12,816 research outputs found

    Finite-Difference Time-Domain Simulation for Three-dimensional Polarized Light Imaging

    Full text link
    Three-dimensional Polarized Light Imaging (3D-PLI) is a promising technique to reconstruct the nerve fiber architecture of human post-mortem brains from birefringence measurements of histological brain sections with micrometer resolution. To better understand how the reconstructed fiber orientations are related to the underlying fiber structure, numerical simulations are employed. Here, we present two complementary simulation approaches that reproduce the entire 3D-PLI analysis: First, we give a short review on a simulation approach that uses the Jones matrix calculus to model the birefringent myelin sheaths. Afterwards, we introduce a more sophisticated simulation tool: a 3D Maxwell solver based on a Finite-Difference Time-Domain algorithm that simulates the propagation of the electromagnetic light wave through the brain tissue. We demonstrate that the Maxwell solver is a valuable tool to better understand the interaction of polarized light with brain tissue and to enhance the accuracy of the fiber orientations extracted by 3D-PLI.Comment: 13 pages, 5 figure

    Hex is a transcriptional repressor that contributes to anterior identity and suppresses Spemann organiser function

    Get PDF
    One of the earliest markers of anterior asymmetry in vertebrate embryos is the transcription factor Hex. We find that Hex is a transcriptional repressor that can be converted to an activator by fusing full length Hex to two copies of the minimal transcriptional activation domain of VP16 together with the flexible hinge region of the (lambda) repressor (Hex-(lambda)VP2). Retention of the entire Hex open reading frame allows one to examine Hex function without disrupting potential protein-protein interactions. Expression of Hex-(lambda)VP2 in Xenopus inhibits expression of the anterior marker Cerberus and results in anterior truncations. Such embryos have multiple notochords and disorganised muscle tissue. These effects can occur in a cell non-autonomous manner, suggesting that one role of wild-type Hex is to specify anterior structures by suppressing signals that promote dorsal mesoderm formation. In support of this idea, over-expression of wild-type Hex causes cell non-autonomous dorso-anteriorization, as well as cell autonomous suppression of dorsal mesoderm. Suppression of dorsal mesoderm by Hex is accompanied by the down-regulation of Goosecoid and Chordin, while induction of dorsal mesoderm by Hex-(lambda)VP2 results in activation of these genes. Transient transfection experiments in ES cells suggest that Goosecoid is a direct target of Hex. Together, our results support a model in which Hex suppresses organiser activity and defines anterior identity

    Proof Relevant Corecursive Resolution

    Full text link
    Resolution lies at the foundation of both logic programming and type class context reduction in functional languages. Terminating derivations by resolution have well-defined inductive meaning, whereas some non-terminating derivations can be understood coinductively. Cycle detection is a popular method to capture a small subset of such derivations. We show that in fact cycle detection is a restricted form of coinductive proof, in which the atomic formula forming the cycle plays the role of coinductive hypothesis. This paper introduces a heuristic method for obtaining richer coinductive hypotheses in the form of Horn formulas. Our approach subsumes cycle detection and gives coinductive meaning to a larger class of derivations. For this purpose we extend resolution with Horn formula resolvents and corecursive evidence generation. We illustrate our method on non-terminating type class resolution problems.Comment: 23 pages, with appendices in FLOPS 201

    Sondeo arqueológico del sector 36 [Material gráfico]

    Get PDF
    Detalle de los trabajos del levantamiento de materiales arqueológicos del Sector 36 Corte A/C-8/10Copia digital. Madrid : Ministerio de Educación, Cultura y Deporte. Subdirección General de Coordinación Bibliotecaria, 201

    The Noncanonical Pathway for In Vivo Nitric Oxide Generation: The Nitrate-Nitrite-Nitric Oxide Pathway.

    Get PDF
    In contrast to nitric oxide, which has well established and important roles in the regulation of blood flow and thrombosis, neurotransmission, the normal functioning of the genitourinary system, and the inflammation response and host defense, its oxidized metabolites nitrite and nitrate have, until recently, been considered to be relatively inactive. However, this view has been radically revised over the past decade and more. Much evidence has now accumulated demonstrating that nitrite serves as a storage form of nitric oxide, releasing nitric oxide preferentially under acidic and/or hypoxic conditions but also occurring under physiologic conditions: a phenomenon that is catalyzed by a number of distinct mammalian nitrite reductases. Importantly, preclinical studies demonstrate that reduction of nitrite to nitric oxide results in a number of beneficial effects, including vasodilatation of blood vessels and lowering of blood pressure, as well as cytoprotective effects that limit the extent of damage caused by an ischemia/reperfusion insult, with this latter issue having been translated more recently to the clinical setting. In addition, research has demonstrated that the other main metabolite of the oxidation of nitric oxide (i.e., nitrate) can also be sequentially reduced through processing in vivo to nitrite and then nitrite to nitric oxide to exert a range of beneficial effects-most notably lowering of blood pressure, a phenomenon that has also been confirmed recently to be an effective method for blood pressure lowering in patients with hypertension. This review will provide a detailed description of the pathways involved in the bioactivation of both nitrate and nitrite in vivo, their functional effects in preclinical models, and their mechanisms of action, as well as a discussion of translational exploration of this pathway in diverse disease states characterized by deficiencies in bioavailable nitric oxide. SIGNIFICANCE STATEMENT: The past 15 years has seen a major revision in our understanding of the pathways for nitric oxide synthesis in the body with the discovery of the noncanonical pathway for nitric oxide generation known as the nitrate-nitrite-nitric oxide pathway. This review describes the molecular components of this pathway, its role in physiology, potential therapeutics of targeting this pathway, and their impact in experimental models, as well as the clinical translation (past and future) and potential side effects

    Graphene-based photovoltaic cells for near-field thermal energy conversion

    Get PDF
    Thermophotovoltaic devices are energy-conversion systems generating an electric current from the thermal photons radiated by a hot body. In far field, the efficiency of these systems is limited by the thermodynamic Schockley-Queisser limit corresponding to the case where the source is a black body. On the other hand, in near field, the heat flux which can be transferred to a photovoltaic cell can be several orders of magnitude larger because of the contribution of evanescent photons. This is particularly true when the source supports surface polaritons. Unfortunately, in the infrared where these systems operate, the mismatch between the surface-mode frequency and the semiconductor gap reduces drastically the potential of this technology. Here we show that graphene-based hybrid photovoltaic cells can significantly enhance the generated power paving the way to a promising technology for an intensive production of electricity from waste heat.Comment: 5 pages, 4 figure

    Analyzing Network Level Information

    Get PDF
    This chapter provides a brief description of the methods employed for collecting initial information about a given suspicious online communication message, including header and network information; and how to forensically analyze the dataset to attain the information that would be necessary to trace back to the source of the crime. The header content and network information are usually the immediate sources for collecting preliminary information about a given collection of suspicious online messages. The header analysis of an e-mail corpus identifying all the senders, the recipients associated with each sender, and the frequency of messages exchanged between users helps an investigator to understand the overall nature of e-mail communication. Electronic messages like e-mails or virtual network data present a potential dataset or a source of evidence containing personal communications, critical business communications, or agreements. When a crime is committed, it is always possible for the perpetrator to manipulate e-mails or any electronic evidence, forging the details to remove relevant evidence or tampering the data to mislead the investigator. Possible manipulation of such evidence may include backdating, executing time-stamp changes, altering the message sender, recipient, or message content, etc. However, such attempts of manipulation and misleading can be detected by examining the message header. By examining e-mail header and analyzing network information through forensic analysis, investigators can gain valuable insight into the source of a message that is otherwise not traceable through the message body. Investigators can utilize a range of existing algorithms and models and build on leveraging typical forensic planning. Such models focus on what type of information should be collected, ensuring the forensically sound collection and preservation of identified Electronically Stored Information (ESI). By applying these models, it is possible to achieve a full analysis and collect all the relevant information pertaining to the crime. The collected finding is then compiled to reconstruct the whole crime scene, deduct more accurate and logical conclusions [1]
    corecore