154 research outputs found

    Growth and Atomic‐Scale Characterization of Ultrathin Silica and Germania Films: The Crucial Role of the Metal Support

    Get PDF
    The present review reports on the preparation and atomic‐scale characterization of the thinnest possible films of the glass‐forming materials silica and germania. To this end state‐of‐the‐art surface science techniques, in particular scanning probe microscopy, and density functional theory calculations have been employed. The investigated films range from monolayer to bilayer coverage where both, the crystalline and the amorphous films, contain characteristic XO4 (X=Si,Ge) building blocks. A side‐by‐side comparison of silica and germania monolayer, zigzag phase and bilayer films supported on Mo(112), Ru(0001), Pt(111), and Au(111) leads to a more general comprehension of the network structure of glass former materials. This allows us to understand the crucial role of the metal support for the pathway from crystalline to amorphous ultrathin film growth

    Adaptable Security in Wireless Sensor Networks by Using Reconfigurable ECC Hardware Coprocessors

    Get PDF
    Specific features of Wireless Sensor Networks (WSNs) like the open accessibility to nodes, or the easy observability of radio communications, lead to severe security challenges. The application of traditional security schemes on sensor nodes is limited due to the restricted computation capability, low-power availability, and the inherent low data rate. In order to avoid dependencies on a compromised level of security, a WSN node with a microcontroller and a Field Programmable Gate Array (FPGA) is used along this work to implement a state-of-the art solution based on ECC (Elliptic Curve Cryptography). In this paper it is described how the reconfiguration possibilities of the system can be used to adapt ECC parameters in order to increase or reduce the security level depending on the application scenario or the energy budget. Two setups have been created to compare the software- and hardware-supported approaches. According to the results, the FPGA-based ECC implementation requires three orders of magnitude less energy, compared with a low power microcontroller implementation, even considering the power consumption overhead introduced by the hardware reconfiguratio

    Tracing ancestry with methylation patterns: most crypts appear distantly related in normal adult human colon

    Get PDF
    BACKGROUND: The ability to discern ancestral relationships between individual human colon crypts is limited. Widely separated crypts likely trace their common ancestors to a time around birth, but closely spaced adult crypts may share more recent common ancestors if they frequently divide by fission to form clonal patches. Alternatively, adult crypts may be long-lived structures that infrequently divide or die. METHODS: Methylation patterns (the 5' to 3' order of methylation) at CpG sites that exhibit random changes with aging were measured from isolated crypts by bisulfite genomic sequencing. This epigenetic drift may be used to infer ancestry because recently related crypts should have similar methylation patterns. RESULTS: Methylation patterns were different between widely separated ("unrelated") crypts greater than 15 cm apart. Evidence for a more recent relationship between directly adjacent or branched crypts could not be found because their methylation pattern distances were not significantly different than widely separated crypt pairs. Methylation patterns are essentially equally different between two adult human crypts regardless of their relative locations. CONCLUSIONS: Methylation patterns appear to record somatic cell trees. Starting from a single cell at conception, sequences replicate and may drift apart. Most adult human colon crypts appear to be long-lived structures that become mosaic with respect to methylation during aging

    Home parenteral nutrition with an omega-3-fatty-acid-enriched MCT/LCT lipid emulsion in patients with chronic intestinal failure (the HOME study):study protocol for a randomized, controlled, multicenter, international clinical trial

    Get PDF
    BACKGROUND: Home parenteral nutrition (HPN) is a life-preserving therapy for patients with chronic intestinal failure (CIF) indicated for patients who cannot achieve their nutritional requirements by enteral intake. Intravenously administered lipid emulsions (ILEs) are an essential component of HPN, providing energy and essential fatty acids, but can become a risk factor for intestinal-failure-associated liver disease (IFALD). In HPN patients, major effort is taken in the prevention of IFALD. Novel ILEs containing a proportion of omega-3 polyunsaturated fatty acids (n-3 PUFA) could be of benefit, but the data on the use of n-3 PUFA in HPN patients are still limited. METHODS/DESIGN: The HOME study is a prospective, randomized, controlled, double-blind, multicenter, international clinical trial conducted in European hospitals that treat HPN patients. A total of 160 patients (80 per group) will be randomly assigned to receive the n-3 PUFA-enriched medium/long-chain triglyceride (MCT/LCT) ILE (Lipidem/Lipoplus® 200 mg/ml, B. Braun Melsungen AG) or the MCT/LCT ILE (Lipofundin® MCT/LCT/Medialipide® 20%, B. Braun Melsungen AG) for a projected period of 8 weeks. The primary endpoint is the combined change of liver function parameters (total bilirubin, aspartate transaminase and alanine transaminase) from baseline to final visit. Secondary objectives are the further evaluation of the safety and tolerability as well as the efficacy of the ILEs. DISCUSSION: Currently, there are only very few randomized controlled trials (RCTs) investigating the use of ILEs in HPN, and there are very few data at all on the use of n-3 PUFAs. The working hypothesis is that n-3 PUFA-enriched ILE is safe and well-tolerated especially with regard to liver function in patients requiring HPN. The expected outcome is to provide reliable data to support this thesis thanks to a considerable number of CIF patients, consequently to broaden the present evidence on the use of ILEs in HPN. TRIAL REGISTRATION: ClinicalTrials.gov, ID: NCT03282955. Registered on 14 September 2017

    Privacy-Preserving Observation in Public Spaces

    Get PDF
    One method of privacy-preserving accounting or billing in cyber-physical systems, such as electronic toll collection or public transportation ticketing, is to have the user present an encrypted record of transactions and perform the accounting or billing computation securely on them. Honesty of the user is ensured by spot checking the record for some selected surveyed transactions. But how much privacy does that give the user, i.e. how many transactions need to be surveyed? It turns out that due to collusion in mass surveillance all transactions need to be observed, i.e. this method of spot checking provides no privacy at all. In this paper we present a cryptographic solution to the spot checking problem in cyber-physical systems. Users carry an authentication device that authenticates only based on fair random coins. The probability can be set high enough to allow for spot checking, but in all other cases privacy is perfectly preserved. We analyze our protocol for computational efficiency and show that it can be efficiently implemented even on plat- forms with limited computing resources, such as smart cards and smart phones

    Low-Weight Primes for Lightweight Elliptic Curve Cryptography on 8-bit AVR Processors

    Get PDF
    Small 8-bit RISC processors and micro-controllers based on the AVR instruction set architecture are widely used in the embedded domain with applications ranging from smartcards over control systems to wireless sensor nodes. Many of these applications require asymmetric encryption or authentication, which has spurred a body of research into implementation aspects of Elliptic Curve Cryptography (ECC) on the AVR platform. In this paper, we study the suitability of a special class of finite fields, the so-called Optimal Prime Fields (OPFs), for a "lightweight" implementation of ECC with a view towards high performance and security. An OPF is a finite field Fp defined by a prime of the form p = u*2^k + v, whereby both u and v are "small" (in relation to 2^k) so that they fit into one or two registers of an AVR processor. OPFs have a low Hamming weight, which allows for a very efficient implementation of the modular reduction since only the non-zero words of p need to be processed. We describe a special variant of Montgomery multiplication for OPFs that does not execute any input-dependent conditional statements (e.g. branch instructions) and is, hence, resistant against certain side-channel attacks. When executed on an Atmel ATmega processor, a multiplication in a 160-bit OPF takes just 3237 cycles, which compares favorably with other implementations of 160-bit modular multiplication on an 8-bit processor. We also describe a performance-optimized and a security-optimized implementation of elliptic curve scalar multiplication over OPFs. The former uses a GLV curve and executes in 4.19M cycles (over a 160-bit OPF), while the latter is based on a Montgomery curve and has an execution time of approximately 5.93M cycles. Both results improve the state-of-the-art in lightweight ECC on 8-bit processors

    Three-Dimensional Microscopy Characterization of Death Receptor 5 Expression by Over-Activated Human Primary CD4+ T Cells and Apoptosis

    Get PDF
    Activation-induced cell death is a natural process that prevents tissue damages from over-activated immune cells. TNF-Related apoptosis ligand (TRAIL), a TNF family member, induces apoptosis of infected and tumor cells by binding to one of its two death receptors, DR4 or DR5. TRAIL was reported to be secreted by phytohemagglutinin (PHA)-stimulated CD4+ T cells in microvesicles

    Efficacious and Safe Tissue-Selective Controlled Gene Therapy Approaches for the Cornea

    Get PDF
    Untargeted and uncontrolled gene delivery is a major cause of gene therapy failure. This study aimed to define efficient and safe tissue-selective targeted gene therapy approaches for delivering genes into keratocytes of the cornea in vivo using a normal or diseased rabbit model. New Zealand White rabbits, adeno-associated virus serotype 5 (AAV5), and a minimally invasive hair-dryer based vector-delivery technique were used. Fifty microliters of AAV5 titer (6.5×1012 vg/ml) expressing green fluorescent protein gene (GFP) was topically applied onto normal or diseased (fibrotic or neovascularized) rabbit corneas for 2-minutes with a custom vector-delivery technique. Corneal fibrosis and neovascularization in rabbit eyes were induced with photorefractive keratectomy using excimer laser and VEGF (630 ng) using micropocket assay, respectively. Slit-lamp biomicroscopy and immunocytochemistry were used to confirm fibrosis and neovascularization in rabbit corneas. The levels, location and duration of delivered-GFP gene expression in the rabbit stroma were measured with immunocytochemistry and/or western blotting. Slot-blot measured delivered-GFP gene copy number. Confocal microscopy performed in whole-mounts of cornea and thick corneal sections determined geometric and spatial localization of delivered-GFP in three-dimensional arrangement. AAV5 toxicity and safety were evaluated with clinical eye exam, stereomicroscopy, slit-lamp biomicroscopy, and H&E staining. A single 2-minute AAV5 topical application via custom delivery-technique efficiently and selectively transduced keratocytes in the anterior stroma of normal and diseased rabbit corneas as evident from immunocytochemistry and confocal microscopy. Transgene expression was first detected at day 3, peaked at day 7, and was maintained up to 16 weeks (longest tested time point). Clinical and slit-lamp eye examination in live rabbits and H&E staining did not reveal any significant changes between AAV5-treated and untreated control corneas. These findings suggest that defined gene therapy approaches are safe for delivering genes into keratocytes in vivo and has potential for treating corneal disorders in human patients

    An Efficient Vector System to Modify Cells Genetically

    Get PDF
    The transfer of foreign genes into mammalian cells has been essential for understanding the functions of genes and mechanisms of genetic diseases, for the production of coding proteins and for gene therapy applications. Currently, the identification and selection of cells that have received transferred genetic material can be accomplished by methods, including drug selection, reporter enzyme detection and GFP imaging. These methods may confer antibiotic resistance, or be disruptive, or require special equipment. In this study, we labeled genetically modified cells with a cell surface biotinylation tag by co-transfecting cells with BirA, a biotin ligase. The modified cells can be quickly isolated for downstream applications using a simple streptavidin bead method. This system can also be used to screen cells expressing two sets of genes from separate vectors
    corecore