11,137 research outputs found

    Experiments on the carboxylase of pea roots

    Get PDF
    It is known that vitamin B1 is a growth factor for numerous bacteria and fungi including the yeasts (see the summary in Koser and Saunders (1938)). It has also been demonstrated that vitamin B1 is essential for the growth of the isolated roots of higher plants (Bonner, 1937; Robbins and Bartley, 1937). Because of this general vitamin B1 requirement of living organisms, it would seem a priori probable that the vitamin plays a role in some basic cellular process. That this is indeed the case was shown conclusively by the work of Peters and coworkers (see Peters and O’Brien (1938)) and of Lohmann and Schuster (1937). The latter workers found that the prosthetic group of yeast carboxylase is vitamin B1 pyrophosphate. In the case of yeast, vitamin B1 is, then, a constituent of a respiratory enzyme and vitamin B1 pyrophosphate is hence commonly referred to as “cocarboxylase,” a terminology used throughout this paper. Although considerable information is available concerning the rôle of vitamin B1 as a growth factor for roots, there is little known about the carboxylase of such roots. The present work was undertaken with the hope of elucidating possible relationships between vitamin B1 and the carboxylase of pea roots

    Citizen Electronic Identities using TPM 2.0

    Full text link
    Electronic Identification (eID) is becoming commonplace in several European countries. eID is typically used to authenticate to government e-services, but is also used for other services, such as public transit, e-banking, and physical security access control. Typical eID tokens take the form of physical smart cards, but successes in merging eID into phone operator SIM cards show that eID tokens integrated into a personal device can offer better usability compared to standalone tokens. At the same time, trusted hardware that enables secure storage and isolated processing of sensitive data have become commonplace both on PC platforms as well as mobile devices. Some time ago, the Trusted Computing Group (TCG) released the version 2.0 of the Trusted Platform Module (TPM) specification. We propose an eID architecture based on the new, rich authorization model introduced in the TCGs TPM 2.0. The goal of the design is to improve the overall security and usability compared to traditional smart card-based solutions. We also provide, to the best our knowledge, the first accessible description of the TPM 2.0 authorization model.Comment: This work is based on an earlier work: Citizen Electronic Identities using TPM 2.0, to appear in the Proceedings of the 4th international workshop on Trustworthy embedded devices, TrustED'14, November 3, 2014, Scottsdale, Arizona, USA, http://dx.doi.org/10.1145/2666141.266614

    Modulated phases in magnetic models frustrated by long-range interactions

    Full text link
    We study an Ising model in one dimension with short range ferromagnetic and long range (power law) antiferromagnetic interactions. We show that the zero temperature phase diagram in a (longitudinal) field H involves a sequence of up and down domains whose size varies continuously with H, between -H_c and H_c which represent the edge of the ferromagnetic up and down phases. The implications of long range interaction in many body systems are discussed.Comment: 5 pages, 3 figure
    • …
    corecore