1,128 research outputs found

    CP Maps – An interactive Cal Poly Map iOS Application

    Get PDF
    According to Forbes magazine, Cal Poly ranks No. 9 among Califor- nia’s public universities and is the top-ranked California State University for this past year[7]. More than 55,000 undergraduates seek admission for Fall 2015[11]. These visiting students and their families and as well as 20,000 cur- rent students, faculty and staff need an convenient way of navigating around campus[8]. Our iOS app—CP Maps—was built from the ground up to address the difficulty of navigating around campus

    Low Temperature Photo-oxidation of Chloroperoxidase Compound II

    Get PDF
    Oxidation of the heme-thiolate enzyme chloroperoxidase (CPO) from Caldariomyces fumago with peroxynitrite (PN) gave the Compound II intermediate, which was photo-oxidized with 365 nm light to give a reactive oxidizing species. Cryo-solvents at pH ≈ 6 were employed, and reactions were conducted at temperatures as low as − 50 °C. The activity of CPO as evaluated by the chlorodimedone assay was unaltered by treatment with PN or by production of the oxidizing transient and subsequent reaction with styrene. EPR spectra at 77 K gave the amount of ferric protein at each stage in the reaction sequence. The PN oxidation step gave a 6:1 mixture of Compound II and ferric CPO, the photolysis step gave an approximate 1:1 mixture of active oxidant and ferric CPO, and the final mixture after reaction with excess styrene contained ferric CPO in 80% yield. In single turnover reactions at − 50 °C, styrene was oxidized to styrene oxide in high yield. Kinetic studies of styrene oxidation at − 50 °C displayed saturation kinetics with an equilibrium constant for formation of the complex of Kbind = 3.8 × 104 M− 1 and an oxidation rate constant of kox = 0.30 s− 1. UV–Visible spectra of mixtures formed in the photo-oxidation sequence at ca. − 50 °C did not contain the signature Q-band absorbance at 690 nm ascribed to CPO Compound I prepared by chemical oxidation of the enzyme, indicating that different species were formed in the chemical oxidation and the photo-oxidation sequence

    Suicide rate in the dental profession: Fact or myth and coping strategies

    Get PDF
    This article summarizes relevant scientific data on the alleged high suicide rate among dentists as compared to other health care professions. Potential contributing risk factors for the dental profession are identified. In addition, a brief review is provided for major depressive disorder, a contributor to increased suicide, along with its symptoms, underlying theory, drug treatment and coping skills to combat this disorder.

    Bayesian algorithms for recovering structure from single-particle diffraction snapshots of unknown orientation: a comparison

    Get PDF
    The advent of X-ray Free Electron Lasers promises the possibility to determine the structure of individual particles such as microcrystallites, viruses and biomolecules from single-shot diffraction snapshots obtained before the particle is destroyed by the intense femtosecond pulse. This program requires the ability to determine the orientation of the particle giving rise to each snapshot at signal levels as low as ~10-2 photons/pixel. Two apparently different approaches have recently demonstrated this capability. Here we show they represent different implementations of the same fundamental approach, and identify the primary factors limiting their performance.Comment: 10 pages, 2 figure

    Deep-web search engine ranking algorithms

    Get PDF
    Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2010.Cataloged from PDF version of thesis.Includes bibliographical references (p. 79-80).The deep web refers to content that is hidden behind HTML forms. The deep web contains a large collection of data that are unreachable by link-based search engines. A study conducted at University of California, Berkeley estimated that the deep web consists of around 91,000 terabytes of data, whereas the surface web is only about 167 terabytes. To access this content, one must submit valid input values to the HTML form. Several researchers have studied methods for crawling deep web content. One of the most promising methods uses unique wrappers for HTML forms. User inputs are first filtered through the wrappers before being submitted to the forms. However, this method requires a new algorithm for ranking search results generated by the wrappers. In this paper, I explore methods for ranking search results returned from a wrapped-based deep web search engine.by Brian Wai Fung Wong.M.Eng

    Ligand-Specific Interactions Modulate Kinetic, Energetic, and Mechanical Properties of the Human β2 Adrenergic Receptor

    Get PDF
    SummaryG protein-coupled receptors (GPCRs) are a class of versatile proteins that transduce signals across membranes. Extracellular stimuli induce inter- and intramolecular interactions that change the functional state of GPCRs and activate intracellular messenger molecules. How these interactions are established and how they modulate the functional state of GPCRs remain to be understood. We used dynamic single-molecule force spectroscopy to investigate how ligand binding modulates the energy landscape of the human β2 adrenergic receptor (β2AR). Five different ligands representing either agonists, inverse agonists or neutral antagonists established a complex network of interactions that tuned the kinetic, energetic, and mechanical properties of functionally important structural regions of β2AR. These interactions were specific to the efficacy profile of the ligands investigated and suggest that the functional modulation of GPCRs follows structurally well-defined interaction patterns

    Building a Collaborative Phone Blacklisting System with Local Differential Privacy

    Full text link
    Spam phone calls have been rapidly growing from nuisance to an increasingly effective scam delivery tool. To counter this increasingly successful attack vector, a number of commercial smartphone apps that promise to block spam phone calls have appeared on app stores, and are now used by hundreds of thousands or even millions of users. However, following a business model similar to some online social network services, these apps often collect call records or other potentially sensitive information from users' phones with little or no formal privacy guarantees. In this paper, we study whether it is possible to build a practical collaborative phone blacklisting system that makes use of local differential privacy (LDP) mechanisms to provide clear privacy guarantees. We analyze the challenges and trade-offs related to using LDP, evaluate our LDP-based system on real-world user-reported call records collected by the FTC, and show that it is possible to learn a phone blacklist using a reasonable overall privacy budget and at the same time preserve users' privacy while maintaining utility for the learned blacklist.Comment: 15 pages, 10 figures, 7 algorithm
    • …
    corecore