1,191 research outputs found

    Design and fabrication of robust broadband extreme ultraviolet multilayers

    Full text link
    The random layer thickness variations can induce a great deformation of the experimental reflection of broadband extreme ultraviolet multilayer. In order to reduce this influence of random layer thickness fluctuations, the multiobjective genetic algorithm has been improved and used in the robust design of multilayer with a broad angular bandpass. The robust multilayer with a lower sensitivity to random thickness errors have been obtained and the corresponding multilayer mirrors were fabricated. The experimental results of robust Mo/Si multilayer with a wide angular band were presented and analyzed, and the advantage of robust multilayer design was demonstrated

    Secure Tensor Decomposition Using Fully Homomorphic Encryption Scheme

    Get PDF
    As the rapidly growing volume of data are beyond the capabilities of many computing infrastructures, to securely process them on cloud has become a preferred solution which can both utilize the powerful capabilities provided by cloud and protect data privacy. This paper puts forward a new approach to securely decompose tensor, the mathematical model widely used in data-intensive applications, to a core tensor and some truncated orthogonal bases. The structured, semi-structured as well as unstructured data are all transformed to low-order sub-tensors which are then encrypted using the fully homomorphic encryption scheme. A unified high-order cipher tensor model is constructed by collecting all the cipher sub-tensors and embedding them to a base tensor space. The cipher tensor is decomposed through a proposed secure algorithm, in which the square root operations are eliminated during the Lanczos procedure. The paper makes an analysis of the secure algorithm in terms of time consumption, memory usage and decomposition accuracy. Experimental results reveals that this approach can securely decompose tensor models. With the advancement of fully homomorphic encryption scheme, the proposed secure tensor decomposition method is expected to be widely applied on cloud for privacy-preserving data processing

    Alternative splicing in the variable domain of CaMKIIβ affects the level of F-actin association in developing neurons.

    Get PDF
    The Ca(2+)/calmodulin (CaM)-dependent protein kinase II (CaMKII) β has an essential function in dendritic spines via binding to and reorganization of the actin cytoskeleton during plasticity events not shared by CaMKIIα isoform. CaMKIIβ and CaMKIIα isoforms have remarkable structural differences within the variable region. Three exons (E1, E3, and E4) are present in CaMKIIβ but not in CaMKIIα gene. Four splice variants of CaMKIIβ isoforms (CaMKIIβ, β\u27, βe and β\u27e) were discovered in embryonic and adult brains. Exons E1 (lacked in βe and β\u27e) and E4 (lacked in β\u27 and β\u27e) are subject to differential alternative splicing. We hypothesized that the sequences encoded by exons E1, E3, and/or E4 are involved in CaMKIIβ-specific bundling to the F-actin cytoskeleton. We tested the colocalization and association of these CaMKIIβ variants within an F-actin-rich structure (microspike) in CaMKIIα free embryonic day 18 (E-18) rat cortical neurons. Our results showed that CaMKIIβ and CaMKIIβ\u27 containing exon E1 displayed an association with F-actin, while CaMKIIβe and CaMKIIβ\u27e lacking E1 did not. Moreover, CaMKIIβ\u27 lacking exon E4 but having E1 showed decreased actin bindingcapacity compared to WT CaMKIIβ. This suggested E1 is required for the association between CaMKIIβ and F-actin, while E4 assists CaMKIIβ to associate with F-actin better. Thus, alternative splicing of CaMKIIβ variants in developing neurons may serve as a developmental switch for actin cytoskeleton-associated isoforms and therefore correlated with dendritic arborization and synapse formation during LTP
    corecore