3,260 research outputs found

    Occurrence of a Gynandromorphic Bombus bimaculatus (Hymenoptera: Apidae) in Southeastern Ohio

    Get PDF
    Herein, we introduce the first reported case of gynandromorphy in the bumblebee Bombus bimaculatus (Cresson) (Hymenoptera: Apidae), a relatively common North American species found east of the Mississippi River. The specimen was collected in Marietta, Ohio as part of a bee diversity assessment project for Washington County. Gynanders exhibit discrete male and female characters in a single individual. We discuss the potential causes of gynandromorphy exhibited by this specimen, which has differing antennal segments (12 and 13), facial maculation, abdominal hair coloration, and the presence of a corbicula – secondary sex characters that are characteristic for the genus Bombus

    Using Peptidomimetics and Constrained Peptides as Valuable Tools for Inhibiting Protein⁻Protein Interactions.

    Get PDF
    Protein⁻protein interactions (PPIs) are tremendously important for the function of many biological processes. However, because of the structure of many protein⁻protein interfaces (flat, featureless and relatively large), they have largely been overlooked as potential drug targets. In this review, we highlight the current tools used to study the molecular recognition of PPIs through the use of different peptidomimetics, from small molecules and scaffolds to peptides. Then, we focus on constrained peptides, and in particular, ways to constrain α-helices through stapling using both one- and two-component techniques

    Towards robust experimental design for user studies in security and privacy

    Get PDF
    Background: Human beings are an integral part of computer security, whether we actively participate or simply build the systems. Despite this importance, understanding users and their interaction with security is a blind spot for most security practitioners and designers. / Aim: Define principles for conducting experiments into usable security and privacy, to improve study robustness and usefulness. / Data: The authors’ experiences conducting several research projects complemented with a literature survey. Method: We extract principles based on relevance to the advancement of the state of the art. We then justify our choices by providing published experiments as cases of where the principles are and are not followed in practice to demonstrate the impact. Each principle is a discipline specific instantiation of desirable experiment-design elements as previously established in the domain of philosophy of science. / Results: Five high-priority principles – (i) give participants a primary task; (ii) incorporate realistic risk; (iii) avoid priming the participants; (iv) perform doubleblind experiments whenever possible and (v) think carefully about how meaning is assigned to the terms threat model, security, privacy, and usability. / Conclusion: The principles do not replace researcher acumen or experience, however they can provide a valuable service for facilitating evaluation, guiding younger researchers and students, and marking a baseline common language for discussing further improvements

    Investigations on the slope efficiency of a pulsed 2.8-”m Er3+:LiYF4 laser

    Get PDF
    A slope efficiency of 40% from an Er3+:LiYF4 laser is demonstrated under pulsed Ti:sapphire pumping at 973 nm. With reduction of the pump-pulse duration a significant decrease of the slope efficiency and an increase of the threshold is observed in the experiment and confirmed with high accuracy in a computer simulation. This behavior is due to interionic upconversion from the lower laser level, which leads to energy recycling into the upper laser level. The upconversion rate is negative at threshold but increases strongly with rising pump pulse energy, thus enhancing the slope efficiency. The conditions are derived that are necessary for achieving the high slope efficiency of the energy-recycling regime
    • 

    corecore