2,837 research outputs found

    IMPACT OF AMPK ACTIVATOR METFORMIN ON SPERM QUALITY

    Get PDF
    Semen cryopreservation allows crucial management of animal genetic diversity. However, the freeze-thaw process causes biochemical and physical alterations, impairing sperm energy-dependent functions. Currently, many chemicals are added to the media to enhance frozen-thawed sperm quality during artificial insemination. The aims of this study was to determine the effects of Metformin (Metf) on fresh chicken sperm motility and ability to perform acrosome reaction, and to evaluate Metf’s effects on the functions of cryopreserved sperm. Chicken semen was diluted and incubated at 35°C in media supplemented with or without different doses of 5’-AMP-Activated Protein Kinase (AMPK) activator, Metf (0,5 to 5 mM). We then looked for the concentration improving the most sperm quality to use it in the cryopreservation media used for chicken sperm. Our results show that 1 mM Metf is the concentration giving the best results regarding sperm quality. AMPKα phosphorylation, viability, acrosome reaction ability (AR), and various motility parameters, were negatively affected by the freeze-thaw process, and that Metf partially restored them. Sperm quality improved (mean increased by 23% for motility, by 10% for viability) as well as AMPKα phosphorylation (mean increased by 30%). Moreover, fluorescent intensity levels of phospho-AMPK were also stronger with Metf than in the control. These results show that the presence of Metf in fresh semen has a positive impact on the quality of sperm and helps reducing the gradual decline in sperm motility caused by cryopreservation by partially restoring several essential sperm functions, and thus leads to a better overall quality of cryopreserved sperm

    Multi-user interference cancellation schemes for carrier frequency offset compensation in uplink OFDMA

    Get PDF

    Spectrum Sensing for Cognitive Radio Based on Multiple Antennas

    Get PDF

    Participatory agro-climate information services: A key component in climate resilient agriculture

    Get PDF
    The brief promotes participatory agro-climate information services as a key component in achieving climate-smart agriculture. The brief emphasizes that actionable agro-climate information starts with—and responds to—gender-based needs of farmers, integrated at all stages of the value chain. Timely forecasts and accurate agroclimate advisories have been proven to provide farmers with production, adaptation, and mitigation benefits

    A review of technologies for collaborative online information seeking: On the contribution of collaborative argumentation

    Get PDF
    In everyday life, people seek, evaluate, and use online sources to underpin opinions and make decisions. While education must promote the skills people need to critically question the sourcing of online information, it is important, more generally, to understand how to successfully promote the acquisition of any skills related to seeking online information. This review outlines technologies that aim to support users when they collaboratively seek online information. Upon integrating psychological–pedagogical approaches on trust in and the sourcing of online information, argumentation, and computer-supported collaborative learning, we reviewed the literature (N = 95 journal articles) on technologies for collaborative online information seeking. The technologies we identified either addressed collaborative online information seeking as an exclusive process for searching for online information or, alternatively, addressed online information seeking within the context of a more complex learning process. Our review was driven by three main research questions: We aimed to understand whether and how the studies considered 1) the role of trust and critical questioning in the sourcing of online information, 2) the learning processes at play when information seekers engage in collaborative argumentation, and 3) what affordances are offered by technologies that support users’ collaborative seeking of online information. The reviewed articles that focused exclusively on technologies for seeking online information primarily addressed aspects of cooperation (e.g., task management), whereas articles that focused on technologies for integrating the processes of information seeking into the entire learning processes instead highlighted aspects of collaborative argumentation (e.g., exchange of multiple perspectives and critical questioning in argumentation). Seven of the articles referred to trust as an aspect of seekers’ sourcing strategies. We emphasize how researchers’, users’, and technology developers’ consideration of collaborative argumentation could expand the benefits of technological support for seeking online information.Peer Reviewe

    Occupational Safety and Health Coordinators – Puzzle-piece Caretakers or Necessary Evils

    Get PDF
    The construction industry continues to be high-risk in terms of occupational safety and health (OSH) issues. A pivotal instrument in preventing these risks at both European and Danish levels is the OSH coordinator. In spite of the important role of the coordinator, little research on their roles and functions exist, and critics have pointed out that OSH professionals in general may only confer limited impact on preventive OSH work. This study argues that professional identities and struggles to maintain preferred, as well as rejecting unwanted identities are highly important to understand OSH coordinators’ practices. The study investigates OSH coordinators professional identities and their implications for practice through analysis of interviews with 12 experienced OSH coordinators in the Danish construction industry. The study reveals how struggles for maintaining a positive self-image and social recognition may explain why coordinators struggle to prioritize preventing OSH risks over legitimization and social practices

    LNCS

    Get PDF
    We revisit the classical problem of converting an imperfect source of randomness into a usable cryptographic key. Assume that we have some cryptographic application P that expects a uniformly random m-bit key R and ensures that the best attack (in some complexity class) against P(R) has success probability at most δ. Our goal is to design a key-derivation function (KDF) h that converts any random source X of min-entropy k into a sufficiently "good" key h(X), guaranteeing that P(h(X)) has comparable security δ′ which is 'close' to δ. Seeded randomness extractors provide a generic way to solve this problem for all applications P, with resulting security δ′ = O(δ), provided that we start with entropy k ≥ m + 2 log (1/δ) - O(1). By a result of Radhakrishnan and Ta-Shma, this bound on k (called the "RT-bound") is also known to be tight in general. Unfortunately, in many situations the loss of 2 log (1/δ) bits of entropy is unacceptable. This motivates the study KDFs with less entropy waste by placing some restrictions on the source X or the application P. In this work we obtain the following new positive and negative results in this regard: - Efficient samplability of the source X does not help beat the RT-bound for general applications. This resolves the SRT (samplable RT) conjecture of Dachman-Soled et al. [DGKM12] in the affirmative, and also shows that the existence of computationally-secure extractors beating the RT-bound implies the existence of one-way functions. - We continue in the line of work initiated by Barak et al. [BDK+11] and construct new information-theoretic KDFs which beat the RT-bound for large but restricted classes of applications. Specifically, we design efficient KDFs that work for all unpredictability applications P (e.g., signatures, MACs, one-way functions, etc.) and can either: (1) extract all of the entropy k = m with a very modest security loss δ′ = O(δ·log (1/δ)), or alternatively, (2) achieve essentially optimal security δ′ = O(δ) with a very modest entropy loss k ≥ m + loglog (1/δ). In comparison, the best prior results from [BDK+11] for this class of applications would only guarantee δ′ = O(√δ) when k = m, and would need k ≥ m + log (1/δ) to get δ′ = O(δ). - The weaker bounds of [BDK+11] hold for a larger class of so-called "square- friendly" applications (which includes all unpredictability, but also some important indistinguishability, applications). Unfortunately, we show that these weaker bounds are tight for the larger class of applications. - We abstract out a clean, information-theoretic notion of (k,δ,δ′)- unpredictability extractors, which guarantee "induced" security δ′ for any δ-secure unpredictability application P, and characterize the parameters achievable for such unpredictability extractors. Of independent interest, we also relate this notion to the previously-known notion of (min-entropy) condensers, and improve the state-of-the-art parameters for such condensers
    • …
    corecore