6,406 research outputs found

    Lifting defects for nonstable K_0-theory of exchange rings and C*-algebras

    Full text link
    The assignment (nonstable K_0-theory), that to a ring R associates the monoid V(R) of Murray-von Neumann equivalence classes of idempotent infinite matrices with only finitely nonzero entries over R, extends naturally to a functor. We prove the following lifting properties of that functor: (1) There is no functor F, from simplicial monoids with order-unit with normalized positive homomorphisms to exchange rings, such that VF is equivalent to the identity. (2) There is no functor F, from simplicial monoids with order-unit with normalized positive embeddings to C*-algebras of real rank 0 (resp., von Neumann regular rings), such that VF is equivalent to the identity. (3) There is a {0,1}^3-indexed commutative diagram D of simplicial monoids that can be lifted, with respect to the functor V, by exchange rings and by C*-algebras of real rank 1, but not by semiprimitive exchange rings, thus neither by regular rings nor by C*-algebras of real rank 0. By using categorical tools from an earlier paper (larders, lifters, CLL), we deduce that there exists a unital exchange ring of cardinality aleph three (resp., an aleph three-separable unital C*-algebra of real rank 1) R, with stable rank 1 and index of nilpotence 2, such that V(R) is the positive cone of a dimension group and V(R) is not isomorphic to V(B) for any ring B which is either a C*-algebra of real rank 0 or a regular ring.Comment: 34 pages. Algebras and Representation Theory, to appea

    Fuzzy identity-based data integrity auditing for reliable cloud storage systems

    Get PDF
    This is the author accepted manuscript. The final version is available from the publisher via the DOI in this record.As a core security issue in reliable cloud storage, data integrity has received much attention. Data auditing protocols enable a verifier to efficiently check the integrity of the outsourced data without downloading the data. A key research challenge associated with existing designs of data auditing protocols is the complexity in key management. In this paper, we seek to address the complex key management challenge in cloud data integrity checking by introducing fuzzy identity-based auditing-the first in such an approach, to the best of our knowledge. More specifically, we present the primitive of fuzzy identity-based data auditing, where a user’s identity can be viewed as a set of descriptive attributes. We formalize the system model and the security model for this new primitive. We then present a concrete construction of fuzzy identity-based auditing protocol by utilizing biometrics as the fuzzy identity. The new protocol offers the property of error-tolerance, namely, it binds private key to one identity which can be used to verify the correctness of a response generated with another identity, if and only if both identities are sufficiently close. We prove the security of our protocol based on the computational Diffie-Hellman assumption and the discrete logarithm assumption in the selective-ID security model. Finally, we develop a prototype implementation of the protocol which demonstrates the practicality of the proposal.This work is supported by the National Natural Science Foundation of China (61501333,61300213,61272436,61472083), the Fundamental Research Funds for the Central Universities under Grant ZYGX2015J05

    Treat the patient by the recognized toxidrome when the ingested herbal juice is non-toxic

    Get PDF
    This is the case of 63-year-old mother and her 35-year-old daughter who drank herbal juice (Rhizoma Dioscoreae Nipponicae and Ficus formosana Maxim) and then developed diarrhea, cold sweating, and myoclonus. On physical examination, the mother had a normal consciousness level, a normal respiratory rate, and bilateral miosis. After the administration of 2 g of pralidoxime (PAM) and 0.5 mg of atropine, the mother felt better. The daughter only had mild symptoms of sweating and vomiting before arrival at the emergency department (ED)

    GANimation: anatomically-aware facial animation from a single image

    Get PDF
    The final publication is available at link.springer.comRecent advances in Generative Adversarial Networks (GANs) have shown impressive results for task of facial expression synthesis. The most successful architecture is StarGAN, that conditions GANs' generation process with images of a specific domain, namely a set of images of persons sharing the same expression. While effective, this approach can only generate a discrete number of expressions, determined by the content of the dataset. To address this limitation, in this paper, we introduce a novel GAN conditioning scheme based on Action Units (AU) annotations, which describes in a continuous manifold the anatomical facial movements defining a human expression. Our approach allows controlling the magnitude of activation of each AU and combine several of them. Additionally, we propose a fully unsupervised strategy to train the model, that only requires images annotated with their activated AUs, and exploit attention mechanisms that make our network robust to changing backgrounds and lighting conditions. Extensive evaluation show that our approach goes beyond competing conditional generators both in the capability to synthesize a much wider range of expressions ruled by anatomically feasible muscle movements, as in the capacity of dealing with images in the wild.Peer ReviewedAward-winningPostprint (author's final draft

    Rad51 Paralogs Remodel Pre-synaptic Rad51 Filaments to Stimulate Homologous Recombination

    Get PDF
    SummaryRepair of DNA double strand breaks by homologous recombination (HR) is initiated by Rad51 filament nucleation on single-stranded DNA (ssDNA), which catalyzes strand exchange with homologous duplex DNA. BRCA2 and the Rad51 paralogs are tumor suppressors and critical mediators of Rad51. To gain insight into Rad51 paralog function, we investigated a heterodimeric Rad51 paralog complex, RFS-1/RIP-1, and uncovered the molecular basis by which Rad51 paralogs promote HR. Unlike BRCA2, which nucleates RAD-51-ssDNA filaments, RFS-1/RIP-1 binds and remodels pre-synaptic filaments to a stabilized, “open,” and flexible conformation, in which the ssDNA is more accessible to nuclease digestion and RAD-51 dissociation rate is reduced. Walker box mutations in RFS-1, which abolish filament remodeling, fail to stimulate RAD-51 strand exchange activity, demonstrating that remodeling is essential for RFS-1/RIP-1 function. We propose that Rad51 paralogs stimulate HR by remodeling the Rad51 filament, priming it for strand exchange with the template duplex

    Increased entropy of signal transduction in the cancer metastasis phenotype

    Get PDF
    Studies into the statistical properties of biological networks have led to important biological insights, such as the presence of hubs and hierarchical modularity. There is also a growing interest in studying the statistical properties of networks in the context of cancer genomics. However, relatively little is known as to what network features differ between the cancer and normal cell physiologies, or between different cancer cell phenotypes. Based on the observation that frequent genomic alterations underlie a more aggressive cancer phenotype, we asked if such an effect could be detectable as an increase in the randomness of local gene expression patterns. Using a breast cancer gene expression data set and a model network of protein interactions we derive constrained weighted networks defined by a stochastic information flux matrix reflecting expression correlations between interacting proteins. Based on this stochastic matrix we propose and compute an entropy measure that quantifies the degree of randomness in the local pattern of information flux around single genes. By comparing the local entropies in the non-metastatic versus metastatic breast cancer networks, we here show that breast cancers that metastasize are characterised by a small yet significant increase in the degree of randomness of local expression patterns. We validate this result in three additional breast cancer expression data sets and demonstrate that local entropy better characterises the metastatic phenotype than other non-entropy based measures. We show that increases in entropy can be used to identify genes and signalling pathways implicated in breast cancer metastasis. Further exploration of such integrated cancer expression and protein interaction networks will therefore be a fruitful endeavour.Comment: 5 figures, 2 Supplementary Figures and Table

    Structural mechanism of synergistic activation of Aurora kinase B/C by phosphorylated INCENP

    Get PDF
    Aurora kinases B and C (AURKB/AURKC) are activated by binding to the C-terminal domain of INCENP. Full activation requires phosphorylation of two serine residues of INCENP that are conserved through evolution, although the mechanism of this activation has not been explained. Here we present crystal structures of the fully active complex of AURKC bound to INCENP, consisting of phosphorylated, activated, AURKC and INCENP phosphorylated on its TSS motif, revealing the structural and biochemical mechanism of synergistic activation of AURKC:INCENP. The structures show that TSS motif phosphorylation stabilises the kinase activation loop of AURKC. The TSS motif phosphorylations alter the substrate-binding surface consistent with a mechanism of altered kinase substrate selectivity and stabilisation of the protein complex against unfolding. We also analyse the binding of the most specific available AURKB inhibitor, BRD-7880, and demonstrate that the well-known Aurora kinase inhibitor VX-680 disrupts binding of the phosphorylated INCENP TSS motif

    Superfluid to Mott insulator transition in one, two, and three dimensions

    Full text link
    We have created one-, two-, and three-dimensional quantum gases and study the superfluid to Mott insulator transition. Measurements of the transition using Bragg spectroscopy show that the excitation spectra of the low-dimensional superfluids differ significantly from the three-dimensional case
    corecore