1,221 research outputs found

    Extendibility and stable extendibility of normal bundles associated to immersions of real projective spaces

    Full text link

    Lung inflammation by fungus, Bjerkandera adusta isolated from Asian sand dust (ASD) aerosol and enhancement of ovalbumin-induced lung eosinophilia by ASD and the fungus in mice.

    Get PDF
    BackgroundBjerkandera adusta (B. adusta) is one of the most important etiological fungi associated with chronic cough. However, precise details of the inflammatory response to exposure are not well understood yet. B. adusta was recently identified in Asian sand dust (ASD) aerosol. Therefore, in the present study the exacerbating effects of ASD on B. adusta-induced lung inflammation and B. adusta + ASD on ovalbumin (OVA)-induced murine lung eosinophilia were investigated using experimental mice.MethodsIn order to prepare testing samples, B. adusta obtained from ASD aerosol was inactivated by formalin and ASD collected from the atmosphere was heated to remove toxic organic substances (H-ASD). CD-1 mice were instilled intratracheally with 12 different samples prepared with various combinations of B. adusta, H-ASD, and OVA in a normal saline solution. The lung pathology, cytological profiles in bronchoalveolar lavage fluid (BALF), and the levels of inflammatory cytokines/chemokines in BALF were investigated.ResultsH-ASD aggravated the lung eosinophilia induced by B. adusta alone, which also aggravated the lung eosinophilia induced by OVA. The mixture of OVA, H-ASD, and B. adusta caused serious fibrous thickening of the subepithelial layer, eosinophil infiltration, and proliferation of goblet cells in the airways along with remarkable increases of IL-13, eotaxin, IL-5, and MCP-3 in BALF.ConclusionsThe results of the present study demonstrated that B. adusta isolated from ASD aerosol induces allergic lung diseases. H-ASD enhanced allergic reactions caused by OVA or B. adusta. A mixture of B. adusta, H-ASD, and OVA caused the most remarkable exacerbation to the allergic airway inflammation via remarkable increases of pro-inflammatory mediators

    Randomness Bounds for Private Simultaneous Messages and Conditional Disclosure of Secrets

    Get PDF
    In cryptography, the private simultaneous messages (PSM) and conditional disclosure of secrets (CDS) are closely related fundamental primitives. We consider kk-party PSM and CDS protocols for a function ff with a ρ\rho-bit common random string, where each party PiP_i generates an λi\lambda_i-bit message (i[k]i\in[k]), and sends it to a referee P0P_0. We consider bounds for the optimal length ρ\rho of the common random string among kk parties (or, randomness complexity) in PSM and CDS protocols with perfect and statistical privacy through combinatorial and entropic arguments. (ii) We provide general connections from the optimal total length λ=i[k]λi\lambda = \sum_{i\in[k]}\lambda_i of the messages (or, communication complexity) to the randomness complexity ρ\rho. (iiii) We also prove randomness lower bounds in PSM and CDS protocols for general functions. (iiiiii) We further prove randomness lower bounds for several important explicit functions. They contain the following results: For PSM protocols with perfect privacy, we prove ρλ1\rho\ge \lambda-1 and ρλ\rho\le \lambda as the general connection. To prove the upper bound, we provide a new technique for randomness sparsification for perfect privacy, which would be of independent interest. From the general connection, we prove ρ2(k1)n1\rho\ge 2^{(k-1)n}-1 for a general function f:({0,1}n)k{0,1}f:(\{0,1\}^n)^k\rightarrow\{0,1\} under universal reconstruction, in which P0P_0 is independent of ff. This implies that the Feige-Killian-Naor protocol for a general function [Proc. STOC \u2794, pp.554-563] is optimal with respect to randomness complexity. We also provide a randomness lower bound ρ>kn2\rho> kn-2 for a generalized inner product function. This implies the optimality of the 22-party PSM protocol for the inner-product function of Liu, Vaikuntanathan, and Wee [Proc.~CRYPTO 2017, pp.758--790]. For CDS protocols with perfect privacy, we show ρλσ\rho\ge\lambda-\sigma and ρλ\rho\le\lambda as the general connection by similar arguments to those for PSM protocols, where σ\sigma is the length of secrets. We also obtain randomness lower bounds ρ(k1)σ\rho\ge (k-1)\sigma for XOR, AND, and generalized inner product functions. These imply the optimality of Applebaum and Arkis\u27s kk-party CDS protocol for a general function [Proc. TCC 2018, pp.317-344]\ up to a constant factor in a large kk

    Flaws in a Verifiably Multiplicative Secret Sharing Scheme from ICITS 2017

    Get PDF
    In this paper, we point out flaws in an existing verifiably multiplicative secret sharing (VMSS) scheme. Namely, we show that a scheme proposed by Yoshida and Obana presented at ICITS 2017 is insecure against an adversary who corrupts a single player. We then show that in the model of ICITS 2017 which restricts the decoder additive, the error-free verification is impossible. We further show that by allowing a general class of decoders which include a linear one, the scheme is error-free

    Generation of Seed Magnetic Field around First Stars: the Biermann Battery Effect

    Full text link
    We investigate generation processes of magnetic fields around first stars. Since the first stars are expected to form anisotropic ionization fronts in the surrounding clumpy media, magnetic fields are generated by effects of radiation force as well as the Biermann battery effect. We have calculated the amplitude of magnetic field generated by the effects of radiation force around the first stars in the preceding paper, in which the Biermann battery effects are not taken into account.In this paper, we calculate the generation of magnetic fields by the Biermann battery effect as well as the effects of radiation force, utilizing the radiation hydrodynamics simulations. As a result, we find that the generated magnetic field strengths are ~ 10^{-19}G-10^{-17}G at ~ 100pc-1kpc scale mainly by the Biermann battery, which is an order of magnitude larger than the results of our previous study. We also find that this result is insensitive to various physical parameters including the mass of the source star, distance between the source and the dense clump, unless we take unlikely values of these parameters.Comment: 19 pages, 7 figures, Accepted for publications in Ap

    Spontaneous esophageal perforation within a hiatal hernia : A case report

    Get PDF
    Introduction: Spontaneous esophageal perforation, also commonly referred to as Boerhaave's syndrome, is one of the most lethal diseases causing an acute abdomen. Though rare, emergent surgical intervention is often required and management can be various based upon the site of the perforation. This literature has been written in line with the SCARE criteria (Agha et al., 2020) [1]. Presentation of case: A 76-year-old man presented with acute abdominal pain. Computed tomography (CT) revealed and an emergent esophagogastroduodenoscopy (EGD) was performed carefully, which revealed a 7 cm all-layer esophageal laceration in the left lower esophageal wall. In our case, a hiatal hernia was protruding into the mediastinum, and the perforation site was inside of it, but there was no invasion into the thoracic cavity, thus a transabdominal approach was performed without thoracotomy. Discussion: This type of esophageal perforation within a hiatal hernia is quite rare and provides a unique clinical challenge. In addition, A review reported the average length of spontaneous esophageal perforation to be around 2 cm while our case had a perforation with a length of 7 cm. We chose the combination of the simple suture with omental buttress and wide drainage, but a complete fundoplication was impossible due to its large size of perforation. Conclusion: We chose the open abdominal approach because the case had high inflammation, a hiatal hernia and possibility of retro-gastric perforation. However, MIS should have been considered first if a situation or human resources allow it

    N-cadherin expression in head and neck cancer

    Get PDF
    The loss of E-cadherin and the gain of N-cadherin expression are known as “cadherin switching”. Cadherin switching is a major hallmark of epithelial-mesenchymal transition (EMT). EMT is a crucial process in cancer progression, providing cancer cells with the ability to escape from the primary focus, to invade stromal tissues and to migrate to distant regions. Although down-regulation of E-cadherin is well known in various cancers, there are a few studies on N-cadherin expression in cancer. Here, therefore, we investigated whether N-cadherin expression was associated with the progression of head and neck squamous cell carcinoma (HNSCC). First, we examined the expression of N-cadherin by immunohistochemistry and its correlation with clinico-pathological findings. High expression of N-cadherin was observed in 52 of 80 HNSCC cases and was significantly correlated with malignant behaviors. Next, we examined the correlation between N-cadherin and E-cadherin. Cadherin switching (high expression of N-cadherin and low expression of E-cadherin) was found in 30 of 80 HNSCC cases and was well correlated with histological differentiation, pattern of invasion and lymph node metastasis in HNSCC cases. Moreover, we examined the expression of N-cadherin and E-cadherin by RT-PCR in 16 HNSCC cell lines to confirm the immunohistochemical findings. N-cadherin expression was observed in 7 of 16 HNSCC cells, and cadherin switching was observed in 2 HNSCC cells. Interestingly, HNSCC cells with cadherin switching have EMT features. In conclusion, we suggest that i) N-cadherin may play an important role in malignant behaviors of HNSCC, and ii) cadherin switching might be considered as a discrete critical event in EMT and metastatic potential of HNSCC
    corecore