2,225 research outputs found

    Jebel Moya (Sudan): new dates from a mortuary complex at the southern Meroitic frontier

    Get PDF
    This paper proposes a new chronology for the burial complex at Jebel Moya, south-central Sudan. It reassesses the body of evidence from Sir Henry Wellcome's original 1911–1914 excavations in order to place the site within a firm chronological framework by: (a) applying an attribute-based approach to discern discrete pottery assemblages; and (b) applying initial OSL dates to facilitate the reliable dating of this site for the first time. Jebel Moya is re-interpreted as a burial complex situated on the southern periphery of the late Meroitic state, and its potential to serve as a chronological and cultural reference point for future studies in south-central and southern Sudan is outlined

    A statistical analysis of murine incisional and excisional acute wound models

    Get PDF
    YesMice represent the most commonly used species for preclinical in vivo research. While incisional and excisional acute murine wound models are both frequently employed, there is little agreement on which model is optimum. Moreover, current lack of standardization of wounding procedure, analysis time point(s), method of assessment, and the use of individual wounds vs. individual animals as replicates makes it difficult to compare across studies. Here we have profiled secondary intention healing of incisional and excisional wounds within the same animal, assessing multiple parameters to determine the optimal methodology for future studies. We report that histology provides the least variable assessment of healing. Furthermore, histology alone (not planimetry) is able to detect accelerated healing in a castrated mouse model. Perhaps most importantly, we find virtually no correlation between wounds within the same animal, suggesting that use of wound (not animal) biological replicates is perfectly acceptable. Overall, these findings should guide and refine future studies, increasing the likelihood of detecting novel phenotypes while reducing the numbers of animals required for experimentation

    Identification of a system required for the functional surface localization of sugar binding proteins with class III signal peptides in Sulfolobus solfataricus

    Get PDF
    The hyperthermophilic archaeon Sulfolobus solfataricus contains an unusual large number of sugar binding proteins that are synthesized as precursors with a class III signal peptide. Such signal peptides are commonly used to direct archaeal flagellin subunits or bacterial (pseudo)pilins into extracellular macromolecular surface appendages. Likewise, S. solfataricus binding proteins have been suggested to assemble in higher ordered surface structures as well, tentatively termed the bindosome. Here we show that S. solfataricus contains a specific system that is needed for the functional surface localization of sugar binding proteins. This system, encoded by the bas (bindosome assembly system) operon, is composed of five proteins: basABC, three homologues of so-called bacterial (pseudo)pilins; BasE, a cytoplasmic ATPase; and BasF, an integral membrane protein. Deletion of either the three (pseudo)pilin genes or the basEF genes resulted in a severe defect of the cells to grow on substrates which are transported by sugar binding proteins containing class III signal peptides, while growth on glucose and maltose was restored when the corresponding genes were reintroduced in these cells. Concomitantly, ΔbasABC and ΔbasEF cells were severely impaired in glucose uptake even though the sugar binding proteins were normally secreted across the cytoplasmic membrane. These data underline the hypothesis that the bas operon is involved in the functional localization of sugar binding proteins at the cell surface of S. solfataricus. In contrast to surface structure assembly systems of Gram-negative bacteria, the bas operon seems to resemble an ancestral simplified form of these machineries.

    Voice Flows To And Around Leaders: Understanding When Units Are Helped Or Hurt By Employee Voice

    Get PDF
    In two studies, we develop and test theory about the relationship between speaking up, one type of organizational citizenship behavior, and unit performance by accounting for where employee voice is flowing. Results from a qualitative study of managers and professionals across a variety of industries suggest that voice to targets at different formal power levels (peers or superiors) and locations in the organization (inside or outside a focal unit) differs systematically in terms of its usefulness in generating actions to a unit's benefit on the issues raised and in the likely information value of the ideas expressed. We then theorize how distinct voice flows should be differentially related to unit performance based on these core characteristics and test our hypotheses using time-lagged field data from 801 employees and their managers in 93 units across nine North American credit unions. Results demonstrate that voice flows are positively related to a unit's effectiveness when they are targeted at the focal leader of that unitwho should be able to take actionwhether from that leader's own subordinates or those in other units, and negatively related to a unit's effectiveness when they are targeted at coworkers who have little power to effect change. Together, these studies provide a structural framework for studying the nature and impact of multiple voice flows, some along formal reporting lines and others that reflect the informal communication structure within organizations. This research demonstrates that understanding the potential performance benefits and costs of voice for leaders and their units requires attention to the structure and complexity of multiple voice flows rather than to an undifferentiated amount of voice.Business Administratio

    Bend it like Beckham: embodying the motor skills of famous athletes.

    Get PDF
    Observing an action activates the same representations as does the actual performance of the action. Here we show for the first time that the action system can also be activated in the complete absence of action perception. When the participants had to identify the faces of famous athletes, the responses were influenced by their similarity to the motor skills of the athletes. Thus, the motor skills of the viewed athletes were retrieved automatically during person identification and had a direct influence on the action system of the observer. However, our results also indicated that motor behaviours that are implicit characteristics of other people are represented differently from when actions are directly observed. That is, unlike the facilitatory effects reported when actions were seen, the embodiment of the motor behaviour that is not concurrently perceived gave rise to contrast effects where responses similar to the behaviour of the athletes were inhibited

    IFITM3 restricts influenza A virus entry by blocking the formation of fusion pores following virus-endosome hemifusion

    Get PDF
    Interferon-induced transmembrane proteins (IFITMs) inhibit infection of diverse enveloped viruses, including the influenza A virus (IAV) which is thought to enter from late endosomes. Recent evidence suggests that IFITMs block virus hemifusion (lipid mixing in the absence of viral content release) by altering the properties of cell membranes. Consistent with this mechanism, excess cholesterol in late endosomes of IFITM-expressing cells has been reported to inhibit IAV entry. Here, we examined IAV restriction by IFITM3 protein using direct virus-cell fusion assay and single virus imaging in live cells. IFITM3 over-expression did not inhibit lipid mixing, but abrogated the release of viral content into the cytoplasm. Although late endosomes of IFITM3-expressing cells accumulated cholesterol, other interventions leading to aberrantly high levels of this lipid did not inhibit virus fusion. These results imply that excess cholesterol in late endosomes is not the mechanism by which IFITM3 inhibits the transition from hemifusion to full fusion. The IFITM3\u27s ability to block fusion pore formation at a post-hemifusion stage shows that this protein stabilizes the cytoplasmic leaflet of endosomal membranes without adversely affecting the lumenal leaflet. We propose that IFITM3 interferes with pore formation either directly, through partitioning into the cytoplasmic leaflet of a hemifusion intermediate, or indirectly, by modulating the lipid/protein composition of this leaflet. Alternatively, IFITM3 may redirect IAV fusion to a non-productive pathway, perhaps by promoting fusion with intralumenal vesicles within multivesicular bodies/late endosomes

    Equine protease inhibitor system as a marker for the diagnosis of chronic obstructive pulmonary disease (COPD).

    Get PDF
    Polymorphism in programming languages enables code reuse. Here, we show that polymorphism has broad applicability far beyond computations for technical computing: parallelism in distributed computing, presentation of visualizations of runtime data flow, and proofs for formal verification of correctness. The ability to reuse a single codebase for all these purposes provides new ways to understand and verify parallel programs.Comment: 10 pages, 3 figures. Proceedings of HPTCDL, the 1st Workshop on High Performance Technical Computing in Dynamic Languages, November 17, 2014, New Orleans, Louisiana, USA. Supporting Information available at http://jiahao.github.io/parallel-prefi

    Standardising a moving target: The development and evolution of IoT security standards

    Get PDF
    The standards landscape for IoT security is currently developing in a fragmented manner. This paper provides a review of the main IoT security standards and guidelines that have been developed by formal standardisation organisations and transnational industry associations and interest alliances to date. The review makes three main contributions to the study of current IoT standards-development processes. First, governments and regulatory agencies in the EU and the US are increasingly considering the promotion of baseline IoT security requirements, achieved through public procurement obligations and cybersecurity certification schemes. Second, the analysis reveals that the IoT security standards landscape is dominated by de facto standards initiated by a diverse range of industry associations across the IoT ecosystem. Third, the paper identifies a number of key challenges for IoT security standardisation, most notably: a) the difficulty of setting a baseline for IoT security across all IoT applications and domains; and b) the difficulty of monitoring the adoption, implementation and effectiveness of IoT security standards and best practices. The paper consequently contributes to a better understanding of the evolution of IoT security standards and proposes a more coherent standards development and deployment approach
    corecore