1,462 research outputs found
Anadromous fish as marine nutrient vectors
The tidal freshwater of Virginia supports anadromous herring
(Alosa spp.) spawning runs in the spring; however, their importance as nutrient delivery vectors to the freshwater fish food web remains unknown. The stable isotope signatures
of fishes from 21 species and four different guilds (predators, carnivores, generalists, and planktivores)
were examined in this study to test the hypothesis that marine derived nutrients (MDNs) brought by anadromous fish would be traced into the guilds that incorporated them.
Spawning anadromous fish were 13C and 34S-enriched (δ13C and δ34S of approximately 18‰ and 17.7‰, respectively)
relative to resident freshwater fish. Of the guilds examined, only predators showed 13C and 34S-enrichment
similar to the anadromous fish; however, some generalist catfish also showed enriched signatures. Specific fatty acid δ13C signatures for gizzard shad (Dorosoma cepedianum), blue catfish (Ictalurus furcatus), and alewife
(Alosa pseudoharengus), show a 10‰ range among fishes, clearly reflecting isotopically distinct dietary sources. The δ13C and δ34S distribution and range among the freshwater fishes suggest that both autochthonous and allochthonous (terrestrial C3 photosynthetic production and MDN) nutrient sources are important to the tidal freshwater fish community
Theoretical Sensitivity Analysis for Quantitative Operational Risk Management
We study the asymptotic behavior of the difference between the values at risk
VaR(L) and VaR(L+S) for heavy tailed random variables L and S for application
in sensitivity analysis of quantitative operational risk management within the
framework of the advanced measurement approach of Basel II (and III). Here L
describes the loss amount of the present risk profile and S describes the loss
amount caused by an additional loss factor. We obtain different types of
results according to the relative magnitudes of the thicknesses of the tails of
L and S. In particular, if the tail of S is sufficiently thinner than the tail
of L, then the difference between prior and posterior risk amounts VaR(L+S) -
VaR(L) is asymptotically equivalent to the expectation (expected loss) of S.Comment: 21 pages, 1 figure, 4 tables, forthcoming in International Journal of
Theoretical and Applied Finance (IJTAF
From Playboy to Prison: When Pornography Use Becomes a Crime
This study explores pornography use across the lifespan for a sample of registrants convicted of child pornography related offenses. We conducted qualitative life history interviews with nine offenders to examine how offender, victim, and situational factors interact to produce pornography related criminal events. Using a hybrid analytic approach, themes related to persistence in pornography use and the social acceptability of pornography are identified. These themes relate to transitions from legal pornography use to illegal child pornography possession
The effect of irradiation-induced disorder on the conductivity and critical temperature of the organic superconductor -(BEDT-TTF)Cu(SCN)
We have introduced defects into clean samples of the organic superconductor
-(BEDT-TTF)Cu(SCN) in order to determine their effect on the
temperature dependence of the conductivity and the critical temperature . We find a violation of Matthiessen's rule that can be explained by a model
of the conductivity involving a defect-assisted interlayer channel which acts
in parallel with the band-like conductivity. We observe an unusual dependence
of on residual resistivity which is not consistent with the
generalised Abrikosov-Gor'kov theory for an order parameter with a single
component, providing an important constraint on models of the superconductivity
in this material
Visiting Mesopotamia
Students will design a postcard using primary knowledge of previous classroom discussions of the geographical importance of Mesopotamia
Recommended from our members
Fall 1969
Massachusetts Lawn and Turf Grass CouncilBetter Turf Through Research and Education Artificial Turf Faces Credibility Gab by Dr. Gene C. Nutter (page 1) Nitrogen Facts and Fallacies by W.H. Garman (2) DDT Opponents by Charles Wurster, Jr. (10) DDT Defenders by Charles Wurster, Jr. (11) What Type 2,4-D to Use? by J.S. Coartney and A.H. Kates (21) Irrigation Circuit Break Pinpointed in One Hour (24
A previously unobserved conformation for the human Pex5p receptor suggests roles for intrinsic flexibility and rigid domain motions in ligand binding
BACKGROUND: The C-terminal tetratricopeptide (TPR) repeat domain of Pex5p recognises proteins carrying a peroxisomal targeting signal type 1 (PTS1) tripeptide in their C-terminus. Previously, structural data have been obtained from the TPR domain of Pex5p in both the liganded and unliganded states, indicating a conformational change taking place upon cargo protein binding. Such a conformational change would be expected to play a major role both during PTS1 protein recognition as well as in cargo release into the peroxisomal lumen. However, little information is available on the factors that may regulate such structural changes. RESULTS: We have used a range of biophysical and computational methods to further analyse the conformational flexibility and ligand binding of Pex5p. A new crystal form for the human Pex5p C-terminal domain (Pex5p(C)) was obtained in the presence of Sr(2+ )ions, and the structure presents a novel conformation, distinct from all previous liganded and apo crystal structures for Pex5p(C). The difference relates to a near-rigid body movement of two halves of the molecule, and this movement is different from that required to reach a ring-like conformation upon PTS1 ligand binding. The bound Sr(2+ )ion changes the dynamic properties of Pex5p(C) affecting its conformation, possibly by making the Sr(2+)-binding loop – located near the hinge region for the observed domain motions – more rigid. CONCLUSION: The current data indicate that Pex5p(C) is able to sample a range of conformational states in the absence of bound PTS1 ligand. The domain movements between various apo conformations are distinct from those involved in ligand binding, although the differences between all observed conformations so far can be characterised by the movement of the two halves of Pex5p(C) as near-rigid bodies with respect to each other
Phenotypic characteristics of the p.Asn215Ser (p.N215S) GLA mutation in male and female patients with Fabry disease: A multicenter Fabry Registry study.
BackgroundThe p.Asn215Ser or p.N215S GLA variant has been associated with late-onset cardiac variant of Fabry disease.MethodsTo expand on the scarce phenotype data, we analyzed natural history data from 125 p.N215S patients (66 females, 59 males) enrolled in the Fabry Registry (NCT00196742) and compared it with data from 401 patients (237 females, 164 males) harboring mutations associated with classic Fabry disease. We evaluated interventricular septum thickness (IVST), left ventricular posterior wall thickness (LVPWT), estimated glomerular filtration rate and severe clinical events.ResultsIn p.N215S males, mildly abnormal mean IVST and LVPWT values were observed in patients aged 25-34Â years, and values gradually increased with advancing age. Mean values were similar to those of classic males. In p.N215S females, these abnormalities occurred primarily in patients aged 55-64Â years. Severe clinical events in p.N215S patients were mainly cardiac (males 31%, females 8%) while renal and cerebrovascular events were rare. Renal impairment occurred in 17% of p.N215S males (mostly in patients aged 65-74Â years), and rarely in females (3%).Conclusionp.N215S is a disease-causing mutation with severe clinical manifestations found primarily in the heart. Cardiac involvement may become as severe as in classic Fabry patients, especially in males
Automating Fast and Secure Translations from Type-I to Type-III Pairing Schemes
Pairing-based cryptography has exploded over the last decade, as this algebraic setting offers good functionality and efficiency. However, there is a huge security gap between how schemes are usually analyzed in the academic literature and how they are typically implemented. The issue at play is that there exist multiple types of pairings: Type-I called “symmetric” is typically how schemes are presented and proven secure in the literature, because it is simpler and the complexity assumptions can be weaker; however, Type-III called “asymmetric” is typically the most efficient choice for an implementation in terms of bandwidth and computation time.
There are two main complexities when moving from one pairing type to another. First, the change in algebraic setting invalidates the original security proof. Second, there are usually multiple (possibly thousands) of ways to translate from a Type-I to a Type-III scheme, and the “best” translation may depend on the application.
Our contribution is the design, development and evaluation of a new software tool, AutoGroup+, that automatically translates from Type-I to Type-III pairings. The output of AutoGroup+ is: (1) “secure” provided the input is “secure” and (2) optimal based on the user’s efficiency constraints (excluding software and run-time errors). Prior automation work for pairings was either not guaranteed to be secure or only partially automated and impractically slow. This work addresses the pairing security gap by realizing a fast and secure translation tool
- …