709 research outputs found

    Intermediate progenitors support migration of neural stem cells into dentate gyrus outer neurogenic niches.

    Get PDF
    The hippocampal dentate gyrus (DG) is a unique brain region maintaining neural stem cells (NCSs) and neurogenesis into adulthood. We used multiphoton imaging to visualize genetically defined progenitor subpopulations in live slices across key stages of mouse DG development, testing decades old static models of DG formation with molecular identification, genetic-lineage tracing, and mutant analyses. We found novel progenitor migrations, timings, dynamic cell-cell interactions, signaling activities, and routes underlie mosaic DG formation. Intermediate progenitors (IPs, Tbr2+) pioneered migrations, supporting and guiding later emigrating NSCs (Sox9+) through multiple transient zones prior to converging at the nascent outer adult niche in a dynamic settling process, generating all prenatal and postnatal granule neurons in defined spatiotemporal order. IPs (Dll1+) extensively targeted contacts to mitotic NSCs (Notch active), revealing a substrate for cell-cell contact support during migrations, a developmental feature maintained in adults. Mouse DG formation shares conserved features of human neocortical expansion

    Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols

    Get PDF
    We define a sequent calculus to formally specify, simulate, debug and verify security protocols. In our sequents we distinguish between the current knowledge of principals and the current global state of the session. Hereby, we can describe the operational semantics of principals and of an intruder in a simple and modular way. Furthermore, using proof theoretic tools like the analysis of permutability of rules, we are able to find efficient proof strategies that we prove complete for special classes of security protocols including Needham-Schroeder. Based on the results of this preliminary analysis, we have implemented a Prolog meta-interpreter which allows for rapid prototyping and for checking safety properties of security protocols, and we have applied it for finding error traces and proving correctness of practical examples

    Dynamics of levitated nanospheres: towards the strong coupling regime

    Get PDF
    The use of levitated nanospheres represents a new paradigm for the optomechanical cooling of a small mechanical oscillator, with the prospect of realising quantum oscillators with unprecedentedly high quality factors. We investigate the dynamics of this system, especially in the so-called self-trapping regimes, where one or more optical fields simultaneously trap and cool the mechanical oscillator. The determining characteristic of this regime is that both the mechanical frequency ωM\omega_M and single-photon optomechanical coupling strength parameters gg are a function of the optical field intensities, in contrast to usual set-ups where ωM\omega_M and gg are constant for the given system. We also measure the characteristic transverse and axial trapping frequencies of different sized silica nanospheres in a simple optical standing wave potential, for spheres of radii r=20500r=20-500\,nm, illustrating a protocol for loading single nanospheres into a standing wave optical trap that would be formed by an optical cavity. We use this data to confirm the dependence of the effective optomechanical coupling strength on sphere radius for levitated nanospheres in an optical cavity and discuss the prospects for reaching regimes of strong light-matter coupling. Theoretical semiclassical and quantum displacement noise spectra show that for larger nanospheres with r100r \gtrsim 100\,nm a range of interesting and novel dynamical regimes can be accessed. These include simultaneous hybridization of the two optical modes with the mechanical modes and parameter regimes where the system is bistable. We show that here, in contrast to typical single-optical mode optomechanical systems, bistabilities are independent of intracavity intensity and can occur for very weak laser driving amplitudes

    Deduction with XOR Constraints in Security API Modelling

    Get PDF
    We introduce XOR constraints, and show how they enable a theorem prover to reason effectively about security critical subsystems which employ bitwise XOR. Our primary case study is the API of the IBM 4758 hardware security module. We also show how our technique can be applied to standard security protocols

    Negotiating professional and social voices in research principles and practice

    Get PDF
    This paper draws on work conducted for a qualitative interview based study which explores the gendered racialised and professional identifications of health and social care professionals. Participants for the project were drawn from the professional executive committees of recently formed Primary Care Trusts. The paper discusses how the feminist psychosocial methodological approach developed for the project is theoretically, practically and ethically useful in exploring the voices of those in positions of relative power in relation to both health and social care services and the social relations of gender and ethnicity. The approach draws on psychodynamic accounts of (defended) subjectivity and the feminist work of Carol Gilligan on a voice-centred relational methodology. Coupling the feminist with the psychosocial facilitates an emphasis on voice and dialogic communication between participant and researcher not always captured in psychosocial approaches which tend towards favouring the interviewer as ‘good listener’. This emphasis on dialogue is important in research contexts where prior and ongoing relationships with professional participants make it difficult and indeed undesirable for researchers to maintain silence

    Implementing digital resources for clinicians' and patients' varying needs.

    Get PDF
    This paper presents an overview of several evidence-based medicine and patient information studies conducted across the UK health service over a 4 year period, investigating clinicians', managers', and patients' perceptions of digital resources (primarily digital libraries) in hospitals, Primary Care Trusts, NHS Direct (patient call centre) and patient groups. In-depth interviews and focus groups are analysed using grounded theory methodologies and through content analysis used to produce quantitative finding. The perceived impacts of three different methods employed for delivering health informatics are presented. The findings highlight some generic issues relevant for health informatics in the UK health sector as well as some specific issues for medical digital libraries. This paper reviews in more detail the issues of medical technology implementation (traditional implementation, on the wards, and intermediaries within in communities). A breakdown of the clinicians' and patients' information journey (information initiation, facilitation and interpretation) is also presented with regard to medical digital libraries and online resources. Broad guidelines derived from these findings are provided for health-informatics deployment
    corecore