1,999 research outputs found

    Iridovirus infection of cell cultures from the Diaprepes root weevil, Diaprepes abbreviatus

    Get PDF
    We here report the development and viral infection of a Diaprepes root weevil cell culture. Embryonic tissues of the root weevil were used to establish cell cultures for use in screening viral pathogens as potential biological control agents. Tissues were seeded into a prepared solution of insect medium and kept at a temperature of 24°C. The cell culture had primarily fibroblast-like morphology with some epithelial monolayers. Root weevil cells were successfully infected in vitro Abbreviation: / IIV-6: Invertebrate Iridescent Virus

    Exact operator solution of the Calogero-Sutherland model

    Full text link
    The wave functions of the Calogero-Sutherland model are known to be expressible in terms of Jack polynomials. A formula which allows to obtain the wave functions of the excited states by acting with a string of creation operators on the wave function of the ground state is presented and derived. The creation operators that enter in this formula of Rodrigues-type for the Jack polynomials involve Dunkl operators.Comment: 35 pages, LaTeX2e with amslate

    Depression in Right Hemisphere Disorder

    Get PDF
    Between 25-79% of stroke survivors suffer depression, which can lead to limited recovery, decreased quality of life, and increased mortality. In adults with right hemisphere disorder (RHD), the cause(s) of depression have been unclear. Our results showed that significantly more adults with RHD were depressed than normal controls, and that adults with RHD were significantly more depressed than normal controls. In both groups, depression was significantly related with loneliness. In adults with RHD, depression was also significantly related with social support. No demographic or lesion-related variables were associated with increased depression in our samples. Suggestions for treatment research are offered

    Risk Factors for Depression in Aphasia: Clinical Implications

    Get PDF
    Between 25-79% of stroke survivors suffer depression, which can limit recovery, decrease quality of life, and increase mortality. In adults with aphasia, the cause(s) of depression, and thus the means by which it can be addressed, have been unclear. Our participants with aphasia did not differ from our normal controls in presence or severity of depression. However, possible causes of depression differed between groups. In both groups, loneliness was a significant factor. In adults with aphasia, other significant factors were time poststroke, severity of language impairment, and desired control over every day events. Suggestions for research and treatment are offered

    Schubert Polynomials for the affine Grassmannian of the symplectic group

    Full text link
    We study the Schubert calculus of the affine Grassmannian Gr of the symplectic group. The integral homology and cohomology rings of Gr are identified with dual Hopf algebras of symmetric functions, defined in terms of Schur's P and Q-functions. An explicit combinatorial description is obtained for the Schubert basis of the cohomology of Gr, and this is extended to a definition of the affine type C Stanley symmetric functions. A homology Pieri rule is also given for the product of a special Schubert class with an arbitrary one.Comment: 45 page

    Towards Designing an Integrated Architecture for NEO Characterization, Mitigation, Scientific Evaluation, and Resource Utilization

    Get PDF
    This poster reviews the planning and design for an integrated architecture for characterization, mitigation, scientific evaluation and resource utilization of near earth objects. This includes tracks to observe and characterize the nature of the threat posed by a NEO, and deflect if a significant threat is posed. The observation stack can also be used for a more complete scientific analysis of the NEO

    Vers la sécurité des conteneurs : les comprendre et les sécuriser

    Full text link
    To facilitate shorter modern development cycles, as well as the ephemeral nature of cloud computing, many organizations are now running their applications in containers, a form of operating system virtualization. These new environments are often referred to as containerized environments. However, these environments are not without risk. Recent studies have shown that containerized applications are, like all types of applications, prone to various attacks. Another problem for those working in IT security is that containerized applications are often very dynamic and short-lived, which compounds the problem because it is more difficult to audit their activities or even make an investigation. In case of intrusion. In this thesis, we propose an intrusion detection system based on machine learning for containerized environments. Containers provide isolation between the host system and the containerized environment by efficiently grouping applications and their dependencies. In this way, containers become a portable software environment. However, unlike virtual machines, containers share the same kernel as the host operating system. In order to be able to do anomaly detection, our system uses this feature to monitor system calls sent from a container to a host system. Thus, the monitored container does not have to be modified and our system is not required to know the nature of the container to monitor it. The results of our experiments show that it is indeed possible to use system calls to detect abnormal behaviour made by a containerized application without having to modify the container.Afin de faciliter les cycles de développement moderne plus courts, ainsi que la nature éphémère de l’infonuagique, de nombreuses organisations exécutent désormais leurs applications dans des conteneurs, une forme de virtualisation du système d'exploitation. Ces nouveaux environnements sont souvent appelés environnements conteneurisés. Cependant, ces environnements ne sont pas sans risque. Des études récentes ont montré que les applications conteneurisées sont, comme tous les types d’applications, sujettes à diverses attaques. Un autre problème pour ceux qui travaillent dans le domaine de la sécurité informatique est que les applications conteneurisées sont souvent très dynamiques et de courte durée, ce qui aggrave le problème, car il est plus difficile d’auditer leurs activités ou encore de faire une enquête en cas d’intrusion. Dans ce mémoire, nous proposons un système de détection d’intrusion basé sur l’apprentissage machine pour les environnements conteneurisés. Les conteneurs assurent l'isolation entre le système hôte et l'environnement conteneurisé en regroupant efficacement, les applications ainsi que leurs dépendances. De cette façon, les conteneurs deviennent un environnement logiciel portable. Cependant, contrairement aux machines virtuelles, les conteneurs partagent le même noyau que le système d'exploitation hôte. Afin de pouvoir faire la détection d'anomalies, notre système utilise cette caractéristique pour surveiller les appels système envoyés d’un conteneur vers un système hôte. Ainsi, le conteneur surveillé n’a pas à être modifié et notre système n'est pas tenu de connaitre la nature du conteneur pour le surveiller. Les résultats de nos expériences montrent qu’il est en effet possible d’utiliser les appels système afin de détecter des comportements anormaux faits par une application conteneurisée et ce sans à avoir à modifier le conteneur

    Sodium leak pathway and substrate binding order in the Na+-glucose cotransporter

    Get PDF
    The Na+-glucose cotransporter (SGLT1) expressed in Xenopus laevis oocytes was shown to generate a phlorizin-sensitive sodium leak in the absence of sugars. Using the current model for SGLT1, where the sodium leak was presumed to occur after two sodium ions are bound to the free carrier before glucose binding, a characteristic concentration constant (Kc) was introduced to describe the relative importance of the sodium leak versus Na+-glucose cotransport currents. Kc represents the glucose concentration at which the Na+-glucose cotransport current is equal to the sodium leak. As both the sodium leak and the Na+-glucose cotransport current are predicted to occur after the binding of two sodium ions, the model predicted that Kc should be sodium-independent. However, by using a two-microelectrode voltage-clamp technique, the observed Kc was shown to depend strongly on the external sodium concentration ([Na+]o): it was four times higher at 5 mM [Na+]o than at 20 mM [Na+]o. In addition, the magnitude of the sodium leak varied as a function of [Na+]o in a Michaelian fashion, and the sodium affinity constant for the sodium leak was 2–4 times lower than that for cotransport in the presence of low external glucose concentrations (50 or 100 microM), whereas the current model predicted a sigmoidal sodium dependence of the sodium leak and identical sodium affinities for the sodium leak and the Na+-glucose cotransport. These observations indicate that the sodium leak occurs after one sodium ion is associated with the carrier and agree with predictions from a model with the binding order sodium-glucose-sodium. This conclusion was also supported by experiments performed where protons replaced Na+ as a "driving cation.
    • …
    corecore