686 research outputs found
Computer graphics data conditioning
Graphics data conditioning program expedites engineering analysis of flight data and ensures timely correction of measurement errors. By adding interactive computer graphic displays to existing data conditioning programs, computational results are immediately visible, enabling on-line intervention and control of computer processing
The tax-inducible actin-bundling protein fascin is crucial for release and cell-to-cell transmission of human T-cell leukemia virus type 1 (HTLV-1)
The delta-retrovirus Human T-cell leukemia virus type 1 (HTLV-1) preferentially infects CD4(+) T-cells via cell-to-cell transmission. Viruses are transmitted by polarized budding and by transfer of viral biofilms at the virological synapse (VS). Formation of the VS requires the viral Tax protein and polarization of the host cytoskeleton, however, molecular mechanisms of HTLV-1 cell-to-cell transmission remain incompletely understood. Recently, we could show Tax-dependent upregulation of the actin-bundling protein Fascin (FSCN-1) in HTLV-1-infected T-cells. Here, we report that Fascin contributes to HTLV-1 transmission. Using single-cycle replication-dependent HTLV-1 reporter vectors, we found that repression of endogenous Fascin by short hairpin RNAs and by Fascin-specific nanobodies impaired gag p19 release and cell-to-cell transmission in 293T cells. In Jurkat T-cells, Tax-induced Fascin expression enhanced virus release and Fascin-dependently augmented cell-to-cell transmission to Raji/CD4(+) B-cells. Repression of Fascin in HTLV-1-infected T-cells diminished virus release and gag p19 transfer to co-cultured T-cells. Spotting the mechanism, flow cytometry and automatic image analysis showed that Tax-induced T-cell conjugate formation occurred Fascin-independently. However, adhesion of HTLV-1-infected MT-2 cells in co-culture with Jurkat T-cells was reduced upon knockdown of Fascin, suggesting that Fascin contributes to dissemination of infected T-cells. Imaging of chronically infected MS9 T-cells in co-culture with Jurkat T-cells revealed that Fascin's localization at tight cell-cell contacts is accompanied by gag polarization suggesting that Fascin directly affects the distribution of gag to budding sites, and therefore, indirectly viral transmission. In detail, we found gag clusters that are interspersed with Fascin clusters, suggesting that Fascin makes room for gag in viral biofilms. Moreover, we observed short, Fascin-containing membrane extensions surrounding gag clusters and clutching uninfected T-cells. Finally, we detected Fascin and gag in long-distance cellular protrusions. Taken together, we show for the first time that HTLV-1 usurps the host cell factor Fascin to foster virus release and cell-to-cell transmission
Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols
We define a sequent calculus to formally specify, simulate, debug and verify security protocols. In our sequents we distinguish between the current knowledge of principals and the current global state of the session. Hereby, we can describe the operational semantics of principals and of an intruder in a simple and modular way. Furthermore, using proof theoretic tools like the analysis of permutability of rules, we are able to find efficient proof strategies that we prove complete for special classes of security protocols including Needham-Schroeder. Based on the results of this preliminary analysis, we have implemented a Prolog meta-interpreter which allows for rapid prototyping and for checking safety properties of security protocols, and we have applied it for finding error traces and proving correctness of practical examples
Milk Transmission of HTLV-1 and the Need for Innovative Prevention Strategies
Breastfeeding is recommended by the World Health Organization for at least 6 months up to 2 years of age, and breast milk protects against several diseases and infections. Intriguingly, few viruses are transmitted via breastfeeding including Human T-cell leukemia virus Type 1 (HTLV-1). HTLV-1 is a highly oncogenic yet neglected retrovirus, which primarily infects CD4+ T-cells in vivo and causes incurable diseases like HTLV-1-associated inflammatory conditions or Adult T-cell leukemia/lymphoma (ATLL) after lifelong viral persistence. Worldwide, at least 5–10 million people are HTLV-1-infected and most of them are unaware of their infection posing the risk of silent transmissions. HTLV-1 is transmitted via cell-containing body fluids such as blood products, semen, and breast milk, which constitutes the major route of mother-to-child transmission (MTCT). Risk of transmission increases with the duration of breastfeeding, however, abstinence from breastfeeding as it is recommended in some endemic countries is not an option in resource-limited settings or underrepresented areas and populations. Despite significant progress in understanding details of HTLV-1 cell-to-cell transmission, it is still not fully understood, which cells in which organs get infected via the oral route, how these cells get infected, how breast milk affects this route of infection and how to inhibit oral transmission despite breastfeeding, which is an urgent need especially in underrepresented areas of the world. Here, we review these questions and provide an outlook how future research could help to uncover prevention strategies that might ultimately allow infants to benefit from breastfeeding while reducing the risk of HTLV-1 transmission
CAPSL and MuCAPSL, Journal of Telecommunications and Information Technology, 2002, nr 4
Secure communication generally begins with a connection establishment phase in which messages are exchanged by client and server protocol software to generate, share, and use secret data or keys. This message exchange is referred to as an authentication or key distribution cryptographic protocol. CAPSL is a formal language for specifying cryptographic protocols. It is also useful for addressing the correctness of the protocols on an abstract level, rather than the strength of the underlying cryptographic algorithms. We outline the design principles of CAPSL and its integrated specification and analysis environment. Protocols for secure group management are essential in applications that are concerned with confidential authenticated communication among coalition members, authenticated group decisions, or the secure administration of group membership and access control. We will also discuss our progress on designing a new extension of CAPSL for multicast protocols, called MuCAPSL
An Obesity Dietary Quality Index Predicts Abdominal Obesity in Women: Potential Opportunity for New Prevention and Treatment Paradigms
Background. Links between dietary quality and abdominal obesity are poorly understood. Objective. To examine the association between an obesity-specific dietary quality index and abdominal obesity risk in women.
Methods. Over 12 years, we followed 288 Framingham Offspring/Spouse Study women, aged 30–69 years, without metabolic syndrome risk factors, cardiovascular disease, cancer, or diabetes at baseline. An 11-nutrient obesity-specific dietary quality index was derived using mean ranks of nutrient intakes from 3-day dietary records. Abdominal obesity (waist circumference >88 cm) was assessed during follow-up.
Results. Using multiple logistic regression, women with poorer dietary quality were more likely to develop abdominal obesity compared to those with higher dietary quality (OR 1.87; 95% CI, 1.01, 3.47; P for trend = .048) independent of age, physical activity, smoking, and menopausal status.
Conclusions. An obesity-specific dietary quality index predicted abdominal obesity in women, suggesting targets for dietary quality assessment, intervention, and treatment to address abdominal adiposity
Brownian Carnot engine
The Carnot cycle imposes a fundamental upper limit to the efficiency of a
macroscopic motor operating between two thermal baths. However, this bound
needs to be reinterpreted at microscopic scales, where molecular bio-motors and
some artificial micro-engines operate. As described by stochastic
thermodynamics, energy transfers in microscopic systems are random and thermal
fluctuations induce transient decreases of entropy, allowing for possible
violations of the Carnot limit. Despite its potential relevance for the
development of a thermodynamics of small systems, an experimental study of
microscopic Carnot engines is still lacking. Here we report on an experimental
realization of a Carnot engine with a single optically trapped Brownian
particle as working substance. We present an exhaustive study of the energetics
of the engine and analyze the fluctuations of the finite-time efficiency,
showing that the Carnot bound can be surpassed for a small number of
non-equilibrium cycles. As its macroscopic counterpart, the energetics of our
Carnot device exhibits basic properties that one would expect to observe in any
microscopic energy transducer operating with baths at different temperatures.
Our results characterize the sources of irreversibility in the engine and the
statistical properties of the efficiency -an insight that could inspire novel
strategies in the design of efficient nano-motors.Comment: 7 pages, 7 figure
The Space Station Flight Telerobotic Servicer and the human
The Space Station Flight Telerobotic Servicer (FTS) and its human-machine interaction issues are described. Included is a discussion of the FTS strawman concept and the FTS workstation human factor issues
Security Theorems via Model Theory
A model-theoretic approach can establish security theorems for cryptographic
protocols. Formulas expressing authentication and non-disclosure properties of
protocols have a special form. They are quantified implications for all xs .
(phi implies for some ys . psi). Models (interpretations) for these formulas
are *skeletons*, partially ordered structures consisting of a number of local
protocol behaviors. Realized skeletons contain enough local sessions to explain
all the behavior, when combined with some possible adversary behaviors. We show
two results. (1) If phi is the antecedent of a security goal, then there is a
skeleton A_phi such that, for every skeleton B, phi is satisfied in B iff there
is a homomorphism from A_phi to B. (2) A protocol enforces for all xs . (phi
implies for some ys . psi) iff every realized homomorphic image of A_phi
satisfies psi. Hence, to verify a security goal, one can use the Cryptographic
Protocol Shapes Analyzer CPSA (TACAS, 2007) to identify minimal realized
skeletons, or "shapes," that are homomorphic images of A_phi. If psi holds in
each of these shapes, then the goal holds
- …