18,048 research outputs found

    Post-Traumatic Stress Disorder and Substance Use Disorder Co-occurrence in Female Veterans

    Get PDF
    Female veterans often experience trauma, develop post-traumatic stress disorder (PTSD), and suffer from a substance use disorder (SUD). Females experience these disorders more than males and veterans experience them more than civilian populations. Being a female veteran give both disorders a different appearance. Relationships, negative health outcomes, and barriers to treatment all contribute to the problem. By analyzing the current literature, it becomes clear that the field would benefit from specific research into the female veteran with co-occurring PTSD and SUD population

    A Response to: "A Commentary on "Stabilizing Constructs through Collaboration across Different Research Fields as a Way to Foster the Integrative Approach of the Research Domain Criteria (RDoC) Project"

    Get PDF
    This paper is a response to a commentary by Walter Glannon (2016, Frontiers in Human Neuroscience) on my paper "Stabilizing Constructs Across Research Fields as a Way to Foster the Integrative Approach of the Research Domain Criteria Project"

    Security awareness and affective feedback:categorical behaviour vs. reported behaviour

    Get PDF
    A lack of awareness surrounding secure online behaviour can lead to end-users, and their personal details becoming vulnerable to compromise. This paper describes an ongoing research project in the field of usable security, examining the relationship between end-user-security behaviour, and the use of affective feedback to educate end-users. Part of the aforementioned research project considers the link between categorical information users reveal about themselves online, and the information users believe, or report that they have revealed online. The experimental results confirm a disparity between information revealed, and what users think they have revealed, highlighting a deficit in security awareness. Results gained in relation to the affective feedback delivered are mixed, indicating limited short-term impact. Future work seeks to perform a long-term study, with the view that positive behavioural changes may be reflected in the results as end-users become more knowledgeable about security awareness

    Fluorescein Redirects a Ruthenium−Octaarginine Conjugate to the Nucleus

    Get PDF
    The cellular uptake and localization of a Ru−octaarginine conjugate with and without an appended fluorescein are compared. The inherent luminescence of the Ru(II) dipyridophenazine complex allows observation of its uptake without the addition of a fluorophore. Ru−octaarginine−fluorescein stains the cytosol, nuclei, and nucleoli of HeLa cells under conditions where the Ru−octaarginine conjugate without fluorescein shows only punctate cytoplasmic labeling. At higher concentrations, however, Ru−octaarginine without the fluorescein tag does exhibit cytoplasmic, nuclear, and nucleolar staining. Attaching fluorescein to Ru−octaarginine lowers the threshold concentration required for diffuse cytoplasmic labeling and nuclear entry. Hence, the localization of the fluorophore-bound peptide cannot serve as a proxy for that of the free peptide

    Effects of strand and directional asymmetry on base-base coupling and charge transfer in double-helical DNA

    Get PDF
    Mechanistic models of charge transfer (CT) in macromolecules often focus on CT energetics and distance as the chief parameters governing CT rates and efficiencies. However, in DNA, features unique to the DNA molecule, in particular, the structure and dynamics of the DNA base stack, also have a dramatic impact on CT. Here we probe the influence of subtle structural variations on base-base CT within a DNA duplex by examining photoinduced quenching of 2-aminopurine (Ap) as a result of hole transfer (HT) to guanine (G). Photoexcited Ap is used as a dual reporter of variations in base stacking and CT efficiency. Significantly, the unique features of DNA, including the strandedness and directional asymmetry of the double helix, play a defining role in CT efficiency. For an (AT)(n) bridge, the orientation of the base pairs is critical; the yield of intrastrand HT is markedly higher through (A)n compared with (T)(n) bridges, whereas HT via intrastrand pathways is more efficient than through interstrand pathways. Remarkably, for reactions through the same DNA bridge, over the same distance, and with the same driving force, HT from photoexcited Ap to G in the 5' to 3' direction is more efficient and less dependent on distance than HT from 3' to 5'. We attribute these differences in HT efficiency to variations in base-base coupling within the DNA assemblies. Thus base-base coupling is a critical parameter in DNA CT and strongly depends on subtle structural nuances of duplex DNA

    Size consistent excited states via algorithmic transformations between variational principles

    Full text link
    We demonstrate that a broad class of excited state variational principles is not size consistent. In light of this difficulty, we develop and test an approach to excited state optimization that transforms between variational principles in order to achieve state selectivity, size consistency, and compatibility with quantum Monte Carlo. To complement our formal analysis, we provide numerical examples that confirm these properties and demonstrate how they contribute to a more black box approach to excited states in quantum Monte Carlo.Comment: 27 pages, 10 figures, 2 table

    Global analysis of serine/threonine and tyrosine protein phosphatase catalytic subunit genes in Neurospora crassa reveals interplay between phosphatases and the p38 mitogen-activated protein kinase.

    Get PDF
    Protein phosphatases are integral components of the cellular signaling machinery in eukaryotes, regulating diverse aspects of growth and development. The genome of the filamentous fungus and model organism Neurospora crassa encodes catalytic subunits for 30 protein phosphatase genes. In this study, we have characterized 24 viable N. crassa phosphatase catalytic subunit knockout mutants for phenotypes during growth, asexual development, and sexual development. We found that 91% of the mutants had defects in at least one of these traits, whereas 29% possessed phenotypes in all three. Chemical sensitivity screens were conducted to reveal additional phenotypes for the mutants. This resulted in the identification of at least one chemical sensitivity phenotype for 17 phosphatase knockout mutants, including novel chemical sensitivities for two phosphatase mutants lacking a growth or developmental phenotype. Hence, chemical sensitivity or growth/developmental phenotype was observed for all 24 viable mutants. We investigated p38 mitogen-activated protein kinase (MAPK) phosphorylation profiles in the phosphatase mutants and identified nine potential candidates for regulators of the p38 MAPK. We demonstrated that the PP2C class phosphatase pph-8 (NCU04600) is an important regulator of female sexual development in N. crassa. In addition, we showed that the Δcsp-6 (ΔNCU08380) mutant exhibits a phenotype similar to the previously identified conidial separation mutants, Δcsp-1 and Δcsp-2, that lack transcription factors important for regulation of conidiation and the circadian clock

    Reducing risky security behaviours:utilising affective feedback to educate users

    Get PDF
    Despite the number of tools created to help end-users reduce risky security behaviours, users are still falling victim to online attacks. This paper proposes a browser extension utilising affective feedback to provide warnings on detection of risky behaviour. The paper provides an overview of behaviour considered to be risky, explaining potential threats users may face online. Existing tools developed to reduce risky security behaviours in end-users have been compared, discussing the success rate of various methodologies. Ongoing research is described which attempts to educate users regarding the risks and consequences of poor security behaviour by providing the appropriate feedback on the automatic recognition of risky behaviour. The paper concludes that a solution utilising a browser extension is a suitable method of monitoring potentially risky security behaviour. Ultimately, future work seeks to implement an affective feedback mechanism within the browser extension with the aim of improving security awareness

    Assessing the impact of affective feedback on end-user security awareness

    Get PDF
    A lack of awareness regarding online security behaviour can leave users and their devices vulnerable to compromise. This paper highlights potential areas where users may fall victim to online attacks, and reviews existing tools developed to raise users’ awareness of security behaviour. An ongoing research project is described, which provides a combined monitoring solution and affective feedback system, designed to provide affective feedback on automatic detection of risky security behaviour within a web browser. Results gained from the research conclude an affective feedback mechanism in a browser-based environment, can promote general awareness of online security
    • …
    corecore