2,525 research outputs found

    Influence of M-phase chromatin on the anisotropy of microtubule asters

    Get PDF
    In many eukaryotic cells going through M-phase, a bipolar spindle is formed by microtubules nucleated from centrosomes. These microtubules, in addition to being "captured" by kinetochores, may be stabilized by chromatin in two different ways: short-range stabilization effects may affect microtubules in close contact with the chromatin, while long-range stabilization effects may "guide" microtubule growth towards the chromatin (e.g., by introducing a diffusive gradient of an enzymatic activity that affects microtubule assembly). Here, we use both meiotic and mitotic extracts from Xenopus laevis eggs to study microtubule aster formation and microtubule dynamics in the presence of chromatin. In "low-speed" meiotic extracts, in the presence of salmon sperm chromatin, we find that short-range stabilization effects lead to a strong anisotropy of the microtubule asters. Analysis of the dynamic parameters of microtubule growth show that this anisotropy arises from a decrease in the catastrophe frequency, an increase in the rescue frequency and a decrease in the growth velocity. In this system we also find evidence for long-range "guidance" effects, which lead to a weak anisotropy of the asters. Statistically relevant results on these long-range effects are obtained in "high-speed" mitotic extracts in the presence of artificially constructed chromatin stripes. We find that aster anisotropy is biased in the direction of the chromatin and that the catastrophe frequency is reduced in its vicinity. In this system we also find a surprising dependence of the catastrophe and the rescue frequencies on the length of microtubules nucleated from centrosomes: the catastrophe frequency increase and the rescue frequency decreases with microtubule length

    Narrow-escape-time problem: the imperfect trapping case

    Get PDF
    We present a master equation approach to the \emph{narrow escape time} (NET) problem, i.e. the time needed for a particle contained in a confining domain with a single narrow opening, to exit the domain for the first time. We introduce a finite transition probability, Îœ\nu, at the narrow escape window allowing the study of the imperfect trapping case. Ranging from 0 to ∞\infty, Îœ\nu allowed the study of both extremes of the trapping process: that of a highly deficient capture, and situations where escape is certain ("perfect trapping" case). We have obtained analytic results for the basic quantity studied in the NET problem, the \emph{mean escape time} (MET), and we have studied its dependence in terms of the transition (desorption) probability over (from) the surface boundary, the confining domain dimensions, and the finite transition probability at the escape window. Particularly we show that the existence of a global minimum in the NET depends on the `imperfection' of the trapping process. In addition to our analytical approach, we have implemented Monte Carlo simulations, finding excellent agreement between the theoretical results and simulations.Comment: 9 page

    Microcredit: MSMEs and Sustainable Development

    Get PDF
    Microcredit and microfinance are distinct concepts. Doing microcredit part of microfinance. The concept of microcredit is due to Grameen Bank’s founder Muhammad Yunus and started in Bangladesh in 1976. Microcredit is a financial instrument that provides small loans to low-income people without access to formal financing. Moreover, it has been evolving intending to contribute to poverty alleviation, support entrepreneurship, and empowerment of women, combating economic and social exclusion globally. It has an impact in terms of microbusinesses financing and thus on funding MSMEs, which will impact the growth of economies. The evolution of the concept has enabled microcredit to contribute to improving global sustainability levels

    Magnetism of two-dimensional defects in Pd: stacking faults, twin boundaries and surfaces

    Full text link
    Careful first-principles density functional calculations reveal the importance of hexagonal versus cubic stacking of closed packed planes of Pd as far as local magnetic properties are concerned. We find that, contrary to the stable face centered cubic phase, which is paramagnetic, the hexagonal close-packed phase of Pd is ferromagnetic with a magnetic moment of 0.35 ÎŒB\mu_{B}/atom. Our results show that two-dimensional defects with local hcp stacking, like twin boundaries and stacking faults, in the otherwise fcc Pd structure, increase the magnetic susceptibility. The (111) surface also increases the magnetic susceptibility and it becomes ferromagnetic in combination with an individual stacking fault or twin boundary close to it. On the contrary, we find that the (100) surface decreases the tendency to ferromagnetism. The results are consistent with the magnetic moment recently observed in small Pd nanoparticles, with a large surface area and a high concentration of two-dimensional stacking defects.Comment: 8 pages, 10 figure

    Single-Particle Momentum Distribution of an Efimov trimer

    Full text link
    Experimental progress in the study of strongly interacting ultracold atoms has recently allowed the observation of Efimov trimers. We study theoretically a non-conventional observable for these trimer states, that may be accessed experimentally, the momentum distribution n(k) of the constitutive bosonic particles. The large momentum part of the distribution is particularly intriguing: In addition to the expected 1/k^4 tail associated to contact interactions, it exhibits a subleading tail 1/k^5 which is a hall-mark of Efimov physics and leads to a breakdown of a previously proposed expression of the energy as a functional of the momentum distribution.Comment: This is a subpart of the (too long to be published) work arXiv:1001.0774. This subpart has 11 pages and 2 figures. Revised version correcting minor error

    Citation Flows in the Zones of Influence of Scientific

    Get PDF
    Domestic citation to papers from the same country and the greater citation impact of documents involving international collaboration are two phenomena that have been extensively studied and contrasted. Here, however, we showthat it is not somuch a national bias,but that papers have a greater impact on their immediate environments, an impact that is diluted as that environment grows. For this reason, the greatest biases are observed in countries with a limited production. Papers that involve international collaboration have a greater impact in general, on the one hand, because they have multiple “immediate environments,” and on the other because of their greater quality or prestige. In short, one can say that science knows no frontiers. Certainly there is a greater impact on the authors’ immediate environment, but this does not necessarily have to coincide with their national environments, which fade in importance as the collaborative environment expands

    Photon-Number-Splitting versus Cloning Attacks in Practical Implementations of the Bennett-Brassard 1984 protocol for Quantum Cryptography

    Full text link
    In practical quantum cryptography, the source sometimes produces multi-photon pulses, thus enabling the eavesdropper Eve to perform the powerful photon-number-splitting (PNS) attack. Recently, it was shown by Curty and Lutkenhaus [Phys. Rev. A 69, 042321 (2004)] that the PNS attack is not always the optimal attack when two photons are present: if errors are present in the correlations Alice-Bob and if Eve cannot modify Bob's detection efficiency, Eve gains a larger amount of information using another attack based on a 2->3 cloning machine. In this work, we extend this analysis to all distances Alice-Bob. We identify a new incoherent 2->3 cloning attack which performs better than those described before. Using it, we confirm that, in the presence of errors, Eve's better strategy uses 2->3 cloning attacks instead of the PNS. However, this improvement is very small for the implementations of the Bennett-Brassard 1984 (BB84) protocol. Thus, the existence of these new attacks is conceptually interesting but basically does not change the value of the security parameters of BB84. The main results are valid both for Poissonian and sub-Poissonian sources.Comment: 11 pages, 5 figures; "intuitive" formula (31) adde
    • 

    corecore