14,543 research outputs found

    Analysis of Neural Networks for Edge Detection

    Get PDF
    This paper illustrates a novel method to analyze artificial neural networks so as to gain insight into their internal functionality. To this purpose, the elements of a feedforward-backpropagation neural network, that has been trained to detect edges in images, are described in terms of differential operators of various orders and with various angles of operation

    Molecular cloning and transcriptional activity of a new Petunia calreticulin gene involved in pistil transmitting tract maturation, progamic phase, and double fertilization

    Get PDF
    Calreticulin (CRT) is a highly conserved and ubiquitously expressed Ca2+-binding protein in multicellular eukaryotes. As an endoplasmic reticulum-resident protein, CRT plays a key role in many cellular processes including Ca2+ storage and release, protein synthesis, and molecular chaperoning in both animals and plants. CRT has long been suggested to play a role in plant sexual reproduction. To begin to address this possibility, we cloned and characterized the full-length cDNA of a new CRT gene (PhCRT) from Petunia. The deduced amino acid sequence of PhCRT shares homology with other known plant CRTs, and phylogenetic analysis indicates that the PhCRT cDNA clone belongs to the CRT1/CRT2 subclass. Northern blot analysis and fluorescent in situ hybridization were used to assess PhCRT gene expression in different parts of the pistil before pollination, during subsequent stages of the progamic phase, and at fertilization. The highest level of PhCRT mRNA was detected in the stigma–style part of the unpollinated pistil 1 day before anthesis and during the early stage of the progamic phase, when pollen is germinated and tubes outgrow on the stigma. In the ovary, PhCRT mRNA was most abundant after pollination and reached maximum at the late stage of the progamic phase, when pollen tubes grow into the ovules and fertilization occurs. PhCRT mRNA transcripts were seen to accumulate predominantly in transmitting tract cells of maturing and receptive stigma, in germinated pollen/growing tubes, and at the micropylar region of the ovule, where the female gametophyte is located. From these results, we suggest that PhCRT gene expression is up-regulated during secretory activity of the pistil transmitting tract cells, pollen germination and outgrowth of the tubes, and then during gamete fusion and early embryogenesis

    Expression of PIK3CA mutant E545K in the mammary gland induces heterogeneous tumors but is less potent than mutant H1047R.

    Get PDF
    The phosphoinositide 3-kinase (PI3K) signaling cascade is a key mediator of cellular growth, survival and metabolism and is frequently subverted in human cancer. The gene encoding for the alpha catalytic subunit of PI3K (PIK3CA) is mutated and/or amplified in ∼30% of breast cancers. Mutations in either the kinase domain (H1047R) or the helical domain (E545K) are most common and result in a constitutively active enzyme with oncogenic capacity. PIK3CA(H1047R) was previously demonstrated to induce tumors in transgenic mouse models; however, it was not known whether overexpression of PIK3CA(E545K) is sufficient to induce mammary tumors and whether tumor initiation by these two types of mutants differs. Here, we demonstrate that expression of PIK3CA(E545K) in the mouse mammary gland induces heterogenous mammary carcinomas but with a longer latency than PIK3CA(H1047R)-expressing mice. Our results suggest that the helical domain mutant PIK3CA(E545K) is a less potent inducer of mammary tumors due to less efficient activation of downstream Akt signaling

    Beyond the Hype: On Using Blockchains in Trust Management for Authentication

    Full text link
    Trust Management (TM) systems for authentication are vital to the security of online interactions, which are ubiquitous in our everyday lives. Various systems, like the Web PKI (X.509) and PGP's Web of Trust are used to manage trust in this setting. In recent years, blockchain technology has been introduced as a panacea to our security problems, including that of authentication, without sufficient reasoning, as to its merits.In this work, we investigate the merits of using open distributed ledgers (ODLs), such as the one implemented by blockchain technology, for securing TM systems for authentication. We formally model such systems, and explore how blockchain can help mitigate attacks against them. After formal argumentation, we conclude that in the context of Trust Management for authentication, blockchain technology, and ODLs in general, can offer considerable advantages compared to previous approaches. Our analysis is, to the best of our knowledge, the first to formally model and argue about the security of TM systems for authentication, based on blockchain technology. To achieve this result, we first provide an abstract model for TM systems for authentication. Then, we show how this model can be conceptually encoded in a blockchain, by expressing it as a series of state transitions. As a next step, we examine five prevalent attacks on TM systems, and provide evidence that blockchain-based solutions can be beneficial to the security of such systems, by mitigating, or completely negating such attacks.Comment: A version of this paper was published in IEEE Trustcom. http://ieeexplore.ieee.org/document/8029486

    From Euclidean Geometry to Knots and Nets

    Get PDF
    This document is the Accepted Manuscript of an article accepted for publication in Synthese. Under embargo until 19 September 2018. The final publication is available at Springer via https://doi.org/10.1007/s11229-017-1558-x.This paper assumes the success of arguments against the view that informal mathematical proofs secure rational conviction in virtue of their relations with corresponding formal derivations. This assumption entails a need for an alternative account of the logic of informal mathematical proofs. Following examination of case studies by Manders, De Toffoli and Giardino, Leitgeb, Feferman and others, this paper proposes a framework for analysing those informal proofs that appeal to the perception or modification of diagrams or to the inspection or imaginative manipulation of mental models of mathematical phenomena. Proofs relying on diagrams can be rigorous if (a) it is easy to draw a diagram that shares or otherwise indicates the structure of the mathematical object, (b) the information thus displayed is not metrical and (c) it is possible to put the inferences into systematic mathematical relation with other mathematical inferential practices. Proofs that appeal to mental models can be rigorous if the mental models can be externalised as diagrammatic practice that satisfies these three conditions.Peer reviewe
    corecore