1,233 research outputs found

    Using fluorescence microscopy to determine whether Gal80 subcellular redistribution is a key mechanistic element of the GAL gene switch

    Get PDF
    This thesis studies the GAL gene switch in Saccharomyces cerevisiae using fluorescently tagged molecules of Gal80p in vivo.NIH Grant awarded to Dr. James E Hopper (R01-GM-2925-27)No embarg

    “Data is Nice:” Theoretical and pedagogical implications of an Eastern Cherokee corpus

    Get PDF
    This paper serves as a proof of concept for the usefulness of corpus creation in Cherokee language revitalization. It details the initial collection of a digital corpus of Cherokee/English texts and enumerates how corpus material can augment contemporary language revitalization efforts rather than simply preserving language for future analysis. By collecting and analyzing corpus material, we can quickly create new classroom materials and media products, and answer deeper theoretical linguistic questions. With a large enough corpus, we can even implement machine translation systems to facilitate the production of new texts. Although the vast majority of print material in Cherokee is in the Western dialect, this corpus has focused on Eastern texts. Expanding the dataset to include both dialects, however, will allow for comparison and facilitate generalizations about the Cherokee language as a whole. A corpus of Cherokee data can answer second language learners’ questions about the structure of the language and provide patterns for more effective, targeted learning of Cherokee. It can also provide teachers with ready access to accurate representations of the language produced by native speakers. By combining documentation and technology, we can leverage the power of databases to expedite and facilitate language revitalization.National Foreign Language Resource Cente

    The Highest Ratio of Orgasms to Drama: Group Influences of Men's Approaches to Sex in College

    Full text link
    Honors (Bachelor's)SociologyUniversity of Michiganhttp://deepblue.lib.umich.edu/bitstream/2027.42/120588/1/benfrey.pd

    Specimen Catalog

    Get PDF

    Entropy production of cyclic population dynamics

    Full text link
    Entropy serves as a central observable in equilibrium thermodynamics. However, many biological and ecological systems operate far from thermal equilibrium. Here we show that entropy production can characterize the behavior of such nonequilibrium systems. To this end we calculate the entropy production for a population model that displays nonequilibrium behavior resulting from cyclic competition. At a critical point the dynamics exhibits a transition from large, limit-cycle like oscillations to small, erratic oscillations. We show that the entropy production peaks very close to the critical point and tends to zero upon deviating from it. We further provide analytical methods for computing the entropy production which agree excellently with numerical simulations.Comment: 4 pages, 3 figures and Supplementary Material. To appear in Phys. Rev. Lett.

    SimaticScan:towards a specialised vulnerability scanner for industrial control systems

    Get PDF
    Over the years, modern Industrial Control Systems (ICS) have become widely computerised and connected via the Internet and are, therefore, potentially vulnerable to cyber attacks. Currently there is a lack of vulnerability scanners specialised to ICS settings. Systems such as PLCScan and ModScan output pertinent information from a Programmable Logic Controller (PLC). However, they do not offer any information as to how vulnerable a PLC is to an attack. In this paper, we address these limitations and propose SimaticScan, a vulnerability scanner specialised to Siemens SIMATIC PLCs. Through experimentation in a comprehensive water treatment testbed, we demonstrate SimaticScan’s effectiveness in determining a range of vulnerabilities across three distinct PLCs, including a previously unknown vulnerability in one of the PLCs. Our experiments also show that SimaticScan outperforms the widely used Nessus vulnerability scanner (with relevant ICS-specific plugins deployed)

    Immunomodulatory properties and molecular effects in inflammatory diseases of low-dose X-irradiation

    Get PDF
    Inflammatory diseases are the result of complex and pathologically unbalanced multicellular interactions. For decades, low-dose X-irradiation therapy (LD-RT) has been clinically documented to exert an anti-inflammatory effect on benign diseases and chronic degenerative disorders. By contrast, experimental studies to confirm the effectiveness and to reveal underlying cellular and molecular mechanisms are still at their early stages. During the last decade, however, the modulation of a multitude of immunological processes by LD-RT has been explored in vitro and in vivo. These include leukocyte/endothelial cell adhesion, adhesion molecule and cytokine/chemokine expression, apoptosis induction, and mononuclear/polymorphonuclear cell metabolism and activity. Interestingly, these mechanisms display comparable dose dependences and dose-effect relationships with a maximum effect in the range between 0.3 and 0.7 Gy, already empirically identified to be most effective in the clinical routine. This review summarizes data and models exploring the mechanisms underlying the immunomodulatory properties of LD-RT that may serve as a prerequisite for further systematic analyses to optimize low-dose irradiation procedures in future clinical practice

    Full length interleukin 33 aggravates radiation-induced skin reaction

    Get PDF
    The interleukin (IL)-1 family member IL-33 has been described as intracellular alarmin with broad roles in wound healing, skin inflammation but also autoimmunity. Its dichotomy between full length (fl) IL-33 and the mature (m) form of IL-33 and its release by necrosis is still not fully understood. Here, we compare functional consequences of both forms in the skin in vivo, and therefore generated two lines of transgenic mice which selectively overexpress mmIL-33 and flmIL-33 in basal keratinocytes. Transgene mRNA was expressed at high level in skin of both lines but not in organs due to the specific K14 promoter. We could demonstrate that transgenic overexpression of mmIL-33 in murine keratinocytes leads to a spontaneous skin inflammation as opposed to flmIL-33. K14-mmIL-33 mice synthesize and secrete high amounts of mmIL-33 along with massive cutaneous manifestations, like increased epidermis and dermis thickness, infiltration of mast cells in the epidermis and dermis layers and marked hyperkeratosis. Using skin inflammation models such as IL-23 administration, imiquimod treatment, or mechanical irritation did not lead to exacerbated inflammation in the K14-flmIL-33 strain. As radiation induces a strong dermatitis due to apoptosis and necrosis, we determined the effect of fractionated radiation (12 Gy, 4 times). In comparison to wild-type mice, an increase in ear thickness in flmIL-33 transgenic mice was observed 25 days after irradiation. Macroscopic examination showed more severe skin symptoms in irradiated ears compared to controls. In summary, secreted mmIL-33 itself has a potent capacity in skin inflammation whereas fl IL-33 is limited due to its intracellular retention. During tissue damage, fl IL-33 exacerbated radiation-induced skin reaction

    Testbed diversity as a fundamental principle for effective ICS security research

    Get PDF
    The implementation of diversity in testbeds is essential to understanding and improving the security and resilience of Industrial Control Systems (ICS). Employing a wide spec- trum of equipment, diverse networks, and business processes, as deployed in real-life infrastructures, is particularly diffi- cult in experimental conditions. However, this level of di- versity is key from a security perspective, as attackers can exploit system particularities and process intricacies to their advantage. This paper presents an ICS testbed with specific focus on infrastructure diversity, and end-to-end business process replication. These qualities are illustrated through a case study mapping data flow/processing, user interactions, and two example attack scenarios
    corecore