22,482 research outputs found

    Immune compromise in HIV-1/HTLV-1 coinfection with paradoxical resolution of CD4 lymphocytosis during antiretroviral therapy: a case report

    Get PDF
    Human immunodeficiency virus type-1 (HIV-1) and human T lymphotropic virus type-1 (HTLV-1) infections have complex effects on adaptive immunity, with specific tropism for, but contrasting effects on, CD4 T lymphocytes: depletion with HIV-1, proliferation with HTLV-1. Impaired T lymphocyte function occurs early in HIV-1 infection but opportunistic infections (OIs) rarely occur in the absence of CD4 lymphopenia. In the unusual case where a HIV-1 infected individual with a high CD4 count presents with recurrent OIs, a clinician is faced with the possibility of a second underlying comorbidity. We present a case of pseudo-adult T cell leukemia/lymphoma (ATLL) in HIV-1/HTLV-1 coinfection where the individual fulfilled Shimoyama criteria for chronic ATLL and had pulmonary Mycobacterium kansasii, despite a high CD4 lymphocyte count. However, there was no evidence of clonal T-cell proliferation by T-cell receptor gene rearrangement studies nor of monoclonal HTLV-1 integration by high-throughput sequencing. Mutually beneficial interplay between HIV-1 and HTLV-1, maintaining high level HIV-1 and HTLV-1 viremia and proliferation of poorly functional CD4 cells despite chronicity of infection is a postulated mechanism. Despite good microbiological response to antimycobacterial therapy, the patient remained systemically unwell with refractory anemia. Subsequent initiation of combined antiretroviral therapy led to paradoxical resolution of CD4 T lymphocytosis as well as HIV-1 viral suppression and decreased HTLV-1 proviral load. This is proposed to be the result of attenuation of immune activation post-HIV virological control. This case illustrates the importance of screening for HTLV-1 in HIV-1 patients with appropriate clinical presentation and epidemiological risk factors and explores mechanisms for the complex interactions on HIV-1/HTLV-1 adaptive immunity

    Using Geant4 to create 3D maps of dosage received within a MinPET diamond sorting facility

    Get PDF
    Abstract: The MinPET project aims to locate diamonds within kimberlite by activating carbon within kimberlite, then using Positron Emission Tomorography (PET) to image carbon density. Although calculations suggest that long-term activation is not significant, modelling is required to determine the dose received by workers operating close to recently activated material at different positions within a hypothetical MinPET sorting unit. Two modelling techniques are deployed to investigate received dose. The first is a full simulation of energy absorbed, using the CERN Geant4 particle tracking toolkit. The results for this are validated against a numerical computation of the attenuation of outgoing radiation. The result is a set of 3-dimensional dosage maps. These can be used to set guidelines around where and for how long workers could operate, and to identify areas that need additional radiation shielding. The techniques developed are not limited to MinPET, and could prove useful for any situation requiring the simulation of dose received by workers operating near radioactive material

    Strategies for protecting intellectual property when using CUDA applications on graphics processing units

    Get PDF
    Recent advances in the massively parallel computational abilities of graphical processing units (GPUs) have increased their use for general purpose computation, as companies look to take advantage of big data processing techniques. This has given rise to the potential for malicious software targeting GPUs, which is of interest to forensic investigators examining the operation of software. The ability to carry out reverse-engineering of software is of great importance within the security and forensics elds, particularly when investigating malicious software or carrying out forensic analysis following a successful security breach. Due to the complexity of the Nvidia CUDA (Compute Uni ed Device Architecture) framework, it is not clear how best to approach the reverse engineering of a piece of CUDA software. We carry out a review of the di erent binary output formats which may be encountered from the CUDA compiler, and their implications on reverse engineering. We then demonstrate the process of carrying out disassembly of an example CUDA application, to establish the various techniques available to forensic investigators carrying out black-box disassembly and reverse engineering of CUDA binaries. We show that the Nvidia compiler, using default settings, leaks useful information. Finally, we demonstrate techniques to better protect intellectual property in CUDA algorithm implementations from reverse engineering

    Data to support observation of late and ultra-late latency components of cortical laser evoked potentials

    Get PDF
    open access articleData are provided to document the presence of late and ultra-late latency components of cortical laser evoked potentials (LEPs) following noxious laser stimulus in Stancak et al. (2015) [3]. The latency components, labeled provisionally as N4, N5, and N6, were observed in 16 healthy human participants who were asked to fully attend their painful and non-painful sensations occurring in association with noxious laser stimulus. Individual laser evoked potential waveforms are provided in support of this observation. Data provided demonstrate the cortical sources of the late and ultra-late laser evoked potentials. The cortical sources of LEPs were reconstructed using the standardized Low Resolution Electromagnetic Tomography (sLORETA) method

    Investigations of fast neutron production by 190 GeV/c muon interactions on different targets

    Get PDF
    The production of fast neutrons (1 MeV - 1 GeV) in high energy muon-nucleus interactions is poorly understood, yet it is fundamental to the understanding of the background in many underground experiments. The aim of the present experiment (CERN NA55) was to measure spallation neutrons produced by 190 GeV/c muons scattering on carbon, copper and lead targets. We have investigated the energy spectrum and angular distribution of spallation neutrons, and we report the result of our measurement of the neutron production differential cross section.Comment: 19 pages, 11 figures ep

    Differential Forms and Wave Equations for General Relativity

    Full text link
    Recently, Choquet-Bruhat and York and Abrahams, Anderson, Choquet-Bruhat, and York (AACY) have cast the 3+1 evolution equations of general relativity in gauge-covariant and causal ``first-order symmetric hyperbolic form,'' thereby cleanly separating physical from gauge degrees of freedom in the Cauchy problem for general relativity. A key ingredient in their construction is a certain wave equation which governs the light-speed propagation of the extrinsic curvature tensor. Along a similar line, we construct a related wave equation which, as the key equation in a system, describes vacuum general relativity. Whereas the approach of AACY is based on tensor-index methods, the present formulation is written solely in the language of differential forms. Our approach starts with Sparling's tetrad-dependent differential forms, and our wave equation governs the propagation of Sparling's 2-form, which in the ``time-gauge'' is built linearly from the ``extrinsic curvature 1-form.'' The tensor-index version of our wave equation describes the propagation of (what is essentially) the Arnowitt-Deser-Misner gravitational momentum.Comment: REVTeX, 26 pages, no figures, 1 macr

    Verifying proofs in constant depth

    Get PDF
    In this paper we initiate the study of proof systems where verification of proofs proceeds by NC circuits. We investigate the question which languages admit proof systems in this very restricted model. Formulated alternatively, we ask which languages can be enumerated by NC functions. Our results show that the answer to this problem is not determined by the complexity of the language. On the one hand, we construct NC proof systems for a variety of languages ranging from regular to NP-complete. On the other hand, we show by combinatorial methods that even easy regular languages such as Exact-OR do not admit NC proof systems. We also present a general construction of proof systems for regular languages with strongly connected NFA's

    Group classification of the Sachs equations for a radiating axisymmetric, non-rotating, vacuum space-time

    Get PDF
    We carry out a Lie group analysis of the Sachs equations for a time-dependent axisymmetric non-rotating space-time in which the Ricci tensor vanishes. These equations, which are the first two members of the set of Newman-Penrose equations, define the characteristic initial-value problem for the space-time. We find a particular form for the initial data such that these equations admit a Lie symmetry, and so defines a geometrically special class of such spacetimes. These should additionally be of particular physical interest because of this special geometric feature.Comment: 18 Pages. Submitted to Classical and Quantum Gravit

    Implementing an apparent-horizon finder in three dimensions

    Get PDF
    Locating apparent horizons is not only important for a complete understanding of numerically generated spacetimes, but it may also be a crucial component of the technique for evolving black-hole spacetimes accurately. A scheme proposed by Libson et al., based on expanding the location of the apparent horizon in terms of symmetric trace-free tensors, seems very promising for use with three-dimensional numerical data sets. In this paper, we generalize this scheme and perform a number of code tests to fully calibrate its behavior in black-hole spacetimes similar to those we expect to encounter in solving the binary black-hole coalescence problem. An important aspect of the generalization is that we can compute the symmetric trace-free tensor expansion to any order. This enables us to determine how far we must carry the expansion to achieve results of a desired accuracy. To accomplish this generalization, we describe a new and very convenient set of recurrence relations which apply to symmetric trace-free tensors.Comment: 14 pages (RevTeX 3.0 with 3 figures
    corecore