32 research outputs found

    Control and Local Measurement of the Spin Chemical Potential in a Magnetic Insulator

    Full text link
    The spin chemical potential characterizes the tendency of spins to diffuse. Probing the spin chemical potential could provide insight into materials such as magnetic insulators and spin liquids and aid optimization of spintronic devices. Here, we introduce single-spin magnetometry as a generic platform for non-perturbative, nanoscale characterization of spin chemical potentials. We use this platform to investigate magnons in a magnetic insulator, surprisingly finding that the magnon chemical potential can be efficiently controlled by driving the system's ferromagnetic resonance. We introduce a symmetry-based two-fluid theory describing the underlying magnon processes, realize the first experimental determination of the local thermomagnonic torque, and illustrate the detection sensitivity using electrically controlled spin injection. Our results open the way for nanoscale control and imaging of spin transport in mesoscopic spin systems.Comment: 18 pages, 4 figure

    HIV-infected T cells are migratory vehicles for viral dissemination

    Get PDF
    After host entry through mucosal surfaces, HIV-1 disseminates to lymphoid tissues to establish a generalized infection of the immune system. The mechanisms by which this virus spreads among permissive target cells locally during early stages of transmission, and systemically during subsequent dissemination are not known1. In vitro studies suggest that formation of virological synapses (VSs) during stable contacts between infected and uninfected T cells greatly increases the efficiency of viral transfer2. It is unclear, however, if T cell contacts are sufficiently stable in vivo to allow for functional synapse formation under the conditions of perpetual cell motility in epithelial3 and lymphoid tissues4. Here, using multiphoton intravital microscopy (MP-IVM), we examined the dynamic behavior of HIV-infected T cells in lymph nodes (LNs) of humanized mice. We found that most productively infected T cells migrated robustly, resulting in their even distribution throughout the LN cortex. A subset of infected cells formed multinucleated syncytia through HIV envelope (Env)-dependent cell fusion. Both uncoordinated motility of syncytia as well as adhesion to CD4+ LN cells led to the formation of long membrane tethers, increasing cell lengths to up to 10 times that of migrating uninfected T cells. Blocking the egress of migratory T cells from LNs into efferent lymph, and thus interrupting T cell recirculation, limited HIV dissemination and strongly reduced plasma viremia. Thus, we have found that HIV-infected T cells are motile, form syncytia, and establish tethering interactions that may facilitate cell-to-cell transmission through VSs. While their migration in LNs spreads infection locally, T cell recirculation through tissues is important for efficient systemic viral spread, suggesting new molecular targets to antagonize HIV infection

    Exploiting Workflow Languages and Semantics for Validation of Security Policies in IoT Composite Services

    Full text link
    Internet of Things (IoT) ecosystems are recently experiencing a significant growth in complexity. Most IoT applications in domains like healthcare, industry, automotive, and smart energy are composed of several interconnected subsystems that produce, collect, process, and exchange a huge amount of data, and that offer composite services to the end users based on these data. This scenario is exacerbated by the dynamism of the IoT device layer, which may be subject to structural or technological changes over time, to cope for example with the need for new sensing/actuation capabilities requirements or with technical issues. Due to the inherent sensitive nature of the data that is typically processed by IoT applications, security represents one of the primary issues to address. It is worth noting that each subsystem integrated within a composite IoT application may have different requirements and enforce different local security policies, and the policies that result globally enforced at the system level may not comply with the existing global requirements. In general, the analysis and validation of security properties in a composite IoT system represents a very complex task, made even more complex by the introduction of new laws and regulations during system life. To cope with the above issues, in this article, we propose a methodology that leverages both workflow languages and semantics in order to enable the validation of the security features offered by a composite IoT system, with the goal of verifying whether they match with global end-user policies and even with national and international laws and rules
    corecore