1,459 research outputs found

    Anadromous fish as marine nutrient vectors

    Get PDF
    The tidal freshwater of Virginia supports anadromous herring (Alosa spp.) spawning runs in the spring; however, their importance as nutrient delivery vectors to the freshwater fish food web remains unknown. The stable isotope signatures of fishes from 21 species and four different guilds (predators, carnivores, generalists, and planktivores) were examined in this study to test the hypothesis that marine derived nutrients (MDNs) brought by anadromous fish would be traced into the guilds that incorporated them. Spawning anadromous fish were 13C and 34S-enriched (δ13C and δ34S of approximately 18‰ and 17.7‰, respectively) relative to resident freshwater fish. Of the guilds examined, only predators showed 13C and 34S-enrichment similar to the anadromous fish; however, some generalist catfish also showed enriched signatures. Specific fatty acid δ13C signatures for gizzard shad (Dorosoma cepedianum), blue catfish (Ictalurus furcatus), and alewife (Alosa pseudoharengus), show a 10‰ range among fishes, clearly reflecting isotopically distinct dietary sources. The δ13C and δ34S distribution and range among the freshwater fishes suggest that both autochthonous and allochthonous (terrestrial C3 photosynthetic production and MDN) nutrient sources are important to the tidal freshwater fish community

    Theoretical Sensitivity Analysis for Quantitative Operational Risk Management

    Full text link
    We study the asymptotic behavior of the difference between the values at risk VaR(L) and VaR(L+S) for heavy tailed random variables L and S for application in sensitivity analysis of quantitative operational risk management within the framework of the advanced measurement approach of Basel II (and III). Here L describes the loss amount of the present risk profile and S describes the loss amount caused by an additional loss factor. We obtain different types of results according to the relative magnitudes of the thicknesses of the tails of L and S. In particular, if the tail of S is sufficiently thinner than the tail of L, then the difference between prior and posterior risk amounts VaR(L+S) - VaR(L) is asymptotically equivalent to the expectation (expected loss) of S.Comment: 21 pages, 1 figure, 4 tables, forthcoming in International Journal of Theoretical and Applied Finance (IJTAF

    From Playboy to Prison: When Pornography Use Becomes a Crime

    Get PDF
    This study explores pornography use across the lifespan for a sample of registrants convicted of child pornography related offenses. We conducted qualitative life history interviews with nine offenders to examine how offender, victim, and situational factors interact to produce pornography related criminal events. Using a hybrid analytic approach, themes related to persistence in pornography use and the social acceptability of pornography are identified. These themes relate to transitions from legal pornography use to illegal child pornography possession

    The effect of irradiation-induced disorder on the conductivity and critical temperature of the organic superconductor Îş\kappa-(BEDT-TTF)2_2Cu(SCN)2_2

    Get PDF
    We have introduced defects into clean samples of the organic superconductor Îş\kappa-(BEDT-TTF)2_2Cu(SCN)2_2 in order to determine their effect on the temperature dependence of the conductivity and the critical temperature TcT_{\rm c}. We find a violation of Matthiessen's rule that can be explained by a model of the conductivity involving a defect-assisted interlayer channel which acts in parallel with the band-like conductivity. We observe an unusual dependence of TcT_{\rm c} on residual resistivity which is not consistent with the generalised Abrikosov-Gor'kov theory for an order parameter with a single component, providing an important constraint on models of the superconductivity in this material

    Visiting Mesopotamia

    Get PDF
    Students will design a postcard using primary knowledge of previous classroom discussions of the geographical importance of Mesopotamia

    Phenotypic characteristics of the p.Asn215Ser (p.N215S) GLA mutation in male and female patients with Fabry disease: A multicenter Fabry Registry study.

    Get PDF
    BackgroundThe p.Asn215Ser or p.N215S GLA variant has been associated with late-onset cardiac variant of Fabry disease.MethodsTo expand on the scarce phenotype data, we analyzed natural history data from 125 p.N215S patients (66 females, 59 males) enrolled in the Fabry Registry (NCT00196742) and compared it with data from 401 patients (237 females, 164 males) harboring mutations associated with classic Fabry disease. We evaluated interventricular septum thickness (IVST), left ventricular posterior wall thickness (LVPWT), estimated glomerular filtration rate and severe clinical events.ResultsIn p.N215S males, mildly abnormal mean IVST and LVPWT values were observed in patients aged 25-34 years, and values gradually increased with advancing age. Mean values were similar to those of classic males. In p.N215S females, these abnormalities occurred primarily in patients aged 55-64 years. Severe clinical events in p.N215S patients were mainly cardiac (males 31%, females 8%) while renal and cerebrovascular events were rare. Renal impairment occurred in 17% of p.N215S males (mostly in patients aged 65-74 years), and rarely in females (3%).Conclusionp.N215S is a disease-causing mutation with severe clinical manifestations found primarily in the heart. Cardiac involvement may become as severe as in classic Fabry patients, especially in males

    A previously unobserved conformation for the human Pex5p receptor suggests roles for intrinsic flexibility and rigid domain motions in ligand binding

    Get PDF
    BACKGROUND: The C-terminal tetratricopeptide (TPR) repeat domain of Pex5p recognises proteins carrying a peroxisomal targeting signal type 1 (PTS1) tripeptide in their C-terminus. Previously, structural data have been obtained from the TPR domain of Pex5p in both the liganded and unliganded states, indicating a conformational change taking place upon cargo protein binding. Such a conformational change would be expected to play a major role both during PTS1 protein recognition as well as in cargo release into the peroxisomal lumen. However, little information is available on the factors that may regulate such structural changes. RESULTS: We have used a range of biophysical and computational methods to further analyse the conformational flexibility and ligand binding of Pex5p. A new crystal form for the human Pex5p C-terminal domain (Pex5p(C)) was obtained in the presence of Sr(2+ )ions, and the structure presents a novel conformation, distinct from all previous liganded and apo crystal structures for Pex5p(C). The difference relates to a near-rigid body movement of two halves of the molecule, and this movement is different from that required to reach a ring-like conformation upon PTS1 ligand binding. The bound Sr(2+ )ion changes the dynamic properties of Pex5p(C) affecting its conformation, possibly by making the Sr(2+)-binding loop – located near the hinge region for the observed domain motions – more rigid. CONCLUSION: The current data indicate that Pex5p(C) is able to sample a range of conformational states in the absence of bound PTS1 ligand. The domain movements between various apo conformations are distinct from those involved in ligand binding, although the differences between all observed conformations so far can be characterised by the movement of the two halves of Pex5p(C) as near-rigid bodies with respect to each other

    Automating Fast and Secure Translations from Type-I to Type-III Pairing Schemes

    Get PDF
    Pairing-based cryptography has exploded over the last decade, as this algebraic setting offers good functionality and efficiency. However, there is a huge security gap between how schemes are usually analyzed in the academic literature and how they are typically implemented. The issue at play is that there exist multiple types of pairings: Type-I called “symmetric” is typically how schemes are presented and proven secure in the literature, because it is simpler and the complexity assumptions can be weaker; however, Type-III called “asymmetric” is typically the most efficient choice for an implementation in terms of bandwidth and computation time. There are two main complexities when moving from one pairing type to another. First, the change in algebraic setting invalidates the original security proof. Second, there are usually multiple (possibly thousands) of ways to translate from a Type-I to a Type-III scheme, and the “best” translation may depend on the application. Our contribution is the design, development and evaluation of a new software tool, AutoGroup+, that automatically translates from Type-I to Type-III pairings. The output of AutoGroup+ is: (1) “secure” provided the input is “secure” and (2) optimal based on the user’s efficiency constraints (excluding software and run-time errors). Prior automation work for pairings was either not guaranteed to be secure or only partially automated and impractically slow. This work addresses the pairing security gap by realizing a fast and secure translation tool
    • …
    corecore