78 research outputs found

    Beyond the Bauxite Mines

    Get PDF

    Exile Vol. IV No. 1

    Get PDF
    The August Rose by Virginia Wallace 8-12 Beyond the Bauxite Mines by Barbara Ann Jucius 15-19 The Harvest by Anne Irgens 20-21 Recurrence: A Prose Poem by Nikos Stangos 22-27 The Day of the Painters by Edmund Boynton 28-35 Sophomore Slump by Jerilyn Robey 37-43 POETRY These Woods by Barbara Haupt 12 The Accused by Ellen Moore 13 Aberration by Barbara Haupt 19 Hate Eats by Karen Howey 21 Evanescence by Sandra Miskelly 36 Thoughts of You by William K. Lewis 36 Three Songs by Nikos Stangos 44 In this issue the editors of EXILE are proud to publish The Accused by Ellen Moore. This poem has been awarded the semi-annual Denison Book Store - EXILE Creative Writing Prize

    Analysis of Expression Pattern and Genetic Deletion of Netrin5 in the Developing Mouse

    Get PDF
    Boundary cap cells are a transient, neural-crest-derived population found at the motor exit point and dorsal root entry zone of the embryonic spinal cord. These cells contribute to the central/peripheral nervous system boundary, and in their absence neurons and glia from the CNS migrate into the PNS. We found Netrin5 (Ntn5), a previously unstudied member of the netrin gene family, to be robustly expressed in boundary cap cells. We generated Ntn5 knockout mice and examined neurodevelopmental and boundary-cap-cell-related phenotypes. No abnormalities in cranial nerve guidance, dorsal root organization, or sensory projections were found. However, Ntn5 mutant embryos did have ectopic motor neurons that migrated out of the ventral horn and into the motor roots. Previous studies have implicated semaphorin6A (Sema6A) in boundary cap cells signaling to plexinA2 (PlxnA2)/neuropilin2 (Nrp2) in motor neurons in restricting motor neuron cell bodies to the ventral horn, particularly in the caudal spinal cord. In Ntn5 mutants, ectopic motor neurons are likely to be a different population, as more ectopias were found rostrally. Furthermore, ectopic motor neurons in Ntn5 mutants were not immunoreactive for NRP2. The netrin receptor DCC is a potential receptor for NTN5 in motor neurons, as similar ectopic neurons were found in Dcc mutant mice, but not in mice deficient for other netrin receptors. Thus, Ntn5 is a novel netrin family member that is expressed in boundary cap cells, functioning to prevent motor neuron migration out of the CNS

    A Deficiency of Ceramide Biosynthesis Causes Cerebellar Purkinje Cell Neurodegeneration and Lipofuscin Accumulation

    Get PDF
    Sphingolipids, lipids with a common sphingoid base (also termed long chain base) backbone, play essential cellular structural and signaling functions. Alterations of sphingolipid levels have been implicated in many diseases, including neurodegenerative disorders. However, it remains largely unclear whether sphingolipid changes in these diseases are pathological events or homeostatic responses. Furthermore, how changes in sphingolipid homeostasis shape the progression of aging and neurodegeneration remains to be clarified. We identified two mouse strains, flincher (fln) and toppler (to), with spontaneous recessive mutations that cause cerebellar ataxia and Purkinje cell degeneration. Positional cloning demonstrated that these mutations reside in the Lass1 gene. Lass1 encodes (dihydro)ceramide synthase 1 (CerS1), which is highly expressed in neurons. Both fln and to mutations caused complete loss of CerS1 catalytic activity, which resulted in a reduction in sphingolipid biosynthesis in the brain and dramatic changes in steady-state levels of sphingolipids and sphingoid bases. In addition to Purkinje cell death, deficiency of CerS1 function also induced accumulation of lipofuscin with ubiquitylated proteins in many brain regions. Our results demonstrate clearly that ceramide biosynthesis deficiency can cause neurodegeneration and suggest a novel mechanism of lipofuscin formation, a common phenomenon that occurs during normal aging and in some neurodegenerative diseases

    Multiple Hydrogen-Bonding Assisted Scratch–Healing of Transparent Coatings

    No full text
    The partial cross-linking reaction of poly(vinyl alcohol) (PVA) by esterification using poly(acrylic acid) (PAA) as a cross-linking agent was performed to obtain a PVA–PAA supramolecular polymer complex. The PVA–PAA coatings with a different molar ratio between hydroxyl and carboxyl groups were prepared to examine scratch–healing ability. These coatings exhibited high optical transparency and excellent scratch–healing properties, which are attributed to considerable amount of free hydroxyl groups at the scratched interfaces to reversibly form multiple hydrogen bonds. Importantly, the PVA–PAA polymer was capable of initiating scratch recovery at temperature of 20 °C and relative humidity (RH) of 40%. Scratches produced on the PVA–PAA polymer coatings with different constant loading in the range of 1.5–2.7 N were healed significantly more rapidly under humid conditions (RH = 99%). Increase of cross-linking temperature also resulted in similar effect but with some reduction of the final scratch healing ratio

    Research of ios operating system security and the abuse of its exploits

    No full text
    iOS operating system, which is developed by Apple Inc., is claimed to be the most secure product in the market. In the light of worsening human rights conditions, mainly concerning data privacy breaches performed on governmental level, the need to be reassured about the security of software that runs in our pockets is strengthened. This thesis is focused on researching on potential iOS security exploits and their abuse to access private information or perform malicious actions without user’s consent. The operating system’s security exploit analysis is focused on security features imposed upon third-party products that run in iOS. Apps in iOS are each separately contained in a sandbox, with limited access to system resources and user data. Building upon the work of mobile security analysts, two ways of invoking private functionality and possibly abusing it, are presented in late chapters of the thesis. The comparison of Android and iOS security features is performed mainly by using an open source product, which is available on both platforms. Code examples are given, representing implementation differences for the same functionality which uses sensitive accesses. Info about other cross-platform products are gathered from the corresponding app marketplaces, disclosing issues within iOS app run-time privileges handling

    Personnel Management

    No full text
    Illinoisxiii, 534 p.: illus.; 21 c

    Elmenter of managerial action

    No full text
    xii, 519 p.; 23 cm

    Professional Management

    No full text
    • …
    corecore