686 research outputs found

    Computer graphics data conditioning

    Get PDF
    Graphics data conditioning program expedites engineering analysis of flight data and ensures timely correction of measurement errors. By adding interactive computer graphic displays to existing data conditioning programs, computational results are immediately visible, enabling on-line intervention and control of computer processing

    The tax-inducible actin-bundling protein fascin is crucial for release and cell-to-cell transmission of human T-cell leukemia virus type 1 (HTLV-1)

    Get PDF
    The delta-retrovirus Human T-cell leukemia virus type 1 (HTLV-1) preferentially infects CD4(+) T-cells via cell-to-cell transmission. Viruses are transmitted by polarized budding and by transfer of viral biofilms at the virological synapse (VS). Formation of the VS requires the viral Tax protein and polarization of the host cytoskeleton, however, molecular mechanisms of HTLV-1 cell-to-cell transmission remain incompletely understood. Recently, we could show Tax-dependent upregulation of the actin-bundling protein Fascin (FSCN-1) in HTLV-1-infected T-cells. Here, we report that Fascin contributes to HTLV-1 transmission. Using single-cycle replication-dependent HTLV-1 reporter vectors, we found that repression of endogenous Fascin by short hairpin RNAs and by Fascin-specific nanobodies impaired gag p19 release and cell-to-cell transmission in 293T cells. In Jurkat T-cells, Tax-induced Fascin expression enhanced virus release and Fascin-dependently augmented cell-to-cell transmission to Raji/CD4(+) B-cells. Repression of Fascin in HTLV-1-infected T-cells diminished virus release and gag p19 transfer to co-cultured T-cells. Spotting the mechanism, flow cytometry and automatic image analysis showed that Tax-induced T-cell conjugate formation occurred Fascin-independently. However, adhesion of HTLV-1-infected MT-2 cells in co-culture with Jurkat T-cells was reduced upon knockdown of Fascin, suggesting that Fascin contributes to dissemination of infected T-cells. Imaging of chronically infected MS9 T-cells in co-culture with Jurkat T-cells revealed that Fascin's localization at tight cell-cell contacts is accompanied by gag polarization suggesting that Fascin directly affects the distribution of gag to budding sites, and therefore, indirectly viral transmission. In detail, we found gag clusters that are interspersed with Fascin clusters, suggesting that Fascin makes room for gag in viral biofilms. Moreover, we observed short, Fascin-containing membrane extensions surrounding gag clusters and clutching uninfected T-cells. Finally, we detected Fascin and gag in long-distance cellular protrusions. Taken together, we show for the first time that HTLV-1 usurps the host cell factor Fascin to foster virus release and cell-to-cell transmission

    Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols

    Get PDF
    We define a sequent calculus to formally specify, simulate, debug and verify security protocols. In our sequents we distinguish between the current knowledge of principals and the current global state of the session. Hereby, we can describe the operational semantics of principals and of an intruder in a simple and modular way. Furthermore, using proof theoretic tools like the analysis of permutability of rules, we are able to find efficient proof strategies that we prove complete for special classes of security protocols including Needham-Schroeder. Based on the results of this preliminary analysis, we have implemented a Prolog meta-interpreter which allows for rapid prototyping and for checking safety properties of security protocols, and we have applied it for finding error traces and proving correctness of practical examples

    Milk Transmission of HTLV-1 and the Need for Innovative Prevention Strategies

    Get PDF
    Breastfeeding is recommended by the World Health Organization for at least 6 months up to 2 years of age, and breast milk protects against several diseases and infections. Intriguingly, few viruses are transmitted via breastfeeding including Human T-cell leukemia virus Type 1 (HTLV-1). HTLV-1 is a highly oncogenic yet neglected retrovirus, which primarily infects CD4+ T-cells in vivo and causes incurable diseases like HTLV-1-associated inflammatory conditions or Adult T-cell leukemia/lymphoma (ATLL) after lifelong viral persistence. Worldwide, at least 5–10 million people are HTLV-1-infected and most of them are unaware of their infection posing the risk of silent transmissions. HTLV-1 is transmitted via cell-containing body fluids such as blood products, semen, and breast milk, which constitutes the major route of mother-to-child transmission (MTCT). Risk of transmission increases with the duration of breastfeeding, however, abstinence from breastfeeding as it is recommended in some endemic countries is not an option in resource-limited settings or underrepresented areas and populations. Despite significant progress in understanding details of HTLV-1 cell-to-cell transmission, it is still not fully understood, which cells in which organs get infected via the oral route, how these cells get infected, how breast milk affects this route of infection and how to inhibit oral transmission despite breastfeeding, which is an urgent need especially in underrepresented areas of the world. Here, we review these questions and provide an outlook how future research could help to uncover prevention strategies that might ultimately allow infants to benefit from breastfeeding while reducing the risk of HTLV-1 transmission

    CAPSL and MuCAPSL, Journal of Telecommunications and Information Technology, 2002, nr 4

    Get PDF
    Secure communication generally begins with a connection establishment phase in which messages are exchanged by client and server protocol software to generate, share, and use secret data or keys. This message exchange is referred to as an authentication or key distribution cryptographic protocol. CAPSL is a formal language for specifying cryptographic protocols. It is also useful for addressing the correctness of the protocols on an abstract level, rather than the strength of the underlying cryptographic algorithms. We outline the design principles of CAPSL and its integrated specification and analysis environment. Protocols for secure group management are essential in applications that are concerned with confidential authenticated communication among coalition members, authenticated group decisions, or the secure administration of group membership and access control. We will also discuss our progress on designing a new extension of CAPSL for multicast protocols, called MuCAPSL

    An Obesity Dietary Quality Index Predicts Abdominal Obesity in Women: Potential Opportunity for New Prevention and Treatment Paradigms

    Get PDF
    Background. Links between dietary quality and abdominal obesity are poorly understood. Objective. To examine the association between an obesity-specific dietary quality index and abdominal obesity risk in women. Methods. Over 12 years, we followed 288 Framingham Offspring/Spouse Study women, aged 30–69 years, without metabolic syndrome risk factors, cardiovascular disease, cancer, or diabetes at baseline. An 11-nutrient obesity-specific dietary quality index was derived using mean ranks of nutrient intakes from 3-day dietary records. Abdominal obesity (waist circumference >88 cm) was assessed during follow-up. Results. Using multiple logistic regression, women with poorer dietary quality were more likely to develop abdominal obesity compared to those with higher dietary quality (OR 1.87; 95% CI, 1.01, 3.47; P for trend = .048) independent of age, physical activity, smoking, and menopausal status. Conclusions. An obesity-specific dietary quality index predicted abdominal obesity in women, suggesting targets for dietary quality assessment, intervention, and treatment to address abdominal adiposity

    Brownian Carnot engine

    Get PDF
    The Carnot cycle imposes a fundamental upper limit to the efficiency of a macroscopic motor operating between two thermal baths. However, this bound needs to be reinterpreted at microscopic scales, where molecular bio-motors and some artificial micro-engines operate. As described by stochastic thermodynamics, energy transfers in microscopic systems are random and thermal fluctuations induce transient decreases of entropy, allowing for possible violations of the Carnot limit. Despite its potential relevance for the development of a thermodynamics of small systems, an experimental study of microscopic Carnot engines is still lacking. Here we report on an experimental realization of a Carnot engine with a single optically trapped Brownian particle as working substance. We present an exhaustive study of the energetics of the engine and analyze the fluctuations of the finite-time efficiency, showing that the Carnot bound can be surpassed for a small number of non-equilibrium cycles. As its macroscopic counterpart, the energetics of our Carnot device exhibits basic properties that one would expect to observe in any microscopic energy transducer operating with baths at different temperatures. Our results characterize the sources of irreversibility in the engine and the statistical properties of the efficiency -an insight that could inspire novel strategies in the design of efficient nano-motors.Comment: 7 pages, 7 figure

    The Space Station Flight Telerobotic Servicer and the human

    Get PDF
    The Space Station Flight Telerobotic Servicer (FTS) and its human-machine interaction issues are described. Included is a discussion of the FTS strawman concept and the FTS workstation human factor issues

    Security Theorems via Model Theory

    Full text link
    A model-theoretic approach can establish security theorems for cryptographic protocols. Formulas expressing authentication and non-disclosure properties of protocols have a special form. They are quantified implications for all xs . (phi implies for some ys . psi). Models (interpretations) for these formulas are *skeletons*, partially ordered structures consisting of a number of local protocol behaviors. Realized skeletons contain enough local sessions to explain all the behavior, when combined with some possible adversary behaviors. We show two results. (1) If phi is the antecedent of a security goal, then there is a skeleton A_phi such that, for every skeleton B, phi is satisfied in B iff there is a homomorphism from A_phi to B. (2) A protocol enforces for all xs . (phi implies for some ys . psi) iff every realized homomorphic image of A_phi satisfies psi. Hence, to verify a security goal, one can use the Cryptographic Protocol Shapes Analyzer CPSA (TACAS, 2007) to identify minimal realized skeletons, or "shapes," that are homomorphic images of A_phi. If psi holds in each of these shapes, then the goal holds
    corecore