202 research outputs found

    Hyperfine Magnetic Field Measurement in Heusler Alloys by TDPAC Technique

    Get PDF
    This work was supported by National Science Foundation Grants PHY 76-84033A01, PHY 78-22774, and Indiana Universit

    Strong negative self regulation of Prokaryotic transcription factors increases the intrinsic noise of protein expression

    Get PDF
    Background Many prokaryotic transcription factors repress their own transcription. It is often asserted that such regulation enables a cell to homeostatically maintain protein abundance. We explore the role of negative self regulation of transcription in regulating the variability of protein abundance using a variety of stochastic modeling techniques. Results We undertake a novel analysis of a classic model for negative self regulation. We demonstrate that, with standard approximations, protein variance relative to its mean should be independent of repressor strength in a physiological range. Consequently, in that range, the coefficient of variation would increase with repressor strength. However, stochastic computer simulations demonstrate that there is a greater increase in noise associated with strong repressors than predicted by theory. The discrepancies between the mathematical analysis and computer simulations arise because with strong repressors the approximation that leads to Michaelis-Menten-like hyperbolic repression terms ceases to be valid. Because we observe that strong negative feedback increases variability and so is unlikely to be a mechanism for noise control, we suggest instead that negative feedback is evolutionarily favoured because it allows the cell to minimize mRNA usage. To test this, we used in silico evolution to demonstrate that while negative feedback can achieve only a modest improvement in protein noise reduction compared with the unregulated system, it can achieve good improvement in protein response times and very substantial improvement in reducing mRNA levels. Conclusions Strong negative self regulation of transcription may not always be a mechanism for homeostatic control of protein abundance, but instead might be evolutionarily favoured as a mechanism to limit the use of mRNA. The use of hyperbolic terms derived from quasi-steady-state approximation should also be avoided in the analysis of stochastic models with strong repressors

    KLEIN: A New Family of Lightweight Block Ciphers

    Get PDF
    Resource-efficient cryptographic primitives become fundamental for realizing both security and efficiency in embedded systems like RFID tags and sensor nodes. Among those primitives, lightweight block cipher plays a major role as a building block for security protocols. In this paper, we describe a new family of lightweight block ciphers named KLEIN, which is designed for resource-constrained devices such as wireless sensors and RFID tags. Compared to the related proposals, KLEIN has advantage in the software performance on legacy sensor platforms, while in the same time its hardware implementation can also be compact

    Interleukin-1β Maturation Triggers Its Relocation to the Plasma Membrane for Gasdermin-D-Dependent and -Independent Secretion

    Get PDF
    IL-1β requires processing by caspase-1 to generate the active, pro-inflammatory cytokine. Acute IL-1β secretion from inflammasome-activated macrophages requires caspase-1-dependent GSDMD cleavage, which also induces pyroptosis. Mechanisms of IL-1β secretion by pyroptotic and non-pyroptotic cells, and the precise functions of caspase-1 and GSDMD therein, are unresolved. Here, we show that, while efficient early secretion of endogenous IL-1β from primary non-pyroptotic myeloid cells in vitro requires GSDMD, later IL-1β release in vitro and in vivo proceeds independently of GSDMD. IL-1β maturation is sufficient for slow, caspase-1/GSDMD-independent secretion of ectopic IL-1β from resting, non-pyroptotic macrophages, but the speed of IL-1β release is boosted by inflammasome activation, via caspase-1 and GSDMD. IL-1β cleavage induces IL-1β enrichment at PIP2-enriched plasma membrane ruffles, and this is a prerequisite for IL-1β secretion and is mediated by a polybasic motif within the cytokine. We thus reveal a mechanism in which maturation-induced IL-1β trafficking facilitates its unconventional secretion

    Nutritional, Health, and Technological Functionality of Lupin Flour Addition to Bread and Other Baked Products: Benefits and Challenges

    Get PDF
    Lupin is an undervalued legume despite its high protein and dietary fiber content and potential health benefits. This review focuses on the nutritional value, health benefits, and technological effects of incorporating lupin flour into wheat-based bread. Results of clinical studies suggest that consuming lupin compared to wheat bread and other baked products reduce chronic disease risk markers; possibly due to increased protein and dietary fiber and bioactive compounds. However, lupin protein allergy has also been recorded. Bread quality has been improved when 10% lupin flour is substituted for refined wheat flour; possibly due to lupin-wheat protein cross-linking assisting bread volume and the high water-binding capacity (WBC) of lupin fiber delaying staling. Above 10% substitution appears to reduce bread quality due to lupin proteins low elasticity and the high WBC of its dietary fiber interrupting gluten network development. Gaps in understanding of the role of lupin flour in bread quality include the optimal formulation and processing conditions to maximize lupin incorporation, role of protein cross-linking, antistaling functionality, and bioactivity of its γ-conglutin protein

    Taking a more nuanced look at behavior change for demand reduction in the illegal wildlife trade

    Get PDF
    The illegal wildlife trade threatens the future of many species, and undermines economies and livelihoods. Conservationists have largely responded with supply‐side interventions, such as antipoaching patrols, but these often fail to stem the tide of wildlife trafficking. There is now increasing interest in demand‐side interventions, which seek to lower poaching pressure on sought‐after species by reducing consumer's desire for, and purchase of, specific wildlife products. Individual behavior change approaches, from environmental education to social marketing, have been widely advocated by academics, practitioners, and policy makers. However, this is an emerging field and we lack the breadth of evidence needed to understand and predict the potential outcomes of demand reduction interventions. To help us gain broader insights, we examine the literature from public health and international development on the effectiveness of behavior change interventions, and critique the current conceptualization of strategies for reducing consumer demand in the illegal wildlife trade. We show that behavior change is difficult to achieve and interventions may have unintended and undesirable consequences because of unaddressed systemic, cultural and environmental drivers, and limited resourcing. We conclude that some sections of the conservation community are advocating a shift from one reductionist approach based on limiting supply, to another based on limiting demand, and argue that conservationists should learn from the public health and international development projects that have integrated systems thinking. By accounting for the multiple interactions and synergies between different factors in the wildlife trade, we can develop more strategic approaches to protecting endangered species

    A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile-and Why it is Not

    Get PDF
    In this work, we explore the possibilities for practical Threshold Implementation (TI) with only two shares in order for a smaller design that needs less randomness but is still first-order leakage resistant. We present the first two-share Threshold Implementations of two lightweight block ciphers---Simon and Present. The implementation results show that two-share TI gains in compactness while loses in throughput compared with three-share schemes. Moreover, the leakage analyses show that two-share TI retains perfect first-order resistance but is shadowed by a strong second-order leakage, making it less worthwhile
    corecore