141 research outputs found

    The Relationship Between Risky Behaviors, Individual Characteristics, and Sexual Revictimization Among College Women

    Get PDF
    Sexual revictimization of college women is a relatively new area of study within the field of victimology. Although the link between childhood sexual assault (CSA) and adult revictimization has been examined, many aspects of why college-aged females are revictimized have gained little attention. This Master’s thesis will explore the current literature as well as analyze the possible link between risky behaviors, individual characteristics, and sexual revictimization. Using Jacquelyn W. White and Paige Hall Smith’s (2004) data, A Longitudinal Perspective on Physical and Sexual Intimate Partner Violence Against Women, bivariate analyses were conducted regarding the revictimization of college women. The findings suggest a few differences between single victims and revictims. The findings also suggested that nonvictims and revictims were found to have multiple differences across variables. Suggestions for future research will be discussed

    Green Chemistry Project

    Get PDF

    On the strength of the finite intersection principle

    Full text link
    We study the logical content of several maximality principles related to the finite intersection principle (F\IP) in set theory. Classically, these are all equivalent to the axiom of choice, but in the context of reverse mathematics their strengths vary: some are equivalent to \ACA over \RCA, while others are strictly weaker, and incomparable with \WKL. We show that there is a computable instance of F\IP all of whose solutions have hyperimmune degree, and that every computable instance has a solution in every nonzero c.e.\ degree. In terms of other weak principles previously studied in the literature, the former result translates to F\IP implying the omitting partial types principle (OPT\mathsf{OPT}). We also show that, modulo Σ20\Sigma^0_2 induction, F\IP lies strictly below the atomic model theorem (AMT\mathsf{AMT}).Comment: This paper corresponds to section 3 of arXiv:1009.3242, "Reverse mathematics and equivalents of the axiom of choice", which has been abbreviated and divided into two pieces for publicatio

    Binding of Hyaluronan to the Native Lymphatic Vessel Endothelial Receptor LYVE-1 Is Critically Dependent on Receptor Clustering and Hyaluronan Organization

    Get PDF
    The lymphatic endothelial receptor LYVE-1 has been implicated in both uptake of hyaluronan (HA) from tissue matrix and in facilitating transit of leukocytes and tumor cells through lymphatic vessels based largely on in vitro studies with recombinant receptor in transfected fibroblasts. Curiously, however, LYVE-1 in lymphatic endothelium displays little if any binding to HA in vitro, and this has led to the conclusion that the native receptor is functionally silenced, a feature that is difficult to reconcile with its proposed in vivo functions. Nonetheless, as we reported recently, LYVE-1 can function as a receptor for HA-encapsulated Group A streptococci and mediate lymphatic dissemination in mice. Here we resolve these paradoxical findings and show that the capacity of LYVE-1 to bind HA is strictly dependent on avidity, demanding appropriate receptor self-association and/or HA multimerization. In particular, we demonstrate the prerequisite of a critical LYVE-1 threshold density and show that HA binding may be elicited in lymphatic endothelium by surface clustering with divalent LYVE-1 mAbs. In addition, we show that cross-linking of biotinylated HA in streptavidin multimers or supramolecular complexes with the inflammation-induced protein TSG-6 enables binding even in the absence of LYVE-1 cross-linking. Finally, we show that endogenous HA on the surface of macrophages can engage LYVE-1, facilitating their adhesion and transit across lymphatic endothelium. These results reveal LYVE-1 as a low affinity receptor tuned to discriminate between different HA configurations through avidity and establish a new mechanistic basis for the functions ascribed to LYVE-1 in matrix HA binding and leukocyte trafficking in vivo

    Lyapunov spectrum of asymptotically sub-additive potentials

    Full text link
    For general asymptotically sub-additive potentials (resp. asymptotically additive potentials) on general topological dynamical systems, we establish some variational relations between the topological entropy of the level sets of Lyapunov exponents, measure-theoretic entropies and topological pressures in this general situation. Most of our results are obtained without the assumption of the existence of unique equilibrium measures or the differentiability of pressure functions. Some examples are constructed to illustrate the irregularity and the complexity of multifractal behaviors in the sub-additive case and in the case that the entropy map that is not upper-semi continuous.Comment: 44 page

    Mycobacteria Exploit Host Hyaluronan for Efficient Extracellular Replication

    Get PDF
    In spite of the importance of hyaluronan in host protection against infectious organisms in the alveolar spaces, its role in mycobacterial infection is unknown. In a previous study, we found that mycobacteria interact with hyaluronan on lung epithelial cells. Here, we have analyzed the role of hyaluronan after mycobacterial infection was established and found that pathogenic mycobacteria can grow by utilizing hyaluronan as a carbon source. Both mouse and human possess 3 kinds of hyaluronan synthases (HAS), designated HAS1, HAS2, and HAS3. Utilizing individual HAS-transfected cells, we show that HAS1 and HAS3 but not HAS2 support growth of mycobacteria. We found that the major hyaluronan synthase expressed in the lung is HAS1, and that its expression was increased after infection with Mycobacterium tuberculosis. Histochemical analysis demonstrated that hyaluronan profoundly accumulated in the granulomatous legion of the lungs in M. tuberculosis-infected mice and rhesus monkeys that died from tuberculosis. We detected hyaluronidase activity in the lysate of mycobacteria and showed that it was critical for hyaluronan-dependent extracellular growth. Finally, we showed that L-Ascorbic acid 6-hexadecanoate, a hyaluronidase inhibitor, suppressed growth of mycobacteria in vivo. Taken together, our data show that pathogenic mycobacteria exploit an intrinsic host-protective molecule, hyaluronan, to grow in the respiratory tract and demonstrate the potential usefulness of hyaluronidase inhibitors against mycobacterial diseases

    Using Belief to Reason About Cache Coherence

    No full text
    The notion of belief has been useful in reasoning about authentication protocols. In this paper, we show how the notion of belief can be applied to reasoning about cache coherence in a distributed file system. To the best of our knowledge, this is the first formal analysis of this problem. We used an extended subset of a logic of authentication [4, 5] to help us analyze three cache coherence protocols: a validate-on-use protocol, an invalidation-based protocol, and a new large granularity protocol for use in weakly connected environments. In this paper, we present two runs from the large granularity protocol. Using our variant of the logic of authentication, we were able to find flaws in the design of the large granularity protocol. We found the notion of belief not only intuitively appealing for reasoning about our protocols, but also practical given the optimistic nature of our system model. Research is sponsored in part by the Air Force Materiel Command (AFMC) and the Advanced Rese..
    • …
    corecore