1,764 research outputs found

    The contribution of dormant origins to genome stability:from cell biology to human genetics

    Get PDF
    AbstractThe ability of a eukaryotic cell to precisely and accurately replicate its DNA is crucial to maintain genome stability. Here we describe our current understanding of the process by which origins are licensed for DNA replication and review recent work suggesting that fork stalling has exerted a strong selective pressure on the positioning of licensed origins. In light of this, we discuss the complex and disparate phenotypes observed in mouse models and humans patients that arise due to defects in replication licensing proteins

    Mucoepidermoid Carcinoma Of Thyroid Gland: A Rare Case Report

    Get PDF
    Introduction: Mucoepidermoid carcinoma is a common neoplasm of the salivary gland but can also occur in other sites like oesophagus, breast, lungs, pancreas, etc .In thyroid gland it is very uncommon or rare and is said to be of low grade indolent neoplasm. In literature few cases have been reported.Case report: 43 year old female presented with progressive midline swelling since 20 years with alteration in voice since two months. CT revealed heterogeneous enhancing lesion of 35x50x37 mm in left lobe of thyroid. FNAC revealed epithelial malignancy. Total thyroidectomy was done and specimen sent for histopathology.Result: Microscopically the tumor showed cells arranged in follicular and trabecular pattern. These tumors cells were of columnar and mucin producing type arranged in glandular pattern. Some of the cells show squamous metaplastic changes. These glands or follicles lack colloid. Final diagnosis of mucoepidermoid carcinoma of thyroid was given.Conclusion: Mucoepidermoid Carcinomaof thyroid is low grade neoplasm which extends into  ajjacent tissue by local infiltration and unlikely to metastasize, hence progress is good. It can also have agressive behaviour and hence a through search to be done histologically and also rule out other metastatic lesions

    A Rational Approach to Cryptographic Protocols

    Full text link
    This work initiates an analysis of several cryptographic protocols from a rational point of view using a game-theoretical approach, which allows us to represent not only the protocols but also possible misbehaviours of parties. Concretely, several concepts of two-person games and of two-party cryptographic protocols are here combined in order to model the latters as the formers. One of the main advantages of analysing a cryptographic protocol in the game-theory setting is the possibility of describing improved and stronger cryptographic solutions because possible adversarial behaviours may be taken into account directly. With those tools, protocols can be studied in a malicious model in order to find equilibrium conditions that make possible to protect honest parties against all possible strategies of adversaries

    Reentrant violation of special relativity in the low-energy corner

    Get PDF
    In the effective relativistic quantum field theories the energy region, where the special relativity holds, can be sandwiched from both the high and low energies sides by domains where the special relativity is violated. An example is provided by 3He-A where the relativistic quantum field theory emerges as the effective theory. The reentrant violation of the special relativity in the ultralow energy corner is accompanied by the redistribution of the momentum-space topological charges between the fermionic flavors. At this ultralow energy an exotic massless fermion with the topological charge N3=2N_3=2 arises, whose energy spectrum mixes the classical and relativistic behavior. This effect can lead to neutrino oscillations if neutrino flavors are still massless at this energy scale.Comment: RevTeX file, 5 pages, one figure, submitted to JETP Let

    Spatial variation of coda wave attenuation in the Southern Indian Shield and its implications

    Get PDF
    During the recent past the Indian peninsular shield has experienced six damaging earthquakes of M 5.4-7.7 and compelled to readdress our understanding of the seismic attenuation characteristics for better evaluation of the seismic hazards in the so-called stable shield. We have performed the seismic attenuation study using coda waves of the broadband network from 1995 to 2009 for the shield region. About 400 local earthquakes M 2.5-4.0 within an epicentral distance of 250km are used in this study. The broadband seismic stations established are in different geological provinces, such as the Archaean Dharwar craton, the southern granulite terrain, the Proterozoic Cuddapah basin, the Godavari graben, the Cretaceous-Eocene Deccan volcanic province and in the Cambay basin. This allows us to understand the fluctuation of Q0 in terms of spatial variations in the geologic and tectonic provinces. The results reflect a ubiquitous observation of frequency dependence of Qc in the different geologic provinces. The rift basins exhibit lower Q0, which suggests higher attenuation due to a more heterogeneous structure. Higher Q0 in the western Dharwar craton infers lower attenuation. Similarly the Deccan volcanic province is characterized by significantly higher Q0. The results show a good correlation with the observed heat flow. The study fills an important gap in knowledge about the Q factor as well as of crustal attenuation conditions in the whole southern peninsular shield of India

    Measurement of the B Semileptonic Branching Fraction with Lepton Tags

    Get PDF
    We have used the CLEO II detector and 2.06fb^(-1) of ϒ(4S) data to measure the B-meson semileptonic branching fraction. The B→Xeν momentum spectrum was obtained over nearly the full momentum range by using charge and kinematic correlations in events with a high-momentum lepton tag and an additional electron. We find B(B→Xeν) = (10.49±0.17±0.43)%, with overall systematic uncertainties less than those of untagged single-lepton measurements. We use this result to calculate the magnitude of the Cabibbo-Kobayashi-Maskawa matrix element V_(cb) and to set an upper limit on the fraction of ϒ(4S) decays to final states other than BB̅
    corecore