541 research outputs found

    Evaluating human cancer cell metastasis in zebrafish

    Get PDF
    BACKGROUND: In vivo metastasis assays have traditionally been performed in mice, but the process is inefficient and costly. However, since zebrafish do not develop an adaptive immune system until 14 days post-fertilization, human cancer cells can survive and metastasize when transplanted into zebrafish larvae. Despite isolated reports, there has been no systematic evaluation of the robustness of this system to date. METHODS: Individual cell lines were stained with CM-Dil and injected into the perivitelline space of 2-day old zebrafish larvae. After 2-4 days fish were imaged using confocal microscopy and the number of metastatic cells was determined using Fiji software. RESULTS: To determine whether zebrafish can faithfully report metastatic potential in human cancer cells, we injected a series of cells with different metastatic potential into the perivitelline space of 2 day old embryos. Using cells from breast, prostate, colon and pancreas we demonstrated that the degree of cell metastasis in fish is proportional to their invasion potential in vitro. Highly metastatic cells such as MDA231, DU145, SW620 and ASPC-1 are seen in the vasculature and throughout the body of the fish after only 24–48 hours. Importantly, cells that are not invasive in vitro such as T47D, LNCaP and HT29 do not metastasize in fish. Inactivation of JAK1/2 in fibrosarcoma cells leads to loss of invasion in vitro and metastasis in vivo, and in zebrafish these cells show limited spread throughout the zebrafish body compared with the highly metastatic parental cells. Further, knockdown of WASF3 in DU145 cells which leads to loss of invasion in vitro and metastasis in vivo also results in suppression of metastasis in zebrafish. In a cancer progression model involving normal MCF10A breast epithelial cells, the degree of invasion/metastasis in vitro and in mice is mirrored in zebrafish. Using a modified version of Fiji software, it is possible to quantify individual metastatic cells in the transparent larvae to correlate with invasion potential. We also demonstrate, using lung cancers, that the zebrafish model can evaluate the metastatic ability of cancer cells isolated from primary tumors. CONCLUSIONS: The zebrafish model described here offers a rapid, robust, and inexpensive means of evaluating the metastatic potential of human cancer cells. Using this model it is possible to critically evaluate whether genetic manipulation of signaling pathways affects metastasis and whether primary tumors contain metastatic cells

    Past, Present and Future Perspectives on Groundnut Breeding in Burkina Faso

    Get PDF
    Groundnut (Arachis hypogaea L.) is a major food and cash crop in Burkina Faso. Due to the growing demand for raw oilseeds, there is an increasing interest in groundnut production from traditional rain-fed areas to irrigated environments. However, despite implementation of many initiatives in the past to increase groundnut productivity and production, the groundnut industry still struggles to prosper due to the fact of several constraints including minimal development research and fluctuating markets. Yield penalty due to the presence of drought and biotic stresses continue to be a major drawback for groundnut production. This review traces progress in the groundnut breeding that started in Burkina Faso before the country’s political independence in 1960 through to present times. Up to the 1980s, groundnut improvement was led by international research institutions such as IRHO (Institute of Oils and Oleaginous Research) and ICRISAT (International Crops Research Institute for the Semi-Arid Tropics). However, international breeding initiatives were not su�cient to establish a robust domestic groundnut breeding programme. This review also provides essential information about opportunities and challenges for groundnut research in Burkina Faso, emphasising the need for institutional attention to genetic improvement of the crop

    Studies of MCP-PMTs in the miniTimeCube neutrino detector

    Full text link
    This report highlights two different types of cross-talk in the photodetectors of the miniTimeCube neutrino experiment. The miniTimeCube detector has 24 8Ă—88 \times 8-anode Photonis MCP-PMTs Planacon XP85012, totalling 1536 individual pixels viewing the 2-liter cube of plastic scintillator

    Unmanned Aircraft Systems in the Cyber Domain

    Get PDF
    Unmanned Aircraft Systems are an integral part of the US national critical infrastructure. The authors have endeavored to bring a breadth and quality of information to the reader that is unparalleled in the unclassified sphere. This textbook will fully immerse and engage the reader / student in the cyber-security considerations of this rapidly emerging technology that we know as unmanned aircraft systems (UAS). The first edition topics covered National Airspace (NAS) policy issues, information security (INFOSEC), UAS vulnerabilities in key systems (Sense and Avoid / SCADA), navigation and collision avoidance systems, stealth design, intelligence, surveillance and reconnaissance (ISR) platforms; weapons systems security; electronic warfare considerations; data-links, jamming, operational vulnerabilities and still-emerging political scenarios that affect US military / commercial decisions. This second edition discusses state-of-the-art technology issues facing US UAS designers. It focuses on counter unmanned aircraft systems (C-UAS) – especially research designed to mitigate and terminate threats by SWARMS. Topics include high-altitude platforms (HAPS) for wireless communications; C-UAS and large scale threats; acoustic countermeasures against SWARMS and building an Identify Friend or Foe (IFF) acoustic library; updates to the legal / regulatory landscape; UAS proliferation along the Chinese New Silk Road Sea / Land routes; and ethics in this new age of autonomous systems and artificial intelligence (AI).https://newprairiepress.org/ebooks/1027/thumbnail.jp

    Counter Unmanned Aircraft Systems Technologies and Operations

    Get PDF
    As the quarter-century mark in the 21st Century nears, new aviation-related equipment has come to the forefront, both to help us and to haunt us. (Coutu, 2020) This is particularly the case with unmanned aerial vehicles (UAVs). These vehicles have grown in popularity and accessible to everyone. Of different shapes and sizes, they are widely available for purchase at relatively low prices. They have moved from the backyard recreation status to important tools for the military, intelligence agencies, and corporate organizations. New practical applications such as military equipment and weaponry are announced on a regular basis – globally. (Coutu, 2020) Every country seems to be announcing steps forward in this bludgeoning field. In our successful 2nd edition of Unmanned Aircraft Systems in the Cyber Domain: Protecting USA’s Advanced Air Assets (Nichols, et al., 2019), the authors addressed three factors influencing UAS phenomena. First, unmanned aircraft technology has seen an economic explosion in production, sales, testing, specialized designs, and friendly / hostile usages of deployed UAS / UAVs / Drones. There is a huge global growing market and entrepreneurs know it. Second, hostile use of UAS is on the forefront of DoD defense and offensive planners. They are especially concerned with SWARM behavior. Movies like “Angel has Fallen,” where drones in a SWARM use facial recognition technology to kill USSS agents protecting POTUS, have built the lore of UAS and brought the problem forefront to DHS. Third, UAS technology was exploding. UAS and Counter- UAS developments in navigation, weapons, surveillance, data transfer, fuel cells, stealth, weight distribution, tactics, GPS / GNSS elements, SCADA protections, privacy invasions, terrorist uses, specialized software, and security protocols has exploded. (Nichols, et al., 2019) Our team has followed / tracked joint ventures between military and corporate entities and specialized labs to build UAS countermeasures. As authors, we felt compelled to address at least the edge of some of the new C-UAS developments. It was clear that we would be lucky if we could cover a few of – the more interesting and priority technology updates – all in the UNCLASSIFIED and OPEN sphere. Counter Unmanned Aircraft Systems: Technologies and Operations is the companion textbook to our 2nd edition. The civilian market is interesting and entrepreneurial, but the military and intelligence markets are of concern because the US does NOT lead the pack in C-UAS technologies. China does. China continues to execute its UAS proliferation along the New Silk Road Sea / Land routes (NSRL). It has maintained a 7% growth in military spending each year to support its buildup. (Nichols, et al., 2019) [Chapter 21]. They continue to innovate and have recently improved a solution for UAS flight endurance issues with the development of advanced hydrogen fuel cell. (Nichols, et al., 2019) Reed and Trubetskoy presented a terrifying map of countries in the Middle East with armed drones and their manufacturing origin. Guess who? China. (A.B. Tabriski & Justin, 2018, December) Our C-UAS textbook has as its primary mission to educate and train resources who will enter the UAS / C-UAS field and trust it will act as a call to arms for military and DHS planners.https://newprairiepress.org/ebooks/1031/thumbnail.jp

    Search for a T-odd, P-even Triple Correlation in Neutron Decay

    Get PDF
    Background: Time-reversal-invariance violation, or equivalently CP violation, may explain the observed cosmological baryon asymmetry as well as signal physics beyond the Standard Model. In the decay of polarized neutrons, the triple correlation D\cdot(p_{e}\timesp_{\nu}) is a parity-even, time-reversal- odd observable that is uniquely sensitive to the relative phase of the axial-vector amplitude with respect to the vector amplitude. The triple correlation is also sensitive to possible contributions from scalar and tensor amplitudes. Final-state effects also contribute to D at the level of 1e-5 and can be calculated with a precision of 1% or better. Purpose: We have improved the sensitivity to T-odd, P-even interactions in nuclear beta decay. Methods: We measured proton-electron coincidences from decays of longitudinally polarized neutrons with a highly symmetric detector array designed to cancel the time-reversal-even, parity-odd Standard-Model contributions to polarized neutron decay. Over 300 million proton-electron coincidence events were used to extract D and study systematic effects in a blind analysis. Results: We find D = [-0.94\pm1.89(stat)\pm0.97(sys)]e-4. Conclusions: This is the most sensitive measurement of D in nuclear beta decay. Our result can be interpreted as a measurement of the phase of the ratio of the axial-vector and vector coupling constants (CA/CV= |{\lambda}|exp(i{\phi}_AV)) with {\phi}_AV = 180.012{\deg} \pm0.028{\deg} (68% confidence level) or to constrain time-reversal violating scalar and tensor interactions that arise in certain extensions to the Standard Model such as leptoquarks. This paper presents details of the experiment, analysis, and systematic- error corrections.Comment: 21 pages, 22 figure

    High-Sensitivity Measurement of 3He-4He Isotopic Ratios for Ultracold Neutron Experiments

    Get PDF
    Research efforts ranging from studies of solid helium to searches for a neutron electric dipole moment require isotopically purified helium with a ratio of 3He to 4He at levels below that which can be measured using traditional mass spectroscopy techniques. We demonstrate an approach to such a measurement using accelerator mass spectroscopy, reaching the 10e-14 level of sensitivity, several orders of magnitude more sensitive than other techniques. Measurements of 3He/4He in samples relevant to the measurement of the neutron lifetime indicate the need for substantial corrections. We also argue that there is a clear path forward to sensitivity increases of at least another order of magnitude.Comment: 11 pages, 10 figure
    • …
    corecore