1,671 research outputs found

    Local and global spontaneous calcium events regulate neurite outgrowth and onset of GABAergic phenotype during neural precursor differentiation

    Get PDF
    Neural stem cells can generate in vitro progenitors of the three main cell lineages found in the CNS. The signaling pathways underlying the acquisition of differentiated phenotypes in these cells are poorly understood. Here we tested the hypothesis that Ca2+ signaling controls differentiation of neural precursors. We found low-frequency global and local Ca2+ transients occurring predominantly during early stages of differentiation. Spontaneous Ca2+ signals in individual precursors were not synchronized with Ca2+ transients in surrounding cells. Experimentally induced changes in the frequency of local Ca2+signals and global Ca2+ rises correlated positively with neurite outgrowth and the onset of GABAergic neurotransmitter phenotype, respectively. NMDA receptor activity was critical for alterations in neuronal morphology but not for the timing of the acquisition of the neurotransmitter phenotype. Thus, spontaneous Ca2+ signals are an intrinsic property of differentiating neurosphere-derived precursors. Their frequency may specify neuronal morphology and acquisition of neurotransmitter phenotype

    Multidimensional Scaling of Varietal Data in Sedimentary Provenance Analysis

    Get PDF
    Varietal studies of sedimentary provenance use the properties of individual minerals or mineral groups. These are recorded as lists of numerical tables that can be difficult to interpret. Multidimensional Scaling (MDS) is a popular multivariate ordination technique for analyzing other types of provenance data based on, for example, detrital geochronology or petrography. Applying MDS to varietal data would allow them to be treated on an equal footing with those other provenance proxies. MDS requires a method to quantify the dissimilarity between two samples. This paper introduces three ways to do so. The first method (“treatment-by-row”) turns lists of (compositional) data tables into lists of vectors, using principal component analysis. These lists of vectors can then be treated as “distributional” data and subjected to MDS analysis using dissimilarity measures such as the Kolmogorov-Smirnov statistic. The second method (“treatment-by-column”) turns lists of compositional data tables into multiple lists of vectors, each representing a single component of the varietal data. These multiple distributional data sets are subsequently subjected to Procrustes analysis or 3-way MDS. The third method uses the Wasserstein-2 distance to jointly compare the rows and columns of varietal data. This arguably makes the best use of the data but acts more like a “black box” than the other two methods. Applying the three methods to a detrital titanite data set from Colombia yields similar results. After converting varietal data to dissimilarity matrices, they can be combined with other types of provenance data, again using Procrustes analysis or 3-way MDS

    TrustShadow: Secure Execution of Unmodified Applications with ARM TrustZone

    Full text link
    The rapid evolution of Internet-of-Things (IoT) technologies has led to an emerging need to make it smarter. A variety of applications now run simultaneously on an ARM-based processor. For example, devices on the edge of the Internet are provided with higher horsepower to be entrusted with storing, processing and analyzing data collected from IoT devices. This significantly improves efficiency and reduces the amount of data that needs to be transported to the cloud for data processing, analysis and storage. However, commodity OSes are prone to compromise. Once they are exploited, attackers can access the data on these devices. Since the data stored and processed on the devices can be sensitive, left untackled, this is particularly disconcerting. In this paper, we propose a new system, TrustShadow that shields legacy applications from untrusted OSes. TrustShadow takes advantage of ARM TrustZone technology and partitions resources into the secure and normal worlds. In the secure world, TrustShadow constructs a trusted execution environment for security-critical applications. This trusted environment is maintained by a lightweight runtime system that coordinates the communication between applications and the ordinary OS running in the normal world. The runtime system does not provide system services itself. Rather, it forwards requests for system services to the ordinary OS, and verifies the correctness of the responses. To demonstrate the efficiency of this design, we prototyped TrustShadow on a real chip board with ARM TrustZone support, and evaluated its performance using both microbenchmarks and real-world applications. We showed TrustShadow introduces only negligible overhead to real-world applications.Comment: MobiSys 201

    Comment on ``Reduction of static field equation of Faddeev model to first order PDE'', arXiv:0707.2207

    Get PDF
    The authors of the article Phys. Lett. B 652 (2007) 384, (arXiv:0707.2207), propose an interesting method to solve the Faddeev model by reducing it to a set of first order PDEs. They first construct a vectorial quantity α\bm \alpha , depending on the original field and its first derivatives, in terms of which the field equations reduce to a linear first order equation. Then they find vectors α1\bm \alpha_1 and α2\bm \alpha_2 which identically obey this linear first order equation. The last step consists in the identification of the αi\bm \alpha_i with the original α\bm \alpha as a function of the original field. Unfortunately, the derivation of this last step in the paper cited above contains an error which invalidates most of its results

    Detection of triplex PCR for the modified qualitative soybean and maize genetically

    Get PDF
    A molecular screening method based on multiplex PCR that involves amplification of specific soybean or maize sequences from plant DNA (lectin or zein) and the amplification of 35S promoter and NOS terminator,for the detection of genetically modified soybean and maize was developed. The new method is proposed,for the simulicmeous cletcctimt of tree genetic elements in the.same run as reliable method for rapid detection of genetically, modified plants with sensitivity of 0.1%
    • …
    corecore