1,947 research outputs found

    Bioinformatic approaches for understanding chromatin regulation

    No full text

    Weaving Lighthouses and Stitching Stories: Blind and Visually Impaired People Designing E-textiles

    Get PDF
    We describe our experience of working with blind and visually impaired people to create interactive art objects that are personal to them, through a participatory making process using electronic textiles (e-textiles) and hands-on crafting techniques. The research addresses both the practical considerations about how to structure hands-on making workshops in a way which is accessible to participants of varying experience and abilities, and how effective the approach was in enabling participants to tell their own stories and feel in control of the design and making process. The results of our analysis is the offering of insights in how to run e-textile making sessions in such a way for them to be more accessible and inclusive to a wider community of participants

    Plasmodium falciparum glutamate dehydrogenase a is dispensable and not a drug target during erythrocytic development

    Get PDF
    <p>Background: Plasmodium falciparum contains three genes encoding potential glutamate dehydrogenases. The protein encoded by gdha has previously been biochemically and structurally characterized. It was suggested that it is important for the supply of reducing equivalents during intra-erythrocytic development of Plasmodium and, therefore, a suitable drug target.</p> <p>Methods: The gene encoding the NADP(H)-dependent GDHa has been disrupted by reverse genetics in P. falciparum and the effect on the antioxidant and metabolic capacities of the resulting mutant parasites was investigated.</p> <p>Results: No growth defect under low and elevated oxygen tension, no up-or down-regulation of a number of antioxidant and NADP(H)-generating proteins or mRNAs and no increased levels of GSH were detected in the D10(Delta gdha) parasite lines. Further, the fate of the carbon skeleton of [(13)C] labelled glutamine was assessed by metabolomic studies, revealing no differences in the labelling of a-ketoglutarate and other TCA pathway intermediates between wild type and mutant parasites.</p> <p>Conclusions: First, the data support the conclusion that D10(Delta gdha) parasites are not experiencing enhanced oxidative stress and that GDHa function may not be the provision of NADP(H) for reductive reactions. Second, the results imply that the cytosolic, NADP(H)-dependent GDHa protein is not involved in the oxidative deamination of glutamate but that the protein may play a role in ammonia assimilation as has been described for other NADP(H)dependent GDH from plants and fungi. The lack of an obvious phenotype in the absence of GDHa may point to a regulatory role of the protein providing glutamate (as nitrogen storage molecule) in situations where the parasites experience a limiting supply of carbon sources and, therefore, under in vitro conditions the enzyme is unlikely to be of significant importance. The data imply that the protein is not a suitable target for future drug development against intra-erythrocytic parasite development.</p&gt

    Analyzing the viability of UAV missions facing cyber attacks

    Get PDF
    With advanced video and sensing capabilities, un-occupied aerial vehicles (UAVs) are increasingly being usedfor numerous applications that involve the collaboration andautonomous operation of teams of UAVs. Yet such vehicle scan be affected by cyber attacks, impacting the viability of their missions. We propose a method to conduct mission via-bility analysis under cyber attacks for missions that employa team of several UAVs that share a communication network. We apply our method to a case study of a survey mission in a wildfire firefighting scenario. Within this context, we show how our method can help quantify the expected mission performance impact from an attack and determine if the mission can remain viable under various attack situations. Our method can be used both in the planning of the mission and for decision making during mission operation.Our approach to modeling attack progression and impact analysis with Petri nets is also more broadly applicable toother settings involving multiple resources that can be used interchangeably towards the same objectiv

    When do children learn from unreliable speakers?

    Get PDF
    Children do not necessarily disbelieve a speaker with a history of inaccuracy; they take into account reasons for errors. Three- to 5 year-olds (N = 97) aimed to identify a hidden target in collaboration with a puppet. The puppet’s history of inaccuracy arose either from false beliefs, or occurred despite his being fully informed. On a subsequent test trial, children’s realistic expectation about the target was contradicted by the puppet who was fully informed. Children were more likely to revise their belief in line with the puppet’s assertion when his previous errors were due to false beliefs. Children who explained this puppet’s prior inaccuracy in terms of false belief were more likely to believe the puppet than those who did not. As children’s understanding of the mind advances, they increasingly balance the risk of learning falsehoods from unreliable speakers against that of rejecting truths from speakers who made excusable errors

    How to pass the false-belief task before your fourth birthday.

    Get PDF
    The experimental record of the last three decades shows that children under 4 years old fail all sorts of variations on the standard false-belief task, whereas more recent studies have revealed that infants are able to pass nonverbal versions of the task. We argue that these paradoxical results are an artifact of the type of false-belief tasks that have been used to test infants and children: Nonverbal designs allow infants to keep track of a protagonist's perspective over a course of events, whereas verbal designs tend to disrupt the perspective-tracking process in various ways, which makes it too hard for younger children to demonstrate their capacity for perspective tracking. We report three experiments that confirm this hypothesis by showing that 3-year-olds can pass a suitably streamlined version of the verbal false-belief task. We conclude that young children can pass the verbal false-belief task provided that they are allowed to keep track of the protagonist's perspective without too much disruption

    Recognition memory, self-other source memory, and theory-of-mind in children with autism spectrum disorder.

    Get PDF
    This study investigated semantic and episodic memory in autism spectrum disorder (ASD), using a task which assessed recognition and self-other source memory. Children with ASD showed undiminished recognition memory but significantly diminished source memory, relative to age- and verbal ability-matched comparison children. Both children with and without ASD showed an “enactment effect”, demonstrating significantly better recognition and source memory for self-performed actions than other-person-performed actions. Within the comparison group, theory-of-mind (ToM) task performance was significantly correlated with source memory, specifically for other-person-performed actions (after statistically controlling for verbal ability). Within the ASD group, ToM task performance was not significantly correlated with source memory (after controlling for verbal ability). Possible explanations for these relations between source memory and ToM are considered
    • …
    corecore