiation of islet-like cells from cow-derived placental stem cells (CPSCs) has yet to be demonstrated. The investigation of potential differentiation of islet-like cells from CPSCs was conducted by supplementation with nicotinamide, exendin-4, glucose, and poly-d-lysine and was detected through reverse transcription polymerase chain reaction, dithizone staining, and immunocytochemical methods. Our results indicated that CPSCs are established and express mesenchymal stem cell surface antigen markers, such as CD73, CD166, β-integrin, and Oct-4, but not hematopoietic stem cell surface antigen markers, such as CD45. After induction, the CPSCs successfully differentiated into islet-like cells. The CPSC-derived islet-like cells expressed islet cell development-related genes, such as insulin, glucagon, pax-4, Nkx6.1, pax-6, and Fox. Moreover, CPSC-derived islet-like cells can be stained with zinc ions, which are widely distributed in the islet cells and enable insulin secretion. Altogether, islet-like cells have the potential to be differentiated from CPSCs without gene manipulation, and can be used in diabetic animal models in the future for preclinical and drug testing trial investigations. Copyright © 2017. Published by Elsevier B.V.
Energy-constrained two-way assisted private and quantum capacities of quantum channels
NASA Astrophysics Data System (ADS)
Davis, Noah; Shirokov, Maksim E.; Wilde, Mark M.
2018-06-01
With the rapid growth of quantum technologies, knowing the fundamental characteristics of quantum systems and protocols is essential for their effective implementation. A particular communication setting that has received increased focus is related to quantum key distribution and distributed quantum computation. In this setting, a quantum channel connects a sender to a receiver, and their goal is to distill either a secret key or entanglement, along with the help of arbitrary local operations and classical communication (LOCC). In this work, we establish a general theory of energy-constrained, LOCC-assisted private and quantum capacities of quantum channels, which are the maximum rates at which an LOCC-assisted quantum channel can reliably establish a secret key or entanglement, respectively, subject to an energy constraint on the channel input states. We prove that the energy-constrained squashed entanglement of a channel is an upper bound on these capacities. We also explicitly prove that a thermal state maximizes a relaxation of the squashed entanglement of all phase-insensitive, single-mode input bosonic Gaussian channels, generalizing results from prior work. After doing so, we prove that a variation of the method introduced by Goodenough et al. [New J. Phys. 18, 063005 (2016), 10.1088/1367-2630/18/6/063005] leads to improved upper bounds on the energy-constrained secret-key-agreement capacity of a bosonic thermal channel. We then consider a multipartite setting and prove that two known multipartite generalizations of the squashed entanglement are in fact equal. We finally show that the energy-constrained, multipartite squashed entanglement plays a role in bounding the energy-constrained LOCC-assisted private and quantum capacity regions of quantum broadcast channels.
NASA Astrophysics Data System (ADS)
Sun, Xiaole; Djordjevic, Ivan B.; Neifeld, Mark A.
2016-03-01
Free-space optical (FSO) channels can be characterized by random power fluctuations due to atmospheric turbulence, which is known as scintillation. Weak coherent source based FSO quantum key distribution (QKD) systems suffer from the scintillation effect because during the deep channel fading the expected detection rate drops, which then gives an eavesdropper opportunity to get additional information about protocol by performing photon number splitting (PNS) attack and blocking single-photon pulses without changing QBER. To overcome this problem, in this paper, we study a large-alphabet QKD protocol, which is achieved by using pulse-position modulation (PPM)-like approach that utilizes the time-frequency uncertainty relation of the weak coherent photon state, called here TF-PPM-QKD protocol. We first complete finite size analysis for TF-PPM-QKD protocol to give practical bounds against non-negligible statistical fluctuation due to finite resources in practical implementations. The impact of scintillation under strong atmospheric turbulence regime is studied then. To overcome the secure key rate performance degradation of TF-PPM-QKD caused by scintillation, we propose an adaptation method for compensating the scintillation impact. By changing source intensity according to the channel state information (CSI), obtained by classical channel, the adaptation method improves the performance of QKD system with respect to the secret key rate. The CSI of a time-varying channel can be predicted using stochastic models, such as autoregressive (AR) models. Based on the channel state predictions, we change the source intensity to the optimal value to achieve a higher secret key rate. We demonstrate that the improvement of the adaptation method is dependent on the prediction accuracy.
Alternative approaches to ventilator-associated pneumonia prevention.
Berra, L; Sampson, J; Fumagalli, J; Panigada, M; Kolobow, T
2011-03-01
Ventilator-associated pneumonia (VAP), which develops in patients receiving mechanical ventilation, is the most common nosocomial infection in patients with acute respiratory failure. The major mechanism of lower respiratory tract colonization is aspiration of bacteria-colonized secretions from the oropharynx into the lower airways. The hydrostatic pressure of the secretions that collect in the subglottic space, which is the area above the endotracheal tube (ETT) cuff, or aerosolization of bacteria from the secretions collected within the respiratory tubing may facilitate the leakage into the lower airways. Ideally, the elimination of the mechanisms responsible for aspiration would decrease the incidence of VAP. Several preventive measures have been tested in clinical trials with little success.Here we present the results of our efforts to develop novel approaches for the prevention of VAP. Specifically, we found that keeping ventilated patients in a lateral position, which eliminates gravitational forces, is feasible and possibly advantageous. Additionally, several novel medical devices have been recently developed to prevent bacterial biofilm formation from the ETT and breathing tubing. These devices include coated ETTs, mucus shavers and mucus slurpers. Prevention of ETT bacterial colonization showed decreased bacterial colonization of the respiratory circuit and of the lower respiratory tract in laboratory studies and clinical trials. Future large studies should be designed to test the hypothesis that VAP can be prevented with these novel strategies. While there is a current focus on the use of respiratory devices to prevent biofilm formation and microaspiration, it is important to remember that lower respiratory tract colonization is multifactorial. Prevention of VAP cannot be achieved solely by eliminating bacterial biofilm on respiratory devices, and more comprehensive care of the intubated patient needs to be implemented.
The semantics of secrecy: young children's classification of secret content.
Anagnostaki, Lida; Wright, Michael J; Bourchier-Sutton, Alison J
2010-01-01
The authors explored whether young children can distinguish potential secrets from nonsecrets by their content, as can older children, adolescents, and adults. Ninety children, 4, 5, and 6 years old, rated the secrecy of items from an adult-validated list of personal information about an age- and gender-appropriate puppet. Two factors of the children's data corresponded to the adult categories of nonsecrets and secrets, and a third factor corresponded to surprises. All ages rated surprises as significantly more secret than nonsecret items; however, the surprise items contained linguistic cues to secrecy. A tendency to rate nonsecrets as secret decreased with age, but only the 6-year-olds rated secrets other than surprises as significantly more secret than nonsecrets. Thus, children acquire the implicit rules defining secret content from a somewhat later age than that reported for the cognitive or behavioral capacities for secrecy.
The world's first obesity surgery performed by a surgeon at a distance.
Cadiere, G B; Himpens, J; Vertruyen, M; Favretti, F
1999-04-01
In recent years, laparoscopic procedures have gained popularity. The laparoscopic technique is, however, more difficult than the conventional approach, especially in obese patients. The purpose of this article is to demonstrate a solution to these difficulties. On September 16, 1998, a laparoscopic gastric banding procedure was performed by a surgeon while he was actually sitting at a distance from his patient. The surgeon's assistant was scrubbed and gowned and stood at the patient's side. The surgeon manipulated handles that were connected to a computer in command of robotic arms mounted on the operating table near the patient. The robotic arms contained surgical tools with articulated tips, well inside the abdominal cavity. The system constituted a master-slave construction called Mona (Intuitive Surgical, Mountain View, CA). The entire procedure (adjustable silicone gastric banding) was performed solely by this system without any other intervention. The entire procedure lasted 90 minutes. The blood loss was 25 mL. The patient left the hospital on the second postoperative day. This procedure demonstrates that telesurgical procedures are feasible, can be performed safely even in obese patients, and improve the surgeon's comfort by restoring ergonomically acceptable conditions, by increasing the number of degrees of freedom, and by recreating the eye-hand connection lost in videoendoscopic procedures.
Performance Analysis, Modeling and Scaling of HPC Applications and Tools
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bhatele, Abhinav
2016-01-13
E cient use of supercomputers at DOE centers is vital for maximizing system throughput, mini- mizing energy costs and enabling science breakthroughs faster. This requires complementary e orts along several directions to optimize the performance of scienti c simulation codes and the under- lying runtimes and software stacks. This in turn requires providing scalable performance analysis tools and modeling techniques that can provide feedback to physicists and computer scientists developing the simulation codes and runtimes respectively. The PAMS project is using time allocations on supercomputers at ALCF, NERSC and OLCF to further the goals described above by performing research alongmore » the following fronts: 1. Scaling Study of HPC applications; 2. Evaluation of Programming Models; 3. Hardening of Performance Tools; 4. Performance Modeling of Irregular Codes; and 5. Statistical Analysis of Historical Performance Data. We are a team of computer and computational scientists funded by both DOE/NNSA and DOE/ ASCR programs such as ECRP, XStack (Traleika Glacier, PIPER), ExaOSR (ARGO), SDMAV II (MONA) and PSAAP II (XPACC). This allocation will enable us to study big data issues when analyzing performance on leadership computing class systems and to assist the HPC community in making the most e ective use of these resources.« less
Gelman, Susan A.
2013-01-01
Psychological essentialism is an intuitive folk belief positing that certain categories have a non-obvious inner “essence” that gives rise to observable features. Although this belief most commonly characterizes natural kind categories, I argue that psychological essentialism can also be extended in important ways to artifact concepts. Specifically, concepts of individual artifacts include the non-obvious feature of object history, which is evident when making judgments regarding authenticity and ownership. Classic examples include famous works of art (e.g., the Mona Lisa is authentic because of its provenance), but ordinary artifacts likewise receive value from their history (e.g., a worn and tattered blanket may have special value if it was one's childhood possession). Moreover, in some cases, object history may be thought to have causal effects on individual artifacts, much as an animal essence has causal effects. I review empirical support for these claims and consider the implications for both artifact concepts and essentialism. This perspective suggests that artifact concepts cannot be contained in a theoretical framework that focuses exclusively on similarity or even function. Furthermore, although there are significant differences between essentialism of natural kinds and essentialism of artifact individuals, the commonalities suggest that psychological essentialism may not derive from folk biology but instead may reflect more domain-general perspectives on the world. PMID:23976903
1990-10-01
Using the Solar Vector Magnetograph, a solar observation facility at NASA's Marshall Space Flight Center (MSFC), scientists from the National Space Science and Technology Center (NSSTC) in Huntsville, Alabama, are monitoring the explosive potential of magnetic areas of the Sun. This effort could someday lead to better prediction of severe space weather, a phenomenon that occurs when blasts of particles and magnetic fields from the Sun impact the magnetosphere, the magnetic bubble around the Earth. When massive solar explosions, known as coronal mass ejections, blast through the Sun's outer atmosphere and plow toward Earth at speeds of thousands of miles per second, the resulting effects can be harmful to communication satellites and astronauts outside the Earth's magnetosphere. Like severe weather on Earth, severe space weather can be costly. On the ground, the magnetic storm wrought by these solar particles can knock out electric power. The researchers from MSFC and NSSTC's solar physics group develop instruments for measuring magnetic fields on the Sun. With these instruments, the group studies the origin, structure, and evolution of the solar magnetic field and the impact it has on Earth's space environment. This photograph shows the Solar Vector Magnetograph and Dr. Mona Hagyard of MSFC, the director of the observatory who leads the development, operation and research program of the Solar Vector Magnetograph.
2017-01-01
The history of the expression of three-dimensional structure in art can be traced from the use of occlusion in Palaeolithic cave paintings, through the use of shadow in classical art, to the development of perspective during the Renaissance. However, the history of the use of stereoscopic techniques is controversial. Although the first undisputed stereoscopic images were presented by Wheatstone in 1838, it has been claimed that two sketches by Jacopo Chimenti da Empoli (c. 1600) can be to be fused to yield an impression of stereoscopic depth, while others suggest that Leonardo da Vinci’s Mona Lisa is the world’s first stereogram. Here, we report the first quantitative study of perceived depth in these works, in addition to more recent works by Salvador Dalí. To control for the contribution of monocular depth cues, ratings of the magnitude and coherence of depth were recorded for both stereoscopic and pseudoscopic presentations, with a genuine contribution of stereoscopic cues revealed by a difference between these scores. Although effects were clear for Wheatstone and Dalí’s images, no such effects could be found for works produced earlier. As such, we have no evidence to reject the conventional view that the first producer of stereoscopic imagery was Sir Charles Wheatstone. PMID:28203349
Brooks, Kevin R
2017-01-01
The history of the expression of three-dimensional structure in art can be traced from the use of occlusion in Palaeolithic cave paintings, through the use of shadow in classical art, to the development of perspective during the Renaissance. However, the history of the use of stereoscopic techniques is controversial. Although the first undisputed stereoscopic images were presented by Wheatstone in 1838, it has been claimed that two sketches by Jacopo Chimenti da Empoli (c. 1600) can be to be fused to yield an impression of stereoscopic depth, while others suggest that Leonardo da Vinci's Mona Lisa is the world's first stereogram. Here, we report the first quantitative study of perceived depth in these works, in addition to more recent works by Salvador Dalí. To control for the contribution of monocular depth cues, ratings of the magnitude and coherence of depth were recorded for both stereoscopic and pseudoscopic presentations, with a genuine contribution of stereoscopic cues revealed by a difference between these scores. Although effects were clear for Wheatstone and Dalí's images, no such effects could be found for works produced earlier. As such, we have no evidence to reject the conventional view that the first producer of stereoscopic imagery was Sir Charles Wheatstone.
Chronopoulou, Panagiota-Myrsini; Sanni, Gbemisola O; Silas-Olu, Daniel I; van der Meer, Jan Roelof; Timmis, Kenneth N; Brussaard, Corina P D; McGenity, Terry J
2015-01-01
The aim of this work was to determine the effect of light crude oil on bacterial communities during an experimental oil spill in the North Sea and in mesocosms (simulating a heavy, enclosed oil spill), and to isolate and characterize hydrocarbon-degrading bacteria from the water column. No oil-induced changes in bacterial community (3 m below the sea surface) were observed 32 h after the experimental spill at sea. In contrast, there was a decrease in the dominant SAR11 phylotype and an increase in Pseudoalteromonas spp. in the oiled mesocosms (investigated by 16S rRNA gene analysis using denaturing gradient gel electrophoresis), as a consequence of the longer incubation, closer proximity of the samples to oil, and the lack of replenishment with seawater. A total of 216 strains were isolated from hydrocarbon enrichment cultures, predominantly belonging to the genus Pseudoaltero monas; most strains grew on PAHs, branched and straight-chain alkanes, as well as many other carbon sources. No obligate hydrocarbonoclastic bacteria were isolated or detected, highlighting the potential importance of cosmopolitan marine generalists like Pseudoalteromonas spp. in degrading hydrocarbons in the water column beneath an oil slick, and revealing the susceptibility to oil pollution of SAR11, the most abundant bacterial clade in the surface ocean. PMID:25251384
ERIC Educational Resources Information Center
Paxman, Christina G.
2013-01-01
The exploration of secrets summons the adage that ''what someone doesn't know won't hurt them.'' While this phrase implies that keeping secrets can be advantageous, it also foreshadows another consideration: secrets have the propensity to hurt others (Caughlin, Scott, Miller, & Hefner, 2009). Despite this, the act…
Status report from Norway: Implementation of patient involvement in Norwegian health care.
Kasper, Jürgen; Lager, Anne Regine; Rumpsfeld, Markus; Kienlin, Simone; Smestad, Kristine Hoel; Bråthen, Tone; Ankell, Holly; Knutsen, Tore; Kløvtveit, Rune; Gulbrandsen, Pål; Vandvik, Per Olav; Heen, Anja Fog; Flottorp, Signe; Tollåli, Geir; Eiring, Øystein
2017-06-01
Norway has traditionally high standards regarding civil rights particularly emphasizing equal access to societal resources including health care. This background and the health care system's centralized national organization make it perfectly suited for implementation of shared decision making (SDM). In recent years, great efforts have been made by policy- makers, regional health authorities and not least the patients to facilitate a process of change in health communication culture. SDM is currently even given highest priority in health care strategies on all system levels. SDM has been structurally implemented, e.g. by including corresponding guidance in the standard patient pathways. Moreover, SDM is established as an element of service on the national health portal hosting a constantly increasing number of decision aids. Essentially the Norwegian Knowledge Center for Health Services contributes by searching and providing information for use in decision aids. Implementation is now being rolled out unit by unit for a list of medical problems as a series production of SDM using decision aids and health professional training. Importantly, production of SDM begins and succeeds as a soundly structured communication with both clinical environments and patients. However, as communication training has not been implemented before now, there are no data demonstrating sufficient realization of SDM in current health care. Beyond making reasonable use of scientific achievements, the Norwegian movement's secret of success is the simultaneous commitment of all actors of the health system to a common idea. Copyright © 2017. Published by Elsevier GmbH.
Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks
NASA Astrophysics Data System (ADS)
Lederer, Christian; Mader, Roland; Koschuch, Manuel; Großschädl, Johann; Szekely, Alexander; Tillich, Stefan
Wireless Sensor Networks (WSNs) are playing a vital role in an ever-growing number of applications ranging from environmental surveillance over medical monitoring to home automation. Since WSNs are often deployed in unattended or even hostile environments, they can be subject to various malicious attacks, including the manipulation and capture of nodes. The establishment of a shared secret key between two or more individual nodes is one of the most important security services needed to guarantee the proper functioning of a sensor network. Despite some recent advances in this field, the efficient implementation of cryptographic key establishment for WSNs remains a challenge due to the resource constraints of small sensor nodes such as the MICAz mote. In this paper we present a lightweight implementation of the elliptic curve Diffie-Hellman (ECDH) key exchange for ZigBee-compliant sensor nodes equipped with an ATmega128 processor running the TinyOS operating system. Our implementation uses a 192-bit prime field specified by the NIST as underlying algebraic structure and requires only 5.20 ·106 clock cycles to compute a scalar multiplication if the base point is fixed and known a priori. A scalar multiplication using a random base point takes about 12.33 ·106 cycles. Our results show that a full ECDH key exchange between two MICAz motes consumes an energy of 57.33 mJ (including radio communication), which is significantly better than most previously reported ECDH implementations on comparable platforms.
Lindeberg, Magdalen; Boyd, Carol M.; Keen, Noel T.; Collmer, Alan
1998-01-01
The type II secretion system (main terminal branch of the general secretion pathway) is used by diverse gram-negative bacteria to secrete extracellular proteins. Proteins secreted by this pathway are synthesized with an N-terminal signal peptide which is removed upon translocation across the inner membrane, but the signals which target the mature proteins for secretion across the outer membrane are unknown. The plant pathogens Erwinia chrysanthemi and Erwinia carotovora secrete several isozymes of pectate lyase (Pel) by the out-encoded type II pathway. However, these two bacteria cannot secrete Pels encoded by heterologously expressed pel genes from the other species, suggesting the existence of species-specific secretion signals within these proteins. The functional cluster of E. chrysanthemi out genes carried on cosmid pCPP2006 enables Escherichia coli to secrete E. chrysanthemi, but not E. carotovora, Pels. We exploited the high sequence similarity between E. chrysanthemi PelC and E. carotovora Pel1 to construct 15 hybrid proteins in which different regions of PelC were replaced with homologous sequences from Pel1. The differential secretion of these hybrid proteins by E. coli(pCPP2006) revealed M118 to D175 and V215 to C329 as regions required for species-specific secretion of PelC. We propose that the primary targeting signal is contained within the external loops formed by G274 to C329 but is dependent on residues in M118 to D170 and V215 to G274 for proper positioning. PMID:9515910
Engineering Signal Peptides for Enhanced Protein Secretion from Lactococcus lactis
Ng, Daphne T. W.
2013-01-01
Lactococcus lactis is an attractive vehicle for biotechnological production of proteins and clinical delivery of therapeutics. In many such applications using this host, it is desirable to maximize secretion of recombinant proteins into the extracellular space, which is typically achieved by using the native signal peptide from a major secreted lactococcal protein, Usp45. In order to further increase protein secretion from L. lactis, inherent limitations of the Usp45 signal peptide (Usp45sp) must be elucidated. Here, we performed extensive mutagenesis on Usp45sp to probe the effects of both the mRNA sequence (silent mutations) and the peptide sequence (amino acid substitutions) on secretion. We screened signal peptides based on their resulting secretion levels of Staphylococcus aureus nuclease and further evaluated them for secretion of Bacillus subtilis α-amylase. Silent mutations alone gave an increase of up to 16% in the secretion of α-amylase through a mechanism consistent with relaxed mRNA folding around the ribosome binding site and enhanced translation. Targeted amino acid mutagenesis in Usp45sp, combined with additional silent mutations from the best clone in the initial screen, yielded an increase of up to 51% in maximum secretion of α-amylase while maintaining secretion at lower induction levels. The best sequence from our screen preserves the tripartite structure of the native signal peptide but increases the positive charge of the n-region. Our study presents the first example of an engineered L. lactis signal peptide with a higher secretion yield than Usp45sp and, more generally, provides strategies for further enhancing protein secretion in bacterial hosts. PMID:23124224
Engineering signal peptides for enhanced protein secretion from Lactococcus lactis.
Ng, Daphne T W; Sarkar, Casim A
2013-01-01
Lactococcus lactis is an attractive vehicle for biotechnological production of proteins and clinical delivery of therapeutics. In many such applications using this host, it is desirable to maximize secretion of recombinant proteins into the extracellular space, which is typically achieved by using the native signal peptide from a major secreted lactococcal protein, Usp45. In order to further increase protein secretion from L. lactis, inherent limitations of the Usp45 signal peptide (Usp45sp) must be elucidated. Here, we performed extensive mutagenesis on Usp45sp to probe the effects of both the mRNA sequence (silent mutations) and the peptide sequence (amino acid substitutions) on secretion. We screened signal peptides based on their resulting secretion levels of Staphylococcus aureus nuclease and further evaluated them for secretion of Bacillus subtilis α-amylase. Silent mutations alone gave an increase of up to 16% in the secretion of α-amylase through a mechanism consistent with relaxed mRNA folding around the ribosome binding site and enhanced translation. Targeted amino acid mutagenesis in Usp45sp, combined with additional silent mutations from the best clone in the initial screen, yielded an increase of up to 51% in maximum secretion of α-amylase while maintaining secretion at lower induction levels. The best sequence from our screen preserves the tripartite structure of the native signal peptide but increases the positive charge of the n-region. Our study presents the first example of an engineered L. lactis signal peptide with a higher secretion yield than Usp45sp and, more generally, provides strategies for further enhancing protein secretion in bacterial hosts.
Social and cognitive factors associated with children’s secret-keeping for a parent
Gordon, Heidi M.; Lyon, Thomas D.; Lee, Kang
2014-01-01
This study examined children’s secret-keeping for a parent and its relationship to trust, theory of mind, secrecy endorsement, and executive functioning (EF). Children (N = 107) between 4 and 12 years of age participated in a procedure wherein parents broke a toy and asked children to promise secrecy. Responses to open-ended and direct questions were examined. Overall, secret-keeping increased with age and promising to keep the secret was related to fewer disclosures in open-ended questioning. Children who kept the secret in direct questioning exhibited greater trust and better parental ratings of EF than children who disclosed the secret. Findings highlight the importance of both social and cognitive factors in secret-keeping development. PMID:25291258
10 CFR 709.3 - Covered persons subject to a CI evaluation and polygraph.
Code of Federal Regulations, 2010 CFR
2010-01-01
... routine access to Top Secret Restricted Data; (5) With regular and routine access to Top Secret National... and non-routine basis to Top Secret Restricted Data or Top Secret National Security Information or the...
Secrets and Misperceptions: The Creation of Self-Fulfilling Illusions
Cowan, Sarah K.
2015-01-01
This study examines who hears what secrets, comparing two similar secrets-one that is highly stigmatized and one that is less so. Using a unique survey representative of American adults and intake forms from a medical clinic, I document marked differences in who hears these secrets. People who are sympathetic to the stigmatizing secret are more likely to hear of it than those who may react negatively. This is a consequence of people not just selectively disclosing their own secrets but selectively sharing others’ as well. As a result, people in the same social network will be exposed to and influenced by different information about those they know and hence experience that network differently. When people effectively exist in networks tailored by others not to offend, then the information they hear tends to be that of which they already approve. Were they to hear secrets they disapproved of, then their attitudes might change, but they are less likely to hear those secrets. As such, the patterns of secret hearing contribute to a stasis in public opinion. PMID:26082932
Quantum secret sharing with qudit graph states
DOE Office of Scientific and Technical Information (OSTI.GOV)
Keet, Adrian; Fortescue, Ben; Sanders, Barry C.
We present a unified formalism for threshold quantum secret sharing using graph states of systems with prime dimension. We construct protocols for three varieties of secret sharing: with classical and quantum secrets shared between parties over both classical and quantum channels.
Deposition of anal-sac secretions by captive wolves (Canis lupus)
Asa, C.S.; Peterson, E.K.; Seal, U.S.; Mech, L.D.
1985-01-01
Deposition of anal-sac secretions by captive wolves was investigated by a labelling technique using protein-bound iodine125 and food dye. Wolves deposited secretions on some but not all scats. Adult males, especially the alpha male, deposited anal-sac secretions more frequently while defecating than did females or juveniles. Secretions sometimes also were deposited independently of defecation, suggesting a dual role in communication by these substances.
Security of a kind of quantum secret sharing with entangled states.
Wang, Tian-Yin; Liu, Ying-Zhao; Wei, Chun-Yan; Cai, Xiao-Qiu; Ma, Jian-Feng
2017-05-30
We present a new collusion attack to a kind of quantum secret sharing schemes with entangled states. Using this attack, an unauthorized set of agents can gain access to the shared secret without the others' cooperation. Furthermore, we establish a general model for this kind of quantum secret sharing schemes and then give some necessary conditions to design a secure quantum secret sharing scheme under this model.
Secretion of Ipa proteins by Shigella flexneri: inducer molecules and kinetics of activation.
Bahrani, F K; Sansonetti, P J; Parsot, C
1997-01-01
The type III Mxi-Spa secretion machinery of Shigella flexneri is responsible for secretion of Ipa proteins, which are involved in the entry of bacteria into epithelial cells. Ipa proteins accumulate within bacteria growing in laboratory media, and their secretion is activated upon contact of bacteria with eukaryotic cells. In this study, we have identified a group of chemical compounds, including Congo red, Evans blue, and direct orange, which are able to induce secretion of Ipa proteins by bacteria suspended in phosphate-buffered saline. Parameters of kinetics of activation of Ipa secretion by Congo red were determined by measuring by enzyme-linked immunosorbent assay the amount of IpaC secreted and by investigating the increase in susceptibility of Ipa proteins to proteinase K degradation. Ipa secretion occurred at 37 degrees C, was obtained with 5 to 10 microM Congo red, and was complete within 30 min. In addition, activation of Ipa secretion by Congo red was observed with bacteria harvested throughout the exponential phase of growth but not with bacteria in the stationary phase. The interactions of Congo red and Congo red-related compounds with the Mxi-Spa secretion apparatus might be specific hydrophobic interactions similar to those involved in binding of Congo red to amyloid proteins. PMID:9316999
Chahal, Sabreen; Wei, Peter; Moua, Pachai; Park, Sung Pil James; Kwon, Janet; Patel, Arth; Vu, Anthony T; Catolico, Jason A; Tsai, Yu Fang Tina; Shaheen, Nadia; Chu, Tiffany T; Tam, Vivian; Khan, Zill-E-Huma; Joo, Hyun Henry; Xue, Liang; Lin-Cereghino, Joan; Tsai, Jerry W; Lin-Cereghino, Geoff P
2017-01-20
The methylotrophic yeast Pichia pastoris has been used extensively for expressing recombinant proteins because it combines the ease of genetic manipulation, the ability to provide complex posttranslational modifications and the capacity for efficient protein secretion. The most successful and commonly used secretion signal leader in Pichia pastoris has been the alpha mating factor (MATα) prepro secretion signal. However, limitations exist as some proteins cannot be secreted efficiently, leading to strategies to enhance secretion efficiency by modifying the secretion signal leader. Based on a Jpred secondary structure prediction and knob-socket modeling of tertiary structure, numerous deletions and duplications of the MATα prepro leader were engineered to evaluate the correlation between predicted secondary structure and the secretion level of the reporters horseradish peroxidase (HRP) and Candida antarctica lipase B. In addition, circular dichroism analyses were completed for the wild type and several mutant pro-peptides to evaluate actual differences in secondary structure. The results lead to a new model of MATα pro-peptide signal leader, which suggests that the N and C-termini of MATα pro-peptide need to be presented in a specific orientation for proper interaction with the cellular secretion machinery and for efficient protein secretion. Copyright © 2016 Elsevier B.V. All rights reserved.
Secretory NaCl and volume flow in renal tubules.
Beyenbach, K W
1986-05-01
This review attempts to give a retrospective survey of the available evidence concerning the secretion of NaCl and fluid in renal tubules of the vertebrate kidney. In the absence of glomerular filtration, epithelial secretory mechanisms, which to this date have not been elucidated, are responsible for the renal excretion of NaCl and water in aglomerular fish. However, proximal tubules isolated from glomerular fish kidneys of the flounder, killifish, and the shark also have the capacity to secrete NaCl and fluid. In shark proximal tubules, fluid secretion appears to be driven via secondary active transport of Cl. In another marine vertebrate, the sea snake, secretion of Na (presumably NaCl) and fluid is observed in freshwater-adapted and water-loaded animals. Proximal tubules of mammals can be made to secrete NaCl in vitro together with secretion of aryl acids. An epithelial cell line derived from dog kidney exhibits secondary active secretion of Cl when stimulated with catecholamines. Tubular secretion of NaCl and fluid may serve a variety of renal functions, all of which are considered here. The occurrence of NaCl and fluid secretion in glomerular proximal tubules of teleosts, elasmobranchs, and reptiles and in mammalian renal tissue cultures suggests that the genetic potential for NaCl secretion is present in every vertebrate kidney.
A gatekeeper chaperone complex directs translocator secretion during Type Three Secretion
Archuleta, Tara L.; Spiller, Benjamin W.; Kubori, Tomoko
2014-11-06
Many Gram-negative bacteria use Type Three Secretion Systems (T3SS) to deliver effector proteins into host cells. These protein delivery machines are composed of cytosolic components that recognize substrates and generate the force needed for translocation, the secretion conduit, formed by a needle complex and associated membrane spanning basal body, and translocators that form the pore in the target cell. A defined order of secretion in which needle component proteins are secreted first, followed by translocators, and finally effectors, is necessary for this system to be effective. While the secreted effectors vary significantly between organisms, the ~20 individual protein components thatmore » form the T3SS are conserved in many pathogenic bacteria. One such conserved protein, referred to as either a plug or gatekeeper, is necessary to prevent unregulated effector release and to allow efficient translocator secretion. The mechanism by which translocator secretion is promoted while effector release is inhibited by gatekeepers is unknown. We present the structure of the Chlamydial gatekeeper, CopN, bound to a translocator-specific chaperone. The structure identifies a previously unknown interface between gatekeepers and translocator chaperones and reveals that in the gatekeeper-chaperone complex the canonical translocator-binding groove is free to bind translocators. Thus, structure-based mutagenesis of the homologous complex in Shigella reveals that the gatekeeper-chaperone-translocator complex is essential for translocator secretion and for the ordered secretion of translocators prior to effectors.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yokawa, Satoru; School of Pharmacy, Aichi Gakuin University, Nagoya 464-8650; Suzuki, Takahiro
We have firstly visualized glucagon secretion using a method of video-rate bioluminescence imaging. The fusion protein of proglucagon and Gaussia luciferase (PGCG-GLase) was used as a reporter to detect glucagon secretion and was efficiently expressed in mouse pancreatic α cells (αTC1.6) using a preferred human codon-optimized gene. In the culture medium of the cells expressing PGCG-GLase, luminescence activity determined with a luminometer was increased with low glucose stimulation and KCl-induced depolarization, as observed for glucagon secretion. From immunochemical analyses, PGCG-GLase stably expressed in clonal αTC1.6 cells was correctly processed and released by secretory granules. Luminescence signals of the secreted PGCG-GLase frommore » the stable cells were visualized by video-rate bioluminescence microscopy. The video images showed an increase in glucagon secretion from clustered cells in response to stimulation by KCl. The secretory events were observed frequently at the intercellular contact regions. Thus, the localization and frequency of glucagon secretion might be regulated by cell-cell adhesion. - Highlights: • The fused protein of proglucagon to Gaussia luciferase was used as a reporter. • The fusion protein was highly expressed using a preferred human-codon optimized gene. • Glucagon secretion stimulated by depolarization was determined by luminescence. • Glucagon secretion in α cells was visualized by bioluminescence imaging. • Glucagon secretion sites were localized in the intercellular contact regions.« less
Code of Federal Regulations, 2011 CFR
2011-07-01
... and Finance: Treasury Regulations Relating to Money and Finance (Continued) SECRET SERVICE, DEPARTMENT... SECRET SERVICE AND TEMPORARY OFFICES OF THE PRESIDENT AND STAFF, OR OTHER PERSON PROTECTED BY THE SECRET... part which constitute the temporary residence of the President or other person protected by the Secret...
Code of Federal Regulations, 2010 CFR
2010-07-01
... and Finance: Treasury Regulations Relating to Money and Finance (Continued) SECRET SERVICE, DEPARTMENT... SECRET SERVICE AND TEMPORARY OFFICES OF THE PRESIDENT AND STAFF, OR OTHER PERSON PROTECTED BY THE SECRET... part which constitute the temporary residence of the President or other person protected by the Secret...
Code of Federal Regulations, 2013 CFR
2013-07-01
... and Finance: Treasury Regulations Relating to Money and Finance (Continued) SECRET SERVICE, DEPARTMENT... SECRET SERVICE AND TEMPORARY OFFICES OF THE PRESIDENT AND STAFF, OR OTHER PERSON PROTECTED BY THE SECRET... part which constitute the temporary residence of the President or other person protected by the Secret...
Code of Federal Regulations, 2014 CFR
2014-07-01
... and Finance: Treasury Regulations Relating to Money and Finance (Continued) SECRET SERVICE, DEPARTMENT... SECRET SERVICE AND TEMPORARY OFFICES OF THE PRESIDENT AND STAFF, OR OTHER PERSON PROTECTED BY THE SECRET... part which constitute the temporary residence of the President or other person protected by the Secret...
Code of Federal Regulations, 2012 CFR
2012-07-01
... and Finance: Treasury Regulations Relating to Money and Finance (Continued) SECRET SERVICE, DEPARTMENT... SECRET SERVICE AND TEMPORARY OFFICES OF THE PRESIDENT AND STAFF, OR OTHER PERSON PROTECTED BY THE SECRET... part which constitute the temporary residence of the President or other person protected by the Secret...
6 CFR 7.20 - Classification and declassification authority.
Code of Federal Regulations, 2010 CFR
2010-01-01
.... (a) Top Secret original classification authority may only be exercised by the Secretary of Homeland... up to and including Top Secret. No official who is delegated Top Secret original classification... Secret and Confidential original classification authority to other officials determined to have frequent...
32 CFR 2001.46 - Transmission.
Code of Federal Regulations, 2010 CFR
2010-07-01
... between the U.S., Puerto Rico, or a U.S. possession or trust territory. (1) Top Secret. Top Secret... an authorized government agency courier service; a designated courier or escort with Top Secret clearance; electronic means over approved communications systems. Under no circumstances will Top Secret...
32 CFR 147.19 - The three standards.
Code of Federal Regulations, 2010 CFR
2010-07-01
...) The investigation standard for“Q” access authorizations and for access to top secret (including top secret Special Access Programs) and Sensitive Compartmented Information; (c) The reinvestigation standard... authorizations and for access to confidential and secret (including all secret-level Special Access Programs not...
Normal and abnormal secretion by haemopoietic cells
STINCHCOMBE, JANE C; GRIFFITHS, GILLIAN M
2001-01-01
The secretory lysosomes found in haemopoietic cells provide a very efficient mechanism for delivering the effector proteins of many immune cells in response to antigen recognition. Although secretion shows some similarities to the secretion of specialized granules in other secretory cell types, some aspects of secretory lysosome release appear to be unique to melanocytes and cells of the haemopoietic lineage. Mast cells and platelets have provided excellent models for studying secretion, but recent advances in characterizing the immunological synapse allow a very fine dissection of the secretory process in T lymphocytes. These studies show that secretory lysosomes are secreted from the centre of the talin ring at the synapse. Proper secretion requires a series of Rab and cytoskeletal elements which play critical roles in the specialized secretion of lysosomes in haemopoietic cells. PMID:11380687
Liang, John J; Oelkers, Peter; Guo, Cuiying; Chu, Pi-Chun; Dixon, Joseph L; Ginsberg, Henry N; Sturley, Stephen L
2004-10-22
The relative importance of each core lipid in the assembly and secretion of very low density lipoproteins (VLDL) has been of interest over the past decade. The isolation of genes encoding diacylglycerol acyltransferase (DGAT) and acyl-CoA:cholesterol acyltransferases (ACAT1 and ACAT2) provided the opportunity to investigate the effects of isolated increases in triglycerides (TG) or cholesteryl esters (CE) on apolipoprotein B (apoB) lipoprotein biogenesis. Overexpression of human DGAT1 in rat hepatoma McA-RH7777 cells resulted in increased synthesis, cellular accumulation, and secretion of TG. These effects were associated with decreased intracellular degradation and increased secretion of newly synthesized apoB as VLDL. Similarly, overexpression of human ACAT1 or ACAT2 in McA-RH7777 cells resulted in increased synthesis, cellular accumulation, and secretion of CE. This led to decreased intracellular degradation and increased secretion of VLDL apoB. Overexpression of ACAT2 had a significantly greater impact upon assembly and secretion of VLDL from liver cells than did overexpression of ACAT1. The addition of oleic acid (OA) to media resulted in a further increase in VLDL secretion from cells expressing DGAT1, ACAT1, or ACAT2. VLDL secreted from DGAT1-expressing cells incubated in OA had a higher TG:CE ratio than VLDL secreted from ACAT1- and ACAT2-expressing cells treated with OA. These studies indicate that increasing DGAT1, ACAT1, or ACAT2 expression in McA-RH7777 cells stimulates the assembly and secretion of VLDL from liver cells and that the core composition of the secreted VLDL reflects the enzymatic activity that is elevated.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Samudrala, Ram; Heffron, Fred; McDermott, Jason E.
2009-04-24
The type III secretion system is an essential component for virulence in many Gram-negative bacteria. Though components of the secretion system apparatus are conserved, its substrates, effector proteins, are not. We have used a machine learning approach to identify new secreted effectors. The method integrates evolutionary measures, such as the pattern of homologs in a range of other organisms, and sequence-based features, such as G+C content, amino acid composition and the N-terminal 30 residues of the protein sequence. The method was trained on known effectors from Salmonella typhimurium and validated on a corresponding set of effectors from Pseudomonas syringae, aftermore » eliminating effectors with detectable sequence similarity. The method was able to identify all of the known effectors in P. syringae with a specificity of 84% and sensitivity of 82%. The reciprocal validation, training on P. syringae and validating on S. typhimurium, gave similar results with a specificity of 86% when the sensitivity level was 87%. These results show that type III effectors in disparate organisms share common features. We found that maximal performance is attained by including an N-terminal sequence of only 30 residues, which agrees with previous studies indicating that this region contains the secretion signal. We then used the method to define the most important residues in this putative secretion signal. Finally, we present novel predictions of secreted effectors in S. typhimurium, some of which have been experimentally validated, and apply the method to predict secreted effectors in the genetically intractable human pathogen Chlamydia trachomatis. This approach is a novel and effective way to identify secreted effectors in a broad range of pathogenic bacteria for further experimental characterization and provides insight into the nature of the type III secretion signal.« less
Vitamin E Secretion by Caco-2 Monolayers to APOA1, but Not to HDL, Is Vitamer Selective12
Nicod, Nathalie; Parker, Robert S.
2013-01-01
The aim of this study was to characterize the pathways of basolateral secretion of common dietary tocopherols from polarized Caco-2 monolayers, a model of intestinal absorption. Given differences in structure and physical properties, we hypothesized that secretion may differ between different forms of vitamin E, thus potentially contribute to the selectivity seen in vivo. Monolayers were incubated apically and simultaneously with 10 μmol/L α-, γ-, and δ-tocopherol (1:1:1) in lipid micelles. Treatment with the microsomal triglyceride transfer protein inhibitor BMS201038 revealed that the triglyceride-rich particle secretory pathway (apolipoprotein B–dependent pathway) accounted for ∼80% of total tocopherol secretion, without selectivity among the three forms of vitamin E. Apolipoprotein B–independent secretion of tocopherols (and cholesterol) was greatly enhanced by the liver X receptor agonist T0901317. T0901317 induced ATP-binding cassette transporter A1 (ABCA1) protein expression and basolateral secretion of tocopherols to apolipoprotein A1. ABCA1-dependent secretion demonstrated vitamer selectivity such that efficiency of secretion of α- and γ-tocopherols exceeded that of δ-tocopherol. Basal addition of HDL stimulated vitamin E secretion but without selectivity among the three forms, whereas LDL had no effect. Basal addition of scavenger receptor class B member I (SR-BI) blocking antibody, which inhibits the interaction between SR-BI and HDL, increased basal accumulation of all tocopherols, demonstrating a role for SR-BI in cellular re-uptake of secreted vitamin E. These findings demonstrated that vitamin E and cholesterol utilize common pathways of secretion and that secretion via the ABCA1 pathway favors certain forms of vitamin E. PMID:23946344
A Phytase-Based Reporter System for Identification of Functional Secretion Signals in Bifidobacteria
Osswald, Annika; Westermann, Christina; Sun, Zhongke; Riedel, Christian U.
2015-01-01
Health-promoting effects have been attributed to a number of Bifidobacterium sp. strains. These effects as well as the ability to colonise the host depend on secreted proteins. Moreover, rational design of protein secretion systems bears the potential for the generation of novel probiotic bifidobacteria with improved health-promoting or therapeutic properties. To date, there is only very limited data on secretion signals of bifidobacteria available. Using in silico analysis, we demonstrate that all bifidobacteria encode the major components of Sec-dependent secretion machineries but only B. longum strains harbour Tat protein translocation systems. A reporter plasmid for secretion signals in bifidobacteria was established by fusing the coding sequence of the signal peptide of a sialidase of Bifidobacterium bifidum S17 to the phytase gene appA of E. coli. The recombinant strain showed increased phytase activity in spent culture supernatants and reduced phytase levels in crude extracts compared to the control indicating efficient phytase secretion. The reporter plasmid was used to screen seven predicted signal peptides in B. bifidum S17 and B. longum E18. The tested signal peptides differed substantially in their efficacy to mediate protein secretion in different host strains. An efficient signal peptide was used for expression and secretion of a therapeutically relevant protein in B. bifidum S17. Expression of a secreted cytosine deaminase led to a 100-fold reduced sensitivity of B. bifidum S17 to 5-fluorocytosine compared to the non-secreted cytosine deaminase suggesting efficient conversion of 5-fluorocytosine to the cytotoxic cancer drug 5-fluorouracil by cytosine deaminase occurred outside the bacterial cell. Selection of appropriate signal peptides for defined protein secretion might improve therapeutic efficacy as well as probiotic properties of bifidobacteria. PMID:26086721
DOE Office of Scientific and Technical Information (OSTI.GOV)
Werb, Z.
1978-01-01
The effects of glucocorticoids on biochemical functions of macrophages from man, mouse, rabbit, and guinea pig were examined. Secretion of plasminogen activator by human peripheral blood monocytes was decreased 50% with 1 nM dexamethasone. Differentiation of murine monocytic and granulocytic colonies in agar from bone marrow precursors was decreased 50% at 7 days with 20 nM dexamethasone. Secretion of elastase, collagenase, and plasminogen activator by resident and thioglycollate-elicited mouse peritoneal macrophages was decreased by dexamethasone, cortisol, and triamcinolone acetonide (1 to 1,000 nM), but not by progesterone, estradiol, and dihydrotestosterone (1,000 nM); in contast, secretion of lysozyme was not affectedmore » by glucocorticoids. The inhibition of macrophage secretion by dexamethasone was both time and dose dependent. Inhibition of macrophage secretion increased with increasing glucocorticoid concentration. Half-maximum inhibition of secretion of elastase, collagenase, and plasminogen activator was seen at dexamethasone concentrations (1 to 10 nM) similar to those that half-saturated the specific glucocorticoid receptors. At high concentrations of dexamethasone (100 to 1,000 nM) the secretion of plasminogen activator was inhibited to a greater extent (>95%) than the secretion of elastase (60 to 80%).Progesterone alone had no effect on secretion, but blocked the inhibitory effects of dexamethasone and cortisol. Secretion of collagenase, neutral proteinases, and plasminogen activator by elicited rabbit alveolar macrophages was inhibited with glucocorticoids (0.1 to 100 nM) but not with progesterone or sex steroids. Secretion of a neutral elastinolytic proteinase by guinea pig alveolar macrophages was also inhibited by dexamethasone.« less
NASA Astrophysics Data System (ADS)
Ko, Heasin; Lim, Kyongchun; Oh, Junsang; Rhee, June-Koo Kevin
2016-10-01
Quantum channel loopholes due to imperfect implementations of practical devices expose quantum key distribution (QKD) systems to potential eavesdropping attacks. Even though QKD systems are implemented with optical devices that are highly selective on spectral characteristics, information theory-based analysis about a pertinent attack strategy built with a reasonable framework exploiting it has never been clarified. This paper proposes a new type of trojan horse attack called hidden pulse attack that can be applied in a plug-and-play QKD system, using general and optimal attack strategies that can extract quantum information from phase-disturbed quantum states of eavesdropper's hidden pulses. It exploits spectral characteristics of a photodiode used in a plug-and-play QKD system in order to probe modulation states of photon qubits. We analyze the security performance of the decoy-state BB84 QKD system under the optimal hidden pulse attack model that shows enormous performance degradation in terms of both secret key rate and transmission distance.
Low-power cryptographic coprocessor for autonomous wireless sensor networks
NASA Astrophysics Data System (ADS)
Olszyna, Jakub; Winiecki, Wiesław
2013-10-01
The concept of autonomous wireless sensor networks involves energy harvesting, as well as effective management of system resources. Public-key cryptography (PKC) offers the advantage of elegant key agreement schemes with which a secret key can be securely established over unsecure channels. In addition to solving the key management problem, the other major application of PKC is digital signatures, with which non-repudiation of messages exchanges can be achieved. The motivation for studying low-power and area efficient modular arithmetic algorithms comes from enabling public-key security for low-power devices that can perform under constrained environment like autonomous wireless sensor networks. This paper presents a cryptographic coprocessor tailored to the autonomous wireless sensor networks constraints. Such hardware circuit is aimed to support the implementation of different public-key cryptosystems based on modular arithmetic in GF(p) and GF(2m). Key components of the coprocessor are described as GEZEL models and can be easily transformed to VHDL and implemented in hardware.
Detector-device-independent quantum key distribution: Security analysis and fast implementation
DOE Office of Scientific and Technical Information (OSTI.GOV)
Boaron, Alberto; Korzh, Boris; Houlmann, Raphael
One of the most pressing issues in quantum key distribution (QKD) is the problem of detector side-channel attacks. To overcome this problem, researchers proposed an elegant “time-reversal” QKD protocol called measurement-device-independent QKD (MDI-QKD), which is based on time-reversed entanglement swapping. But, MDI-QKD is more challenging to implement than standard point-to-point QKD. Recently, we proposed an intermediary QKD protocol called detector-device-independent QKD (DDI-QKD) in order to overcome the drawbacks of MDI-QKD, with the hope that it would eventually lead to a more efficient detector side-channel-free QKD system. We analyze the security of DDI-QKD and elucidate its security assumptions. We find thatmore » DDI-QKD is not equivalent to MDI-QKD, but its security can be demonstrated with reasonable assumptions. On the more practical side, we consider the feasibility of DDI-QKD and present a fast experimental demonstration (clocked at 625 MHz), capable of secret key exchange up to more than 90 km.« less
Quantum exhaustive key search with simplified-DES as a case study.
Almazrooie, Mishal; Samsudin, Azman; Abdullah, Rosni; Mutter, Kussay N
2016-01-01
To evaluate the security of a symmetric cryptosystem against any quantum attack, the symmetric algorithm must be first implemented on a quantum platform. In this study, a quantum implementation of a classical block cipher is presented. A quantum circuit for a classical block cipher of a polynomial size of quantum gates is proposed. The entire work has been tested on a quantum mechanics simulator called libquantum. First, the functionality of the proposed quantum cipher is verified and the experimental results are compared with those of the original classical version. Then, quantum attacks are conducted by using Grover's algorithm to recover the secret key. The proposed quantum cipher is used as a black box for the quantum search. The quantum oracle is then queried over the produced ciphertext to mark the quantum state, which consists of plaintext and key qubits. The experimental results show that for a key of n-bit size and key space of N such that [Formula: see text], the key can be recovered in [Formula: see text] computational steps.
Detector-device-independent quantum key distribution: Security analysis and fast implementation
Boaron, Alberto; Korzh, Boris; Houlmann, Raphael; ...
2016-08-09
One of the most pressing issues in quantum key distribution (QKD) is the problem of detector side-channel attacks. To overcome this problem, researchers proposed an elegant “time-reversal” QKD protocol called measurement-device-independent QKD (MDI-QKD), which is based on time-reversed entanglement swapping. But, MDI-QKD is more challenging to implement than standard point-to-point QKD. Recently, we proposed an intermediary QKD protocol called detector-device-independent QKD (DDI-QKD) in order to overcome the drawbacks of MDI-QKD, with the hope that it would eventually lead to a more efficient detector side-channel-free QKD system. We analyze the security of DDI-QKD and elucidate its security assumptions. We find thatmore » DDI-QKD is not equivalent to MDI-QKD, but its security can be demonstrated with reasonable assumptions. On the more practical side, we consider the feasibility of DDI-QKD and present a fast experimental demonstration (clocked at 625 MHz), capable of secret key exchange up to more than 90 km.« less
Practical secure quantum communications
NASA Astrophysics Data System (ADS)
Diamanti, Eleni
2015-05-01
We review recent advances in the field of quantum cryptography, focusing in particular on practical implementations of two central protocols for quantum network applications, namely key distribution and coin flipping. The former allows two parties to share secret messages with information-theoretic security, even in the presence of a malicious eavesdropper in the communication channel, which is impossible with classical resources alone. The latter enables two distrustful parties to agree on a random bit, again with information-theoretic security, and with a cheating probability lower than the one that can be reached in a classical scenario. Our implementations rely on continuous-variable technology for quantum key distribution and on a plug and play discrete-variable system for coin flipping, and necessitate a rigorous security analysis adapted to the experimental schemes and their imperfections. In both cases, we demonstrate the protocols with provable security over record long distances in optical fibers and assess the performance of our systems as well as their limitations. The reported advances offer a powerful toolbox for practical applications of secure communications within future quantum networks.
Lu, Jin Fang; Wang, Wei Na; Wang, Gai Ling; Zhang, He; Zhou, Ying; Gao, Zhi Peng; Nie, Pin; Xie, Hai Xia
2016-01-01
The type III secretion system (T3SS) of Edwardsiella tarda is crucial for its intracellular survival and pathogenesis in fish. The orf13 gene (escE) of E. tarda is located 84 nucleotides (nt) upstream of esrC in the T3SS gene cluster. We found that EscE is secreted and translocated in a T3SS-dependent manner and that amino acids 2 to 15 in the N terminus were required for a completely functional T3SS in E. tarda. Deletion of escE abolished the secretion of T3SS translocators, as well as the secretion and translocation of T3SS effectors, but did not influence their intracellular protein levels in E. tarda. Complementation of the escE mutant with a secretion-incompetent EscE derivative restored the secretion of translocators and effectors. Interestingly, the effectors that were secreted and translocated were positively correlated with the EscE protein level in E. tarda. The escE mutant was attenuated in the blue gourami fish infection model, as its 50% lethal dose (LD50) increased to 4 times that of the wild type. The survival rate of the escE mutant-strain-infected fish was 69%, which was much higher than that of the fish infected with the wild-type bacteria (6%). Overall, EscE represents a secreted T3SS regulator that controls effector injection and translocator secretion, thus contributing to E. tarda pathogenesis in fish. The homology of EscE within the T3SSs of other bacterial species suggests that the mechanism of secretion and translocation control used by E. tarda may be commonly used by other bacterial pathogens. Copyright © 2015, American Society for Microbiology. All Rights Reserved.
Monks, Jenifer; Dzieciatkowska, Monika; Bales, Elise S; Orlicky, David J; Wright, Richard M; McManaman, James L
2016-10-15
Xanthine oxidoreductase (XOR) modulates milk lipid secretion and lactation initiation. XOR is required for butyrophilin1a1 clustering in the membrane during milk lipid secretion. XOR mediates apical membrane reorganization during milk lipid secretion. Loss of XOR delays milk fat globule secretion. XOR loss alters the proteome of milk fat globules. Apocrine secretion is utilized by epithelial cells of exocrine glands. These cells bud off membrane-bound particles into the lumen of the gland, losing a portion of the cytoplasm in the secretion product. The lactating mammary gland secretes milk lipid by this mechanism, and xanthine oxidoreductase (XOR) has long been thought to be functionally important. We generated mammary-specific XOR knockout (MGKO) mice, expecting lactation to fail. Histology of the knockout glands showed very large lipid droplets enclosed in the mammary alveolar cells, but milk analysis showed that these large globules were secreted. Butyrophilin, a membrane protein known to bind to XOR, was clustered at the point of contact of the cytoplasmic lipid droplet with the apical plasma membrane, in the wild-type gland but not in the knockout, suggesting that XOR mediates 'docking' to this membrane. Secreted milk fat globules were isolated from mouse milk of wild-type and XOR MGKO dams, and subjected to LC-MS/MS for analysis of protein component. Proteomic results showed that loss of XOR leads to an increase in cytoplasmic, cytoskeletal, Golgi apparatus and lipid metabolism proteins associated with the secreted milk fat globule. Association of XOR with the lipid droplet results in membrane docking and more efficient retention of cytoplasmic components by the secretory cell. Loss of XOR then results in a reversion to a more rudimentary, less efficient, apocrine secretion mechanism, but does not prevent milk fat globule secretion. © 2016 The Authors. The Journal of Physiology © 2016 The Physiological Society.
The Physical Burdens of Secrecy
ERIC Educational Resources Information Center
Slepian, Michael L.; Masicampo, E. J.; Toosi, Negin R.; Ambady, Nalini
2012-01-01
The present work examined whether secrets are experienced as physical burdens, thereby influencing perception and action. Four studies examined the behavior of people who harbored important secrets, such as secrets concerning infidelity and sexual orientation. People who recalled, were preoccupied with, or suppressed an important secret estimated…
10 CFR 1016.34 - Accountability for Secret Restricted Data.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 4 2012-01-01 2012-01-01 false Accountability for Secret Restricted Data. 1016.34 Section... Information § 1016.34 Accountability for Secret Restricted Data. Each permittee possessing documents containing Secret Restricted Data shall establish a document accountability procedure and shall maintain...
Code of Federal Regulations, 2011 CFR
2011-07-01
... and Finance: Treasury Regulations Relating to Money and Finance (Continued) SECRET SERVICE, DEPARTMENT... SECRET SERVICE AND TEMPORARY OFFICES OF THE PRESIDENT AND STAFF, OR OTHER PERSON PROTECTED BY THE SECRET... persons protected by the Secret Service shall be that property which each designates for protection by the...
10 CFR 1016.34 - Accountability for Secret Restricted Data.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 4 2014-01-01 2014-01-01 false Accountability for Secret Restricted Data. 1016.34 Section... Information § 1016.34 Accountability for Secret Restricted Data. Each permittee possessing documents containing Secret Restricted Data shall establish a document accountability procedure and shall maintain...
10 CFR 1016.34 - Accountability for Secret Restricted Data.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 4 2013-01-01 2013-01-01 false Accountability for Secret Restricted Data. 1016.34 Section... Information § 1016.34 Accountability for Secret Restricted Data. Each permittee possessing documents containing Secret Restricted Data shall establish a document accountability procedure and shall maintain...
Code of Federal Regulations, 2012 CFR
2012-07-01
... and Finance: Treasury Regulations Relating to Money and Finance (Continued) SECRET SERVICE, DEPARTMENT... SECRET SERVICE AND TEMPORARY OFFICES OF THE PRESIDENT AND STAFF, OR OTHER PERSON PROTECTED BY THE SECRET... persons protected by the Secret Service shall be that property which each designates for protection by the...
10 CFR 1016.34 - Accountability for Secret Restricted Data.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 4 2010-01-01 2010-01-01 false Accountability for Secret Restricted Data. 1016.34 Section... Information § 1016.34 Accountability for Secret Restricted Data. Each permittee possessing documents containing Secret Restricted Data shall establish a document accountability procedure and shall maintain...
Code of Federal Regulations, 2013 CFR
2013-07-01
... and Finance: Treasury Regulations Relating to Money and Finance (Continued) SECRET SERVICE, DEPARTMENT... SECRET SERVICE AND TEMPORARY OFFICES OF THE PRESIDENT AND STAFF, OR OTHER PERSON PROTECTED BY THE SECRET... persons protected by the Secret Service shall be that property which each designates for protection by the...
10 CFR 1016.34 - Accountability for Secret Restricted Data.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 4 2011-01-01 2011-01-01 false Accountability for Secret Restricted Data. 1016.34 Section... Information § 1016.34 Accountability for Secret Restricted Data. Each permittee possessing documents containing Secret Restricted Data shall establish a document accountability procedure and shall maintain...
32 CFR 2800.4 - General information.
Code of Federal Regulations, 2010 CFR
2010-07-01
... STATES SECURITY PROCEDURES § 2800.4 General information. (a) Staff Security Officer/Top Secret Control... Staff Security Officer will serve as Top Secret Control Officer and Assistant Top Secret Control Officer... responsible for the overall supervision of the Top Secret Control program. They will maintain positive control...
14 CFR 1203.203 - Degree of protection.
Code of Federal Regulations, 2010 CFR
2010-01-01
... classified documents or materials except as expressly provided by statute or by NASA Directives. (1) Top Secret. Top Secret is the designation applied to information or material the unauthorized disclosure of... security. (2) Secret. Secret is the designation applied to information or material the unauthorized...
41 CFR 105-62.102 - Authority to originally classify.
Code of Federal Regulations, 2013 CFR
2013-07-01
... originally classify. (a) Top secret, secret, and confidential. The authority to originally classify information as Top Secret, Secret, or Confidential may be exercised only by the Administrator and is delegable... classification authority. Delegations of original classification authority are limited to the minimum number...
41 CFR 105-62.102 - Authority to originally classify.
Code of Federal Regulations, 2011 CFR
2011-01-01
... originally classify. (a) Top secret, secret, and confidential. The authority to originally classify information as Top Secret, Secret, or Confidential may be exercised only by the Administrator and is delegable... classification authority. Delegations of original classification authority are limited to the minimum number...
41 CFR 105-62.102 - Authority to originally classify.
Code of Federal Regulations, 2014 CFR
2014-01-01
... originally classify. (a) Top secret, secret, and confidential. The authority to originally classify information as Top Secret, Secret, or Confidential may be exercised only by the Administrator and is delegable... classification authority. Delegations of original classification authority are limited to the minimum number...
Exosome secretion affects social motility in Trypanosoma brucei
Shaked, Hadassa; Arvatz, Gil; Tkacz, Itai Dov; Binder, Lior; Waldman Ben-Asher, Hiba; Okalang, Uthman; Chikne, Vaibhav; Cohen-Chalamish, Smadar; Michaeli, Shulamit
2017-01-01
Extracellular vesicles (EV) secreted by pathogens function in a variety of biological processes. Here, we demonstrate that in the protozoan parasite Trypanosoma brucei, exosome secretion is induced by stress that affects trans-splicing. Following perturbations in biogenesis of spliced leader RNA, which donates its spliced leader (SL) exon to all mRNAs, or after heat-shock, the SL RNA is exported to the cytoplasm and forms distinct granules, which are then secreted by exosomes. The exosomes are formed in multivesicular bodies (MVB) utilizing the endosomal sorting complexes required for transport (ESCRT), through a mechanism similar to microRNA secretion in mammalian cells. Silencing of the ESCRT factor, Vps36, compromised exosome secretion but not the secretion of vesicles derived from nanotubes. The exosomes enter recipient trypanosome cells. Time-lapse microscopy demonstrated that cells secreting exosomes or purified intact exosomes affect social motility (SoMo). This study demonstrates that exosomes are delivered to trypanosome cells and can change their migration. Exosomes are used to transmit stress signals for communication between parasites. PMID:28257521
Human Beta Cells Produce and Release Serotonin to Inhibit Glucagon Secretion from Alpha Cells.
Almaça, Joana; Molina, Judith; Menegaz, Danusa; Pronin, Alexey N; Tamayo, Alejandro; Slepak, Vladlen; Berggren, Per-Olof; Caicedo, Alejandro
2016-12-20
In the pancreatic islet, serotonin is an autocrine signal increasing beta cell mass during metabolic challenges such as those associated with pregnancy or high-fat diet. It is still unclear whether serotonin is relevant for regular islet physiology and hormone secretion. Here, we show that human beta cells produce and secrete serotonin when stimulated with increases in glucose concentration. Serotonin secretion from beta cells decreases cyclic AMP (cAMP) levels in neighboring alpha cells via 5-HT 1F receptors and inhibits glucagon secretion. Without serotonergic input, alpha cells lose their ability to regulate glucagon secretion in response to changes in glucose concentration, suggesting that diminished serotonergic control of alpha cells can cause glucose blindness and the uncontrolled glucagon secretion associated with diabetes. Supporting this model, pharmacological activation of 5-HT 1F receptors reduces glucagon secretion and has hypoglycemic effects in diabetic mice. Thus, modulation of serotonin signaling in the islet represents a drug intervention opportunity. Published by Elsevier Inc.
Novel Threshold Changeable Secret Sharing Schemes Based on Polynomial Interpolation
Li, Mingchu; Guo, Cheng; Choo, Kim-Kwang Raymond; Ren, Yizhi
2016-01-01
After any distribution of secret sharing shadows in a threshold changeable secret sharing scheme, the threshold may need to be adjusted to deal with changes in the security policy and adversary structure. For example, when employees leave the organization, it is not realistic to expect departing employees to ensure the security of their secret shadows. Therefore, in 2012, Zhang et al. proposed (t → t′, n) and ({t1, t2,⋯, tN}, n) threshold changeable secret sharing schemes. However, their schemes suffer from a number of limitations such as strict limit on the threshold values, large storage space requirement for secret shadows, and significant computation for constructing and recovering polynomials. To address these limitations, we propose two improved dealer-free threshold changeable secret sharing schemes. In our schemes, we construct polynomials to update secret shadows, and use two-variable one-way function to resist collusion attacks and secure the information stored by the combiner. We then demonstrate our schemes can adjust the threshold safely. PMID:27792784
Lamberts, S W; Oosterom, R; Verleun, T; Krenning, E P; Assies, H
1984-08-01
The regulation of TSH and GH secretion was investigated in cultured tumor cells prepared from a mixed TSH/GH secreting pituitary tumor. The tumor tissue had been removed transsphenoidally from a patient with hyperthyroidism and inappropriately high serum TSH levels and acromegaly. TSH and GH secretion by cultured cells were stimulated in a parallel way by TRH (300 nM) and LHRH (50 nM), but were unaffected by bromocriptine (10 nM). Exposure of the tumor cells to dexamethasone (0.1 microM) or T3 (50 nM) had differential effects on hormone secretion. GH secretion was greatly stimulated by dexamethasone, but unaffected by T3. TSH secretion was inhibited both by T3 and by dexamethasone. So, T3 and glucocorticoids inhibit TSH release by the human pituitary tumor cells studied at least partly by means of a direct effect.
Novel Threshold Changeable Secret Sharing Schemes Based on Polynomial Interpolation.
Yuan, Lifeng; Li, Mingchu; Guo, Cheng; Choo, Kim-Kwang Raymond; Ren, Yizhi
2016-01-01
After any distribution of secret sharing shadows in a threshold changeable secret sharing scheme, the threshold may need to be adjusted to deal with changes in the security policy and adversary structure. For example, when employees leave the organization, it is not realistic to expect departing employees to ensure the security of their secret shadows. Therefore, in 2012, Zhang et al. proposed (t → t', n) and ({t1, t2,⋯, tN}, n) threshold changeable secret sharing schemes. However, their schemes suffer from a number of limitations such as strict limit on the threshold values, large storage space requirement for secret shadows, and significant computation for constructing and recovering polynomials. To address these limitations, we propose two improved dealer-free threshold changeable secret sharing schemes. In our schemes, we construct polynomials to update secret shadows, and use two-variable one-way function to resist collusion attacks and secure the information stored by the combiner. We then demonstrate our schemes can adjust the threshold safely.
Imai, Saki; Kusakabe, Takahiro; Xu, Jian; Li, Zhiqing; Shirai, Shintaro; Mon, Hiroaki; Morokuma, Daisuke; Lee, Jae Man
2015-11-01
Baculovirus expression vector system (BEVS) is widely used for production of recombinant eukaryotic proteins in insect larvae or cultured cells. BEVS has advantages over bacterial expression system in producing post-translationally modified secreted proteins. However, for some unknown reason, it is very difficult for insects to secrete sufficiently for certain proteins of interest. To understand the reasons why insect cells fail to secrete some kinds of recombinant proteins, we here employed three mammalian proteins as targets, EPO, HGF, and Wnt3A, with different secretion levels in BEVS and investigated their mRNA transcriptions from the viral genome, subcellular localizations, and interactions with silkworm ER chaperones. Moreover, we observed that no significantly influence on the secretion amounts of all three proteins when depleting or overexpressing most endogenous ER chaperone genes in cultured silkworm cells. However, among all detected ER chaperones, the depletion of BiP severely decreased the recombinant protein secretion in BEVS, indicating the possible central role of Bip in silkworm secretion pathway.
Beaudoin, M; Carey, M C; Small, D M
1975-01-01
Bile salts play a major role in bile formation and biliary lipid secretion. Sodium taurodihydrofusidate (TDHF), a derivative of the antibiotic fusidic acid, closely resembles bile salts in terms of structure, micellar characteristics, and capacity ot solubilize otherwise insolbule lipids. We have therefore studied the biliary secretion of this bile salt analogue and its influence on bile formation and biliary lipid secretion in primates. Alert, unanesthetized female rhesus monkeys prepared with a total biliary fistula were allowed to reach a steady bile salt secretion rate before each study. In three animals (group I),[14C]TDHF was infused intravenously. Most of the compound was secreted rapidly in bile chemically unchanged. The biliary secretion of this drug produced a twofold increase in bile flow; however, the bile salt output was markedly reduced during the infusion. In spite of this reduction, the phospholipid output remained essentially unchanged whereas the cholesterol output increased almost twofold. In five other animals (group II), the effect of TDHF on the bile salt secretion was further investigated by an intravenous infusion of [14C]taurocholate followed by a combined infusion of [14C]taurocholate and TDHF. When TDHF was added to the infusate, a reduction in the [14C]taurocholate output and a progressive rise in the plasma [14C]taurocholate concentration were observed in each animal. An analysis of the data in both groups indicates that (a) the most likely explanation to account for the decreased bile salt output is that the bile salt analogue, TDHF, interfered with bile salt secretion into the biliary canaliculi; (b) TDHF induces a greater secretion of biliary water than was observed with bile salts, an effect consistent with a stimulation of the bile salt-independent canalicular flow; (c) at similar 3alpha-hydroxysteroid secretion rates TDHF caused a significant increase in cholesterol secretion compared to that induced by bile salt. This finding suggests that TDHF affects cholesterol metabolism or secretion in a way distinct from bile salts. Thus, the solubilization of biliary lipids in mixed micelles, although essential, is only one of the factors which determine their secretion into bile. PMID:811689
Steingoetter, Andreas; Sauter, Matthias; Curcic, Jelena; Liu, Dian; Menne, Dieter; Fried, Michael; Fox, Mark; Schwizer, Werner
2015-09-02
Postprandial accumulation of gastric secretions in the proximal stomach above the meal adjacent to the esophagogastric junction (EGJ), referred to as the 'acid pocket', has been proposed as a pathophysiological factor in gastro-esophageal reflux disease (GERD) and as a target for GERD treatment. This study assessed the effect of proton pump inhibitor (PPI) therapy on the volume, distribution and acidity of gastric secretions in GERD and healthy subjects (HS). A randomized, double blind, cross-over study in 12 HS and 12 GERD patients pre-treated with 40 mg pantoprazole (PPI) or placebo b.i.d. was performed. Postprandial secretion volume (SV), formation of a secretion layer and contact between the layer and the EGJ were quantified by Magnetic Resonance Imaging (MRI). Multi-channel pH-monitoring assessed intragastric pH. A distinct layer of undiluted acid secretion was present on top of gastric contents in almost all participants on and off high-dose acid suppression. PPI reduced SV (193 ml to 100 ml, in HS, 227 ml to 94 ml in GERD; p < 0.01) and thickness of the acid layer (26 mm to 7 mm, 36 mm to 9 mm respectively, p < 0.01). No differences in secretion volume or layer thickness were observed between groups; however, off treatment, contact time between the secretion layer and EGJ was 2.6 times longer in GERD compared to HS (p = 0.012). This was not the case on PPI. MRI can visualize and quantify the volume and distribution dynamics of gastric secretions that form a layer in the proximal stomach after ingestion of a liquid meal. The secretion volume and the secretion layer on top of gastric contents is similar in GERD patients and HS; however contact between the layer of undiluted secretion and the EGJ is prolonged in patients. High dose PPI reduced secretion volume by about 50% and reduced contact time between secretion and EGJ towards normal levels. NCT01212614.
[Exo- and endosecretive digestive glands of enzymes as modulators of secretion].
Korot'ko, G F
2010-01-01
Enzymes, exosecreted by the digestive glands plays not only a role of the hydrolases, but also an informational and modulating role in the urgent adaptation of the enzyme secretion to the structure and properties of the luminal content of the gastrointestinal tract. Endosecreted enzymes in the blood not only inform about enzymatic condition of the hydrolase-producing glands and duct system, but also plays an informational and modulating role by the inhibition of the secretion of the same enzymes, and by the stimulation of the secretion of the heteronymic enzyme, defines a parity of their secretion and recretion, integrates enzyme secretion of the pancreas and gastric glands.
Cao, Haojie; van Heel, Auke J; Ahmed, Hifza; Mols, Maarten; Kuipers, Oscar P
2017-04-04
Bacillus subtilis is widely used as a cell factory for numerous heterologous proteins of commercial value and medical interest. To explore the possibility of further enhancing the secretion potential of this model bacterium, a library of engineered strains with modified cell surface components was constructed, and the corresponding influences on protein secretion were investigated by analyzing the secretion of α-amylase variants with either low-, neutral- or high- isoelectric points (pI). Relative to the wild-type strain, the presence of overall anionic membrane phospholipids (phosphatidylglycerol and cardiolipin) increased dramatically in the PssA-, ClsA- and double KO mutants, which resulted in an up to 47% higher secretion of α-amylase. Additionally, we demonstrated that the appropriate net charge of secreted targets (AmyTS-23, AmyBs and AmyBm) was beneficial for secretion efficiency as well. In B. subtilis, the characteristics of cell membrane phospholipid bilayer and the pIs of heterologous α-amylases appear to be important for their secretion efficiency. These two factors can be engineered to reduce the electrostatic interaction between each other during the secretion process, which finally leads to a better secretion yield of α-amylases.
Optical properties of the uropygial gland secretion: no evidence for UV cosmetics in birds
NASA Astrophysics Data System (ADS)
Delhey, Kaspar; Peters, Anne; Biedermann, Peter H. W.; Kempenaers, Bart
2008-10-01
Ultraviolet (UV) reflectance of the plumage is common in birds and plays an important role in sexual signalling. Recently, it has been proposed that birds are able to modify plumage UV reflectance by the application of uropygial gland secretion. Based on a survey of the optical properties of this secretion from 51 species belonging to 12 avian orders, we show that two main types of uropygial secretions exist, one predominantly found in passerines and one in non-passerines, both reducing relative UV reflectance of a white background (Teflon™ tape). We quantified how each type of secretion (exemplified by blue tit and mallard) affected feather UV reflectance. Both secretions reduced overall brightness and relative UV reflectance of white mallard feathers but hardly affected the reflectance of UV/blue blue tit crown feathers. According to models of avian colour vision, changes in reflectance due to application of the secretion were at or below the discrimination threshold of most birds. We conclude that the uropygial secretion is unlikely to play a major role in modifying plumage UV reflectance. However, the optical properties of the uropygial secretion may have been selected to interfere as little as possible with visual signaling through plumage reflectance.
Effects and Mechanisms of Tastants on the Gustatory-Salivary Reflex in Human Minor Salivary Glands.
Satoh-Kuriwada, Shizuko; Shoji, Noriaki; Miyake, Hiroyuki; Watanabe, Chiyo; Sasano, Takashi
2018-01-01
The effects and mechanisms of tastes on labial minor salivary gland (LMSG) secretion were investigated in 59 healthy individuals. Stimulation with each of the five basic tastes (i.e., sweet, salty, sour, bitter, and umami) onto the tongue induced LMSG secretion in a dose-dependent manner. Umami and sour tastes evoked greater secretion than did the other tastes. A synergistic effect of umami on LMSG secretion was recognized: a much greater increase in secretion was observed by a mixed solution of monosodium glutamate and inosine 5'-monophosphate than by each separate stimulation. Blood flow (BF) in the nearby labial mucosa also increased following stimulation by each taste except bitter. The BF change and LMSG secretion in each participant showed a significant positive correlation with all tastes, including bitter. Administration of cevimeline hydrochloride hydrate to the labial mucosa evoked a significant increase in both LMSG secretion and BF, while adrenaline, atropine, and pirenzepine decreased LMSG secretion and BF. The change in LMSG secretion and BF induced by each autonomic agent was significantly correlated in each participant. These results indicate that basic tastes can induce the gustatory-salivary reflex in human LMSGs and that parasympathetic regulation is involved in this mechanism.
Computational and Experimental Analysis of the Secretome of Methylococcus capsulatus (Bath)
Indrelid, Stine; Mathiesen, Geir; Jacobsen, Morten; Lea, Tor; Kleiveland, Charlotte R.
2014-01-01
The Gram-negative methanotroph Methylococcus capsulatus (Bath) was recently demonstrated to abrogate inflammation in a murine model of inflammatory bowel disease, suggesting interactions with cells involved in maintaining mucosal homeostasis and emphasizing the importance of understanding the many properties of M. capsulatus. Secreted proteins determine how bacteria may interact with their environment, and a comprehensive knowledge of such proteins is therefore vital to understand bacterial physiology and behavior. The aim of this study was to systematically analyze protein secretion in M. capsulatus (Bath) by identifying the secretion systems present and the respective secreted substrates. Computational analysis revealed that in addition to previously recognized type II secretion systems and a type VII secretion system, a type Vb (two-partner) secretion system and putative type I secretion systems are present in M. capsulatus (Bath). In silico analysis suggests that the diverse secretion systems in M.capsulatus transport proteins likely to be involved in adhesion, colonization, nutrient acquisition and homeostasis maintenance. Results of the computational analysis was verified and extended by an experimental approach showing that in addition an uncharacterized protein and putative moonlighting proteins are released to the medium during exponential growth of M. capsulatus (Bath). PMID:25479164
Yoshimura, Yuri; Kasuya, Eiiti
2013-01-01
The roles played by nonfatal secretions of adult anurans in the avoidance of predation remain unknown. The adult Wrinkled frog (Rana rugosa) has warty skin with the odorous mucus secretion that is not fatal to the snake Elaphe quadrivirgata. We fed R. rugosa or Fejervarya limnocharis, which resembles R. rugosa in appearance and has mucus secretion, to snakes and compared the snakes’ responses to the frogs. Compared to F. limnocharis, R. rugosa was less frequently bitten or swallowed by snakes. The snakes that bit R. rugosa spat out the frogs and showed mouth opening (gaping) behavior, while the snakes that bit F. limnocharis did not show gaping behavior. We also compared the responses of the snakes to R. rugosa and F. limnocharis secretions. We coated palatable R. japonica with secretions from R. rugosa or F. limnocharis. The frogs coated by R. rugosa secretion were less frequently bitten or swallowed than those coated by F. limnocharis secretion. We concluded that compared to different frog species of similar sizes, the adult R. rugosa was less frequently preyed upon by, and that its skin secretion was effective in avoiding predation by snakes. PMID:24278410
Yoshimura, Yuri; Kasuya, Eiiti
2013-01-01
The roles played by nonfatal secretions of adult anurans in the avoidance of predation remain unknown. The adult Wrinkled frog (Rana rugosa) has warty skin with the odorous mucus secretion that is not fatal to the snake Elaphe quadrivirgata. We fed R. rugosa or Fejervarya limnocharis, which resembles R. rugosa in appearance and has mucus secretion, to snakes and compared the snakes' responses to the frogs. Compared to F. limnocharis, R. rugosa was less frequently bitten or swallowed by snakes. The snakes that bit R. rugosa spat out the frogs and showed mouth opening (gaping) behavior, while the snakes that bit F. limnocharis did not show gaping behavior. We also compared the responses of the snakes to R. rugosa and F. limnocharis secretions. We coated palatable R. japonica with secretions from R. rugosa or F. limnocharis. The frogs coated by R. rugosa secretion were less frequently bitten or swallowed than those coated by F. limnocharis secretion. We concluded that compared to different frog species of similar sizes, the adult R. rugosa was less frequently preyed upon by, and that its skin secretion was effective in avoiding predation by snakes.
Pérez-Sotelo, Diego; Roca-Rivada, Arturo; Larrosa-García, María; Castelao, Cecilia; Baamonde, Iván; Baltar, Javier; Crujeiras, Ana Belen; Seoane, Luisa María; Casanueva, Felipe F; Pardo, María
2017-02-01
The secretion of the hepatokine alpha-2-Heremans-Schmid glycoprotein/Fetuin A, implicated in pathological processes including systemic insulin resistance, by adipose tissue has been recently described. Thus, we have recently identified its presence in white adipose tissue secretomes by mass spectrometry. However, the secretion pattern and function of adipose-derived alpha-2-Heremans-Schmid glycoprotein are poorly understood. The aim of this study is to evaluate the expression and secretion of total and active phosphorylated alpha-2-Heremans-Schmid glycoprotein by adipose tissue from visceral and subcutaneous localizations in animals at different physiological and nutritional status including anorexia and obesity. Alpha-2-Heremans-Schmid glycoprotein expression and secretion in visceral adipose tissue and subcutaneous adipose tissue explants from animals under fasting and exercise training, at pathological situations such as anorexia and obesity, and from human obese individuals were assayed by immunoblotting, quantitative real-time polymerase chain reaction and enzyme-linked immunosorbent assay. We reveal that visceral adipose tissue expresses and secretes more alpha-2-Heremans-Schmid glycoprotein than subcutaneous adipose tissue, and that this secretion is diminished after fasting and exercise training. Visceral adipose tissue from anorectic animals showed reduced alpha-2-Heremans-Schmid glycoprotein secretion; on the contrary, alpha-2-Heremans-Schmid glycoprotein is over-secreted by visceral adipose tissue in the occurrence of obesity. While secretion of active-PhophoSer321α2HSG by visceral adipose tissue is independent of body mass index, we found that the fraction of active-alpha-2-Heremans-Schmid glycoprotein secreted by subcutaneous adipose tissue increments significantly in situations of obesity. Functional studies show that the inhibition of adipose-derived alpha-2-Heremans-Schmid glycoprotein increases insulin sensitivity in differentiated adipocytes. In conclusion, visceral adipose tissue secretes more alpha-2-Heremans-Schmid glycoprotein than subcutaneous adipose tissue and this secretion is more sensitive to nutritional and physiological changes. The over-secretion of alpha-2-Heremans-Schmid glycoprotein by visceral adipose tissue, the increased secretion of the active phosphorylated form by subcutaneous adipose tissuein obese animals, and the adipose-derived alpha-2-Heremans-Schmid glycoprotein capacity to inhibit the insulin pathway suggest the participation of adipose-derived alpha-2-Heremans-Schmid glycoprotein in the deleterious effects of obesity.
Code of Federal Regulations, 2014 CFR
2014-07-01
... INFORMATION: AND TRADE SECRET DISCLOSURES TO HEALTH PROFESSIONALS Trade Secrecy Claims § 350.1 Definitions... secret. Sanitized means a version of a document from which information claimed as trade secret or... support of a claim that chemical identity is a trade secret. Title III means Title III of the Superfund...
Code of Federal Regulations, 2010 CFR
2010-01-01
... containing trade secrets or confidential commercial or financial information. 9.28 Section 9.28 Energy... notification procedures for information containing trade secrets or confidential commercial or financial... secrets or confidential commercial or financial information, or the NRC believes the information contains...
Code of Federal Regulations, 2011 CFR
2011-01-01
... containing trade secrets or confidential commercial or financial information. 9.28 Section 9.28 Energy... notification procedures for information containing trade secrets or confidential commercial or financial... secrets or confidential commercial or financial information, or the NRC believes the information contains...
Code of Federal Regulations, 2013 CFR
2013-07-01
... INFORMATION: AND TRADE SECRET DISCLOSURES TO HEALTH PROFESSIONALS Trade Secrecy Claims § 350.1 Definitions... secret. Sanitized means a version of a document from which information claimed as trade secret or... support of a claim that chemical identity is a trade secret. Title III means Title III of the Superfund...
40 CFR 209.23 - Trade secrets and privileged information.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 40 Protection of Environment 26 2013-07-01 2013-07-01 false Trade secrets and privileged... secrets and privileged information. In the presentation, admission, disposition, and use of evidence, the administrative law judge shall preserve the confidentiality of trade secrets and other privileged commercial and...
5 CFR 1312.26 - Control of secret and confidential material.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 5 Administrative Personnel 3 2013-01-01 2013-01-01 false Control of secret and confidential... Accountability of Classified Information § 1312.26 Control of secret and confidential material. Classified... Document Control, will be used to establish accountability controls on all Secret material received or...
40 CFR 350.9 - Initial action by EPA.
Code of Federal Regulations, 2011 CFR
2011-07-01
... RIGHT-TO-KNOW INFORMATION: AND TRADE SECRET DISCLOSURES TO HEALTH PROFESSIONALS Trade Secrecy Claims... determine whether chemical identity information claimed as trade secret is entitled to trade secret... disclosure of trade secret chemical identity or if EPA decides to initiate a determination of the validity of...
Code of Federal Regulations, 2013 CFR
2013-01-01
... containing trade secrets or confidential commercial or financial information. 9.28 Section 9.28 Energy... notification procedures for information containing trade secrets or confidential commercial or financial... secrets or confidential commercial or financial information, or the NRC believes the information contains...
22 CFR 1421.15 - Secret ballot.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 22 Foreign Relations 2 2013-04-01 2009-04-01 true Secret ballot. 1421.15 Section 1421.15 Foreign Relations FOREIGN SERVICE LABOR RELATIONS BOARD; FEDERAL LABOR RELATIONS AUTHORITY; GENERAL COUNSEL OF THE... THIS SUBCHAPTER § 1421.15 Secret ballot. Secret ballot means the expression by ballot, voting machine...
Code of Federal Regulations, 2012 CFR
2012-01-01
... containing trade secrets or confidential commercial or financial information. 9.28 Section 9.28 Energy... notification procedures for information containing trade secrets or confidential commercial or financial... secrets or confidential commercial or financial information, or the NRC believes the information contains...
22 CFR 1421.15 - Secret ballot.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 22 Foreign Relations 2 2014-04-01 2014-04-01 false Secret ballot. 1421.15 Section 1421.15 Foreign Relations FOREIGN SERVICE LABOR RELATIONS BOARD; FEDERAL LABOR RELATIONS AUTHORITY; GENERAL COUNSEL OF THE... THIS SUBCHAPTER § 1421.15 Secret ballot. Secret ballot means the expression by ballot, voting machine...
22 CFR 1421.15 - Secret ballot.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 22 Foreign Relations 2 2011-04-01 2009-04-01 true Secret ballot. 1421.15 Section 1421.15 Foreign Relations FOREIGN SERVICE LABOR RELATIONS BOARD; FEDERAL LABOR RELATIONS AUTHORITY; GENERAL COUNSEL OF THE... THIS SUBCHAPTER § 1421.15 Secret ballot. Secret ballot means the expression by ballot, voting machine...
5 CFR 1312.26 - Control of secret and confidential material.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 5 Administrative Personnel 3 2011-01-01 2011-01-01 false Control of secret and confidential... Accountability of Classified Information § 1312.26 Control of secret and confidential material. Classified... Document Control, will be used to establish accountability controls on all Secret material received or...
Code of Federal Regulations, 2014 CFR
2014-01-01
... containing trade secrets or confidential commercial or financial information. 9.28 Section 9.28 Energy... notification procedures for information containing trade secrets or confidential commercial or financial... secrets or confidential commercial or financial information, or the NRC believes the information contains...
22 CFR 1421.15 - Secret ballot.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 22 Foreign Relations 2 2012-04-01 2009-04-01 true Secret ballot. 1421.15 Section 1421.15 Foreign Relations FOREIGN SERVICE LABOR RELATIONS BOARD; FEDERAL LABOR RELATIONS AUTHORITY; GENERAL COUNSEL OF THE... THIS SUBCHAPTER § 1421.15 Secret ballot. Secret ballot means the expression by ballot, voting machine...
5 CFR 1312.26 - Control of secret and confidential material.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 5 Administrative Personnel 3 2014-01-01 2014-01-01 false Control of secret and confidential... Accountability of Classified Information § 1312.26 Control of secret and confidential material. Classified... Document Control, will be used to establish accountability controls on all Secret material received or...
40 CFR 209.23 - Trade secrets and privileged information.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 40 Protection of Environment 25 2011-07-01 2011-07-01 false Trade secrets and privileged... secrets and privileged information. In the presentation, admission, disposition, and use of evidence, the administrative law judge shall preserve the confidentiality of trade secrets and other privileged commercial and...
40 CFR 209.23 - Trade secrets and privileged information.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 40 Protection of Environment 24 2010-07-01 2010-07-01 false Trade secrets and privileged... secrets and privileged information. In the presentation, admission, disposition, and use of evidence, the administrative law judge shall preserve the confidentiality of trade secrets and other privileged commercial and...
5 CFR 1312.26 - Control of secret and confidential material.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 5 Administrative Personnel 3 2012-01-01 2012-01-01 false Control of secret and confidential... Accountability of Classified Information § 1312.26 Control of secret and confidential material. Classified... Document Control, will be used to establish accountability controls on all Secret material received or...
Code of Federal Regulations, 2012 CFR
2012-07-01
... INFORMATION: AND TRADE SECRET DISCLOSURES TO HEALTH PROFESSIONALS Trade Secrecy Claims § 350.1 Definitions... secret. Sanitized means a version of a document from which information claimed as trade secret or... support of a claim that chemical identity is a trade secret. Title III means Title III of the Superfund...
40 CFR 350.9 - Initial action by EPA.
Code of Federal Regulations, 2013 CFR
2013-07-01
... RIGHT-TO-KNOW INFORMATION: AND TRADE SECRET DISCLOSURES TO HEALTH PROFESSIONALS Trade Secrecy Claims... determine whether chemical identity information claimed as trade secret is entitled to trade secret... disclosure of trade secret chemical identity or if EPA decides to initiate a determination of the validity of...
40 CFR 209.23 - Trade secrets and privileged information.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 40 Protection of Environment 25 2014-07-01 2014-07-01 false Trade secrets and privileged... secrets and privileged information. In the presentation, admission, disposition, and use of evidence, the administrative law judge shall preserve the confidentiality of trade secrets and other privileged commercial and...
40 CFR 209.23 - Trade secrets and privileged information.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 40 Protection of Environment 26 2012-07-01 2011-07-01 true Trade secrets and privileged... secrets and privileged information. In the presentation, admission, disposition, and use of evidence, the administrative law judge shall preserve the confidentiality of trade secrets and other privileged commercial and...
22 CFR 1421.15 - Secret ballot.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Secret ballot. 1421.15 Section 1421.15 Foreign Relations FOREIGN SERVICE LABOR RELATIONS BOARD; FEDERAL LABOR RELATIONS AUTHORITY; GENERAL COUNSEL OF THE... THIS SUBCHAPTER § 1421.15 Secret ballot. Secret ballot means the expression by ballot, voting machine...
40 CFR 350.9 - Initial action by EPA.
Code of Federal Regulations, 2012 CFR
2012-07-01
... RIGHT-TO-KNOW INFORMATION: AND TRADE SECRET DISCLOSURES TO HEALTH PROFESSIONALS Trade Secrecy Claims... determine whether chemical identity information claimed as trade secret is entitled to trade secret... disclosure of trade secret chemical identity or if EPA decides to initiate a determination of the validity of...
Code of Federal Regulations, 2011 CFR
2011-07-01
... INFORMATION: AND TRADE SECRET DISCLOSURES TO HEALTH PROFESSIONALS Trade Secrecy Claims § 350.1 Definitions... secret. Sanitized means a version of a document from which information claimed as trade secret or... support of a claim that chemical identity is a trade secret. Title III means Title III of the Superfund...
40 CFR 350.9 - Initial action by EPA.
Code of Federal Regulations, 2014 CFR
2014-07-01
... RIGHT-TO-KNOW INFORMATION: AND TRADE SECRET DISCLOSURES TO HEALTH PROFESSIONALS Trade Secrecy Claims... determine whether chemical identity information claimed as trade secret is entitled to trade secret... disclosure of trade secret chemical identity or if EPA decides to initiate a determination of the validity of...
40 CFR 350.9 - Initial action by EPA.
Code of Federal Regulations, 2010 CFR
2010-07-01
... RIGHT-TO-KNOW INFORMATION: AND TRADE SECRET DISCLOSURES TO HEALTH PROFESSIONALS Trade Secrecy Claims... determine whether chemical identity information claimed as trade secret is entitled to trade secret... disclosure of trade secret chemical identity or if EPA decides to initiate a determination of the validity of...
Seaworthy Quantum Key Distribution Design and Validation (SEAKEY)
2014-07-25
link in a free- space channel through a marine environment (such as loss, noise and turbulence) and (2) parametrically calculating the secret key rate...width. Parametric calculations of the expected secret key rate As can be seen in Figure 6, the secret key rate of the BB84 protocol in the presence...Figure 9 shows the effect of various detriments on the secret -kay rate, for laser-decoy BB84. Figure 9: Effects of detriments on secret-key rate
2011-03-24
in the secret file in bits. Therefore, CPP is a function of the size of the secret file and amount of covert information embedded per packet, while...CPS is dependent on the size of the secret file and the rate at which the covert packets are transmitted to the IRC server. • Build a covert...and decode a secret message. • Cover. The object being used to hide the secret information; this is often in the form of pictures [FPK07], audio
Marie, Corinne; Deakin, William J; Viprey, Virginie; Kopciñska, Joanna; Golinowski, Wladyslaw; Krishnan, Hari B; Perret, Xavier; Broughton, William J
2003-09-01
The nitrogen-fixing symbiotic bacterium Rhizobium species NGR234 secretes, via a type III secretion system (TTSS), proteins called Nops (nodulation outer proteins). Abolition of TTSS-dependent protein secretion has either no effect or leads to a change in the number of nodules on selected plants. More dramatically, Nops impair nodule development on Crotalaria juncea roots, resulting in the formation of nonfixing pseudonodules. A double mutation of nopX and nopL, which code for two previously identified secreted proteins, leads to a phenotype on Pachyrhizus tuberosus differing from that of a mutant in which the TTSS is not functional. Use of antibodies and a modification of the purification protocol revealed that NGR234 secretes additional proteins in a TTSS-dependent manner. One of them was identified as NopA, a small 7-kDa protein. Single mutations in nopX and nopL were also generated to assess the involvement of each Nop in protein secretion and nodule formation. Mutation of nopX had little effect on NopL and NopA secretion but greatly affected the interaction of NGR234 with many plant hosts tested. NopL was not necessary for the secretion of any Nops but was required for efficient nodulation of some plant species. NopL may thus act as an effector protein whose recognition is dependent upon the hosts' genetic background.
Akbari, Samin; Pirbodaghi, Tohid
2014-09-07
High throughput heterogeneous immunoassays that screen antigen-specific antibody secreting cells are essential to accelerate monoclonal antibody discovery for therapeutic applications. Here, we introduce a heterogeneous single cell immunoassay based on alginate microparticles as permeable cell culture chambers. Using a microfluidic device, we encapsulated single antibody secreting cells in 35-40 μm diameter alginate microbeads. We functionalized the alginate to capture the secreted antibodies inside the microparticles, enabling single cell analysis and preventing the cross-talk between the neighboring encapsulated cells. We demonstrated non-covalent functionalization of alginate microparticles by adding three secondary antibodies to the alginate solution to form high molecular weight complexes that become trapped in the porous nanostructure of alginate and capture the secreted antibodies. We screened anti-TNF-alpha antibody-secreting cells from a mixture of antibody-secreting cells.
Social and cognitive factors associated with children's secret-keeping for a parent.
Gordon, Heidi M; Lyon, Thomas D; Lee, Kang
2014-01-01
This study examined children's secret-keeping for a parent and its relation to trust, theory of mind, secrecy endorsement, and executive functioning (EF). Children (N = 107) between 4 and 12 years of age participated in a procedure wherein parents broke a toy and asked children to promise secrecy. Responses to open-ended and direct questions were examined. Overall, secret-keeping increased with age and promising to keep the secret was related to fewer disclosures in open-ended questioning. Children who kept the secret in direct questioning exhibited greater trust and better parental ratings of EF than children who disclosed the secret. Findings highlight the importance of both social and cognitive factors in secret-keeping development. © 2014 The Authors. Child Development © 2014 Society for Research in Child Development, Inc.
[THe characteristics of the action of Khi-Mi on gastric and hepatic secretion].
Rymshina, M V; Vasilevskaia, L S
1996-01-01
The peculiarities of action of He-Me (92% of sodium glutamate and 8% sodium inosinemonophosphate) on gastric and liver secretions was studied in experiments on dog with Pavlov's isolated ventricle and dogs with bile duct, taken out on the skin (operation by M. F. Nesterin). He-Me exerted promotional influence on gastric secretion provoked by pentagastrin increasing of secretion by 3-5 times with prolongation of secretion time. The gastric secretion in various stages (nervous, secretory, intestinal) was strengthened after adding of He-Me to dietary meat. In that way effect of He-Me on gastric secretion is the same as effect of sodium glutamate but effect He-Me more strong after oral intake. He-Me has also choleretic effect. The data allow to re recommend He-Me as diagnostic and therapeutic remedy.
DBSecSys: a database of Burkholderia mallei secretion systems.
Memišević, Vesna; Kumar, Kamal; Cheng, Li; Zavaljevski, Nela; DeShazer, David; Wallqvist, Anders; Reifman, Jaques
2014-07-16
Bacterial pathogenicity represents a major public health concern worldwide. Secretion systems are a key component of bacterial pathogenicity, as they provide the means for bacterial proteins to penetrate host-cell membranes and insert themselves directly into the host cells' cytosol. Burkholderia mallei is a Gram-negative bacterium that uses multiple secretion systems during its host infection life cycle. To date, the identities of secretion system proteins for B. mallei are not well known, and their pathogenic mechanisms of action and host factors are largely uncharacterized. We present the Database of Burkholderia malleiSecretion Systems (DBSecSys), a compilation of manually curated and computationally predicted bacterial secretion system proteins and their host factors. Currently, DBSecSys contains comprehensive experimentally and computationally derived information about B. mallei strain ATCC 23344. The database includes 143 B. mallei proteins associated with five secretion systems, their 1,635 human and murine interacting targets, and the corresponding 2,400 host-B. mallei interactions. The database also includes information about 10 pathogenic mechanisms of action for B. mallei secretion system proteins inferred from the available literature. Additionally, DBSecSys provides details about 42 virulence attenuation experiments for 27 B. mallei secretion system proteins. Users interact with DBSecSys through a Web interface that allows for data browsing, querying, visualizing, and downloading. DBSecSys provides a comprehensive, systematically organized resource of experimental and computational data associated with B. mallei secretion systems. It provides the unique ability to study secretion systems not only through characterization of their corresponding pathogen proteins, but also through characterization of their host-interacting partners.The database is available at https://applications.bhsai.org/dbsecsys.
Cyclic movement stimulates hyaluronan secretion into the synovial cavity of rabbit joints
Ingram, K R; Wann, A K T; Angel, C K; Coleman, P J; Levick, J R
2008-01-01
The novel hypothesis that the secretion of the joint lubricant hyaluronan (HA) is coupled to movement has implications for normal function and osteoarthritis, and was tested in the knee joints of anaesthetized rabbits. After washing out the endogenous synovial fluid HA (miscibility coefficient 0.4), secretion into the joint cavity was measured over 5 h in static joints and in passively cycled joints. The net static secretion rate (11.2 ± 0.7 μg h−1, mean ± s.e.m., n = 90) correlated with the variable endogenous HA mass (mean 367 ± 8 μg), with a normalized value of 3.4 ± 0.2 μg h−1 (100 μg)−1 . Cyclic joint movement approximately doubled the net HA secretion rate to 22.6 ± 1.2 μg h−1 (n = 77) and raised the normalized percentage to 5.9 ± 0.3 μg h−1 (100 μg)−1. Secretion was inhibited by 2-deoxyglucose and iodoacetate, confirming active secretion. The net accumulation rate underestimated true secretion rate due to some trans-synovial loss. HA turnover time (endogenous mass/secretion rate) was 17–30 h (static) to 8–15 h (moved) The results demonstrate for the first time that the active secretion of HA is coupled to joint usage. Movement–secretion coupling may protect joints against the damaging effects of repetitive joint use, replace HA lost during periods of immobility (overnight), and contribute to the clinical benefit of exercise therapy in moderate osteoarthritis. PMID:18202097
Regulation of extrafloral nectar secretion by jasmonates in lima bean is light dependent
Radhika, Venkatesan; Kost, Christian; Mithöfer, Axel; Boland, Wilhelm
2010-01-01
To maximize fitness, plants need to perceive changes in their light environment and adjust their physiological responses accordingly. Whether and how such changes also affect the regulation of their defense responses against herbivores remains largely unclear. We addressed this issue by studying the secretion of extrafloral nectar (EFN) in lima bean (Phaseolus lunatus), which is known to be activated by the phytohormone jasmonic acid (JA) and functions as an indirect defense mechanism against herbivores. We found that the plant’s EFN secretion in response to JA was light dependent: In the dark, JA reduced EFN secretion, whereas under light conditions, JA induced EFN secretion relative to controls. This modulation was affected by the light’s spectral composition [i.e., ratio of red to far-red (R:FR) radiation], but not light intensity. These findings demonstrate a unique differential effect of JA on EFN secretion depending on the ambient light conditions. Interestingly, treatment with the isoleucine–JA conjugate (JA–Ile) enhanced EFN secretion under light conditions yet did not reduce EFN secretion in the dark. Moreover, inhibition of Ile biosynthesis in light-exposed plants significantly decreased the EFN secretion rate. This reduction could be recovered by additional application of JA–Ile, suggesting that JA–Ile is the active compound required to up-regulate EFN secretion. Finally, experiments with mechanically damaged plants revealed that light was required for the formation of JA–Ile, but not of JA. These results demonstrate that in lima bean, the light environment modulates the plant’s response to jasmonates as well as JA–Ile biosynthesis, which controls the subsequent EFN secretion. PMID:20855624
USDA-ARS?s Scientific Manuscript database
Factors secreted by adipose tissue continue to be discovered. Evidence indicates a strong link between neural influences and adipocyte expression and secretion of a wide array of cytokines, neurotrophic factors, growth factors, binding proteins, and neuropeptides. These “adipokines” are linked to im...
29 CFR 1202.4 - Secret ballot.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 29 Labor 4 2014-07-01 2014-07-01 false Secret ballot. 1202.4 Section 1202.4 Labor Regulations Relating to Labor (Continued) NATIONAL MEDIATION BOARD RULES OF PROCEDURE § 1202.4 Secret ballot. In conducting such investigation, the Board is authorized to take a secret ballot of the employees involved, or...
42 CFR 405.215 - Confidential commercial and trade secret information.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 42 Public Health 2 2013-10-01 2013-10-01 false Confidential commercial and trade secret information. 405.215 Section 405.215 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF... trade secret information. To the extent that CMS relies on confidential commercial or trade secret...
29 CFR 401.11 - Secret ballot.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 29 Labor 2 2012-07-01 2012-07-01 false Secret ballot. 401.11 Section 401.11 Labor Regulations Relating to Labor OFFICE OF LABOR-MANAGEMENT STANDARDS, DEPARTMENT OF LABOR LABOR-MANAGEMENT STANDARDS MEANING OF TERMS USED IN THIS SUBCHAPTER § 401.11 Secret ballot. Secret ballot means the expression by...
32 CFR 9.9 - Protection of State secrets.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 32 National Defense 1 2014-07-01 2014-07-01 false Protection of State secrets. 9.9 Section 9.9... § 9.9 Protection of State secrets. Nothing in this part shall be construed to authorize disclosure of state secrets to any person not authorized to receive them. ...
29 CFR 1202.4 - Secret ballot.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 29 Labor 4 2012-07-01 2012-07-01 false Secret ballot. 1202.4 Section 1202.4 Labor Regulations Relating to Labor (Continued) NATIONAL MEDIATION BOARD RULES OF PROCEDURE § 1202.4 Secret ballot. In conducting such investigation, the Board is authorized to take a secret ballot of the employees involved, or...
42 CFR 405.215 - Confidential commercial and trade secret information.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 42 Public Health 2 2010-10-01 2010-10-01 false Confidential commercial and trade secret information. 405.215 Section 405.215 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF... trade secret information. To the extent that CMS relies on confidential commercial or trade secret...
29 CFR 1202.4 - Secret ballot.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 29 Labor 4 2013-07-01 2013-07-01 false Secret ballot. 1202.4 Section 1202.4 Labor Regulations Relating to Labor (Continued) NATIONAL MEDIATION BOARD RULES OF PROCEDURE § 1202.4 Secret ballot. In conducting such investigation, the Board is authorized to take a secret ballot of the employees involved, or...
29 CFR 401.11 - Secret ballot.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 29 Labor 2 2013-07-01 2013-07-01 false Secret ballot. 401.11 Section 401.11 Labor Regulations Relating to Labor OFFICE OF LABOR-MANAGEMENT STANDARDS, DEPARTMENT OF LABOR LABOR-MANAGEMENT STANDARDS MEANING OF TERMS USED IN THIS SUBCHAPTER § 401.11 Secret ballot. Secret ballot means the expression by...