2,165 research outputs found

    Can MRI measure myelin? Systematic review, qualitative assessment, and meta-analysis of studies validating microstructural imaging with myelin histology

    Get PDF
    Recent years have seen an increased understanding of the importance of myelination in healthy brain function and neuropsychiatric diseases. Non-invasive microstructural magnetic resonance imaging (MRI) holds the potential to expand and translate these insights to basic and clinical human research, but the sensitivity and specificity of different MR markers to myelination is a subject of debate. To consolidate current knowledge on the topic, we perform a systematic review and meta-analysis of studies that validate microstructural imaging by combining it with myelin histology. We find meta-analytic evidence for correlations between various myelin histology metrics and markers from different MRI modalities, including fractional anisotropy, radial diffusivity, macromolecular pool, magnetization transfer ratio, susceptibility and longitudinal relaxation rate, but not mean diffusivity. Meta-analytic correlation effect sizes range widely, between = 0.26 and = 0.82. However, formal comparisons between MRI-based myelin markers are limited by methodological variability, inconsistent reporting and potential for publication bias, thus preventing the establishment of a single most sensitive strategy to measure myelin with MRI. To facilitate further progress, we provide a detailed characterisation of the evaluated studies as an online resource. We also share a set of 12 recommendations for future studies validating putative MR-based myelin markers and deploying them in vivo in humans

    Comment on ``Reduction of static field equation of Faddeev model to first order PDE'', arXiv:0707.2207

    Get PDF
    The authors of the article Phys. Lett. B 652 (2007) 384, (arXiv:0707.2207), propose an interesting method to solve the Faddeev model by reducing it to a set of first order PDEs. They first construct a vectorial quantity α\bm \alpha , depending on the original field and its first derivatives, in terms of which the field equations reduce to a linear first order equation. Then they find vectors α1\bm \alpha_1 and α2\bm \alpha_2 which identically obey this linear first order equation. The last step consists in the identification of the αi\bm \alpha_i with the original α\bm \alpha as a function of the original field. Unfortunately, the derivation of this last step in the paper cited above contains an error which invalidates most of its results

    TrustShadow: Secure Execution of Unmodified Applications with ARM TrustZone

    Full text link
    The rapid evolution of Internet-of-Things (IoT) technologies has led to an emerging need to make it smarter. A variety of applications now run simultaneously on an ARM-based processor. For example, devices on the edge of the Internet are provided with higher horsepower to be entrusted with storing, processing and analyzing data collected from IoT devices. This significantly improves efficiency and reduces the amount of data that needs to be transported to the cloud for data processing, analysis and storage. However, commodity OSes are prone to compromise. Once they are exploited, attackers can access the data on these devices. Since the data stored and processed on the devices can be sensitive, left untackled, this is particularly disconcerting. In this paper, we propose a new system, TrustShadow that shields legacy applications from untrusted OSes. TrustShadow takes advantage of ARM TrustZone technology and partitions resources into the secure and normal worlds. In the secure world, TrustShadow constructs a trusted execution environment for security-critical applications. This trusted environment is maintained by a lightweight runtime system that coordinates the communication between applications and the ordinary OS running in the normal world. The runtime system does not provide system services itself. Rather, it forwards requests for system services to the ordinary OS, and verifies the correctness of the responses. To demonstrate the efficiency of this design, we prototyped TrustShadow on a real chip board with ARM TrustZone support, and evaluated its performance using both microbenchmarks and real-world applications. We showed TrustShadow introduces only negligible overhead to real-world applications.Comment: MobiSys 201

    Detection of triplex PCR for the modified qualitative soybean and maize genetically

    Get PDF
    A molecular screening method based on multiplex PCR that involves amplification of specific soybean or maize sequences from plant DNA (lectin or zein) and the amplification of 35S promoter and NOS terminator,for the detection of genetically modified soybean and maize was developed. The new method is proposed,for the simulicmeous cletcctimt of tree genetic elements in the.same run as reliable method for rapid detection of genetically, modified plants with sensitivity of 0.1%

    Mapping the Nephron Exercise Incorporates Multiple Learning Strategies

    Get PDF
    Introduction: Understanding the location and action of nephron transporters and channels is important to the understanding of renal function. As each region of the nephron is unique in its inclusion of specific transporters and channels, mapping of the nephron is an effective first step in understanding overall nephron processing. We describe a small-group, active-learning exercise that facilitates students' ability to understand renal processing within each region of the nephron. Methods: Following an overview lecture on renal transporters and channels, small groups of students worked cooperatively to map the nephron. This 2-hour, collaborative exercise was developed to reinforce key concepts in renal processing of ions and nutrients and, at the same time, utilize effective learning strategies. Learning strategies incorporated in this exercise include small-group collaboration, peer teaching, retrieval practice using an audience response system, and elaboration through discussion. Results: Written examination was used to assess student understanding. Students demonstrated higher performance on a subset of questions related to this learning activity compared to the overall exam. Highly positive feedback was provided by a convenience sample of students completing an anonymous survey. Discussion: This nephron-mapping exercise was an effective means to promote synthesis and analysis of lecture content and engage students in methods that enhance learning

    CCR7 is required for the in vivo function of CD4+ CD25+ regulatory T cells

    Get PDF
    CCR7-mediated migration of naive T cells into the secondary lymphoid organs is a prerequisite for their encounter with mature dendritic cells, the productive presentation of cognate antigen, and consequent T cell proliferation and effector differentiation. Therefore, CCR7 was suggested to play an important role in the initiation of adaptive immune responses. In this study, we show that primary immunity can also develop in the absence of CCR7. Moreover, CCR7-deficient knockout (KO) mice display augmented immune responses. Our data cumulatively suggest that enhanced immunity in CCR7 KO mice is caused by the defective lymph node (LN) positioning of FoxP3(+) CD4(+) CD25(+) regulatory T cells (T reg cells) and the consequent impediment of their function. The FoxP3(+) T reg cells express CCR7 and, after their adoptive transfer, migrate into the LNs of wild-type mice. Here, they proliferate in situ upon antigen stimulation and inhibit the generation of antigen-specific T cells. Conversely, transferred CCR7-deficient T reg cells fail to migrate into the LNs and suppress antigen-induced T cell responses. The transfer of combinations of naive and T reg cells from wild-type and CCR7 KO mice into syngeneic severe combined immunodeficient mice directly demonstrates that CCR7-deficient T reg cells are less effective than their wild-type counterparts in preventing the development of inflammatory bowel diseas

    Inside Out: Detecting Learners' Confusion to Improve Interactive Digital Learning Environments

    Get PDF
    Confusion is an emotion that is likely to occur while learning complex information. This emotion can be beneficial to learners in that it can foster engagement, leading to deeper understanding. However, if learners fail to resolve confusion, its effect can be detrimental to learning. Such detrimental learning experiences are particularly concerning within digital learning environments (DLEs), where a teacher is not physically present to monitor learner engagement and adapt the learning experience accordingly. However, with better information about a learner's emotion and behavior, it is possible to improve the design of interactive DLEs (IDLEs) not only in promoting productive confusion but also in preventing overwhelming confusion. This article reviews different methodological approaches for detecting confusion, such as self-report and behavioral and physiological measures, and discusses their implications within the theoretical framework of a zone of optimal confusion. The specificities of several methodologies and their potential application in IDLEs are discussed

    The subjective experience of habit captured by self-report indexes may lead to inaccuracies in the measurement of habitual action

    Get PDF
    Commentary on Gardner, B. (2014). A review and analysis of the use of ‘habit’ inunderstanding, predicting and influencing health-related behaviour
    • …
    corecore