4,521 research outputs found

    Water Wave Refraction with Non-Linear Theory

    Get PDF
    Two different kinds of wave refraction models are formulated in the present study using Stokes\u27 third order wave theory. One type of model is utilized in a parametric study employing several different topographies. Wave trajectories obtained from this model, when obtained by using first and third order wave theory with and without the consideration of energy dissipation, show considerable differences. These differences are examined in more detail for a bottom of constant slope: (1) An approximate 10% difference occurs between the refraction coefficients obtained using the first and the third order wave theory. (2) Considerably different ray trajectories are detected for a high wave steepness, and for a large incident angle due to intensive energy dissipation. (3) The refraction coefficient is found to decrease as the sea floor gets steeper. (4) The wave propagation directions, occurring near the wave breaking point, are found to be sensitive to both the wave steepness and incident angle. (5) Changes in wave breaking depth due to wave refraction and energy dissipation show that the waves of large incident angle and of higher frequencies break in shallower water. The second type of model uses power refraction theory; this provides a new approach for spectral transformation in shallow water. For this model, the deep water spectrum is supplied as an initial condition. This spectrum is then dissasembled to component waves of individual wave height. The power transmitting line at a given water depth is determined by taking a vector sum of the powers of all the component waves, which have been exposed to refraction and energy dissipation. The spectra along this line of power flow are back calculated using these wave components. The spectra obtained from the above method are then compared to spectra from Hasselmann and Collins\u27 model and remote sensing data. The model gives a reasonable result for relatively deeper water, but it does not reproduce the real conditions encountered by the irregular ocean floor region in which the water depth is very shallow. This disagreement seems to be caused mainly by the dissipation rate functions used in this model. Development of a new dissipation rate function is necessary for a better application of this model to shallow water region

    Higgs bosons of a supersymmetric E6E_6 model at the Large Hadron Collider

    Full text link
    It is found that CP symmetry may be explicitly broken in the Higgs sector of a supersymmetric E6E_6 model with two extra neutral gauge bosons at the one-loop level. The phenomenology of the model, the Higgs sector in particular, is studied for a reasonable parameter space of the model, in the presence of explicit CP violation at the one-loop level. At least one of the neutral Higgs bosons of the model might be produced via the WWWW fusion process at the Large Hadron Collider.Comment: 23 pages, 5 figures, JHE

    A Study on Abnormal Behavior Detection in BYOD Environment

    Get PDF
    Advancement of communication technologies and smart devices in the recent times is leading to changes into the integrated wired and wireless communication environments. Since early days, businesses had started introducing environments for mobile device application to their operations in order to improve productivity (efficiency) and the closed corporate environment gradually shifted to an open structure. Recently, individual user's interest in working environment using mobile devices has increased and a new corporate working environment under the concept of BYOD is drawing attention. BYOD (bring your own device) is a concept where individuals bring in and use their own devices in business activities. Through BYOD, businesses can anticipate improved productivity (efficiency) and also a reduction in the cost of purchasing devices. However, as a result of security threats caused by frequent loss and theft of personal devices and corporate data leaks due to low security, companies are reluctant about adopting BYOD system. In addition, without considerations to diverse devices and connection environments, there are limitations in detecting abnormal behaviors such as information leaks which use the existing network-based security equipment. This study suggests a method to detect abnormal behaviors according to individual behavioral patterns, rather than the existing signature-based malicious behavior detection and discusses applications of this method in BYOD environment

    NOD2/RICK-dependent β-defensin 2 regulation is protective for nontypeable Haemophilus influenzae-induced middle ear infection.

    Get PDF
    Middle ear infection, otitis media (OM), is clinically important due to the high incidence in children and its impact on the development of language and motor coordination. Previously, we have demonstrated that the human middle ear epithelial cells up-regulate β-defensin 2, a model innate immune molecule, in response to nontypeable Haemophilus influenzae (NTHi), the most common OM pathogen, via TLR2 signaling. NTHi does internalize into the epithelial cells, but its intracellular trafficking and host responses to the internalized NTHi are poorly understood. Here we aimed to determine a role of cytoplasmic pathogen recognition receptors in NTHi-induced β-defensin 2 regulation and NTHi clearance from the middle ear. Notably, we observed that the internalized NTHi is able to exist freely in the cytoplasm of the human epithelial cells after rupturing the surrounding membrane. The human middle ear epithelial cells inhibited NTHi-induced β-defensin 2 production by NOD2 silencing but augmented it by NOD2 over-expression. NTHi-induced β-defensin 2 up-regulation was attenuated by cytochalasin D, an inhibitor of actin polymerization and was enhanced by α-hemolysin, a pore-forming toxin. NOD2 silencing was found to block α-hemolysin-mediated enhancement of NTHi-induced β-defensin 2 up-regulation. NOD2 deficiency appeared to reduce inflammatory reactions in response to intratympanic inoculation of NTHi and inhibit NTHi clearance from the middle ear. Taken together, our findings suggest that a cytoplasmic release of internalized NTHi is involved in the pathogenesis of NTHi infections, and NOD2-mediated β-defensin 2 regulation contributes to the protection against NTHi-induced otitis media

    IRT5 Probiotics Changes Immune Modulatory Protein Expression in the Extraorbital Lacrimal Glands of an Autoimmune Dry Eye Mouse Model

    Get PDF
    PURPOSE. While the association between the gut microbiome and the immune system has been studied in autoimmune disorders, little is known about ocular disease. Previously we reported that IRT5, a mixture of five probiotic strains, could suppress autoimmune dry eye. In this study, we investigated the mechanism by which IRT5 performs its immunomodulatory function in a mouse model of autoimmune dry eye. METHODS. NOD.B10.H2b mice were used as an autoimmune dry eye model. Either IRT5 or PBS was gavaged orally for 3 weeks, with or without 5 days of antibiotic pretreatment. The effects on clinical features, extraorbital lacrimal gland and spleen proteins, and fecal microbiota were analyzed. RESULTS. The ocular staining score was lower, and tear secretion was higher, in the IRT5-treated groups than in the PBS-treated groups. After IRT5 treatment, the downregulated lacrimal gland proteins were enriched in the biological processes of defense response and immune system process. The relative abundances of 33 operational taxonomic units were higher, and 53 were lower, in the feces of the IRT5-treated groups than in those of the PBS-treated groups. IRT5 administration without antibiotic pretreatment also showed immunomodulatory functions with increases in the Lactobacillus helveticus group and Lactobacillus hamsteri. Additional proteomic assays revealed a decrease of proteins related to antigen-presenting processes in the CD11b(+) and CD11c(+) cells of spleen in the IRT5-treated groups. CONCLUSIONS. Changes in the gut microbiome after IRT5 treatment improved clinical manifestations in the autoimmune dry eye model via the downregulation of antigen-presenting processes in immune networks.11Ysciescopu

    Metabolic perturbations in mutants of glucose transporters and their applications in metabolite production in Escherichia coli

    Get PDF
    Background: Most microorganisms have evolved to maximize growth rate, with rapid consumption of carbon sources from the surroundings. However, fast growing phenotypes usually feature secretion of organic compounds. For example, E. coli mainly produced acetate in fast growing condition such as glucose rich and aerobic condition, which is troublesome for metabolic engineering because acetate causes acidification of surroundings, growth inhibition and decline of production yield. The overflow metabolism can be alleviated by reducing glucose uptake rate. Results: As glucose transporters or their subunits were knocked out in E. coli, the growth and glucose uptake rates decreased and biomass yield was improved. Alteration of intracellular metabolism caused by the mutations was investigated with transcriptome analysis and C-13 metabolic flux analysis (C-13 MFA). Various transcriptional and metabolic perturbations were identified in the sugar transporter mutants. Transcription of genes related to glycolysis, chemotaxis, and flagella synthesis was downregulated, and that of gluconeogenesis, Krebs cycle, alternative transporters, quorum sensing, and stress induced proteins was upregulated in the sugar transporter mutants. The specific production yields of value-added compounds (enhanced green fluorescent protein, gamma-aminobutyrate, lycopene) were improved significantly in the sugar transporter mutants. Conclusions: The elimination of sugar transporter resulted in alteration of global gene expression and redirection of carbon flux distribution, which was purposed to increase energy yield and recycle carbon sources. When the pathways for several valuable compounds were introduced to mutant strains, specific yield of them were highly improved. These results showed that controlling the sugar uptake rate is a good strategy for ameliorating metabolite production.11Ysciescopu

    Novel Pyrrolopyrimidine-Based α-Helix Mimetics: Cell- Permeable Inhibitors of Protein-Protein Interactions

    Get PDF
    This document is the Accepted Manuscript version of a Published Work that appeared in final form in the Journal of the American Chemical Society, copyright © American Chemical Society after peer review and technical editing by the publisher. To access the final edited and published work see http://doi.org/10.1021/ja108230s.There is considerable interest in developing nonpeptidic, small molecule α-helix mimetics to disrupt α-helix-mediated protein-protein interactions. Herein, we report the design of a novel pyrrolopyrimidine-based scaffold for such α-helix mimetics with increased conformational rigidity. We also developed a facile solid phase synthetic route, which is amenable to divergent synthesis of a large library. Using a fluorescence polarization-based assay, we identified cell permeable, dual MDMX/MDM2 inhibitors, demonstrating that the designed molecules can act as α-helix mimetics
    corecore