31 research outputs found

    Transitions in social complexity along elevational gradients reveal a combined impact of season length and development time on social evolution.

    Get PDF
    Eusociality is taxonomically rare, yet associated with great ecological success. Surprisingly, studies of environmental conditions favouring eusociality are often contradictory. Harsh conditions associated with increasing altitude and latitude seem to favour increased sociality in bumblebees and ants, but the reverse pattern is found in halictid bees and polistine wasps. Here, we compare the life histories and distributions of populations of 176 species of Hymenoptera from the Swiss Alps. We show that differences in altitudinal distributions and development times among social forms can explain these contrasting patterns: highly social taxa develop more quickly than intermediate social taxa, and are thus able to complete the reproductive cycle in shorter seasons at higher elevations. This dual impact of altitude and development time on sociality illustrates that ecological constraints can elicit dynamic shifts in behaviour, and helps explain the complex distribution of sociality across ecological gradients

    Projected WIMP sensitivity of the LUX-ZEPLIN dark matter experiment

    Get PDF
    LUX-ZEPLIN (LZ) is a next-generation dark matter direct detection experiment that will operate 4850 feet underground at the Sanford Underground Research Facility (SURF) in Lead, South Dakota, USA. Using a two-phase xenon detector with an active mass of 7 tonnes, LZ will search primarily for low-energy interactions with weakly interacting massive particles (WIMPs), which are hypothesized to make up the dark matter in our galactic halo. In this paper, the projected WIMP sensitivity of LZ is presented based on the latest background estimates and simulations of the detector. For a 1000 live day run using a 5.6-tonne fiducial mass, LZ is projected to exclude at 90% confidence level spin-independent WIMP-nucleon cross sections above 1.4 × 10-48cm2 for a 40 GeV/c2 mass WIMP. Additionally, a 5σ discovery potential is projected, reaching cross sections below the exclusion limits of recent experiments. For spin-dependent WIMP-neutron(-proton) scattering, a sensitivity of 2.3 × 10−43 cm2 (7.1 × 10−42 cm2) for a 40 GeV/c2 mass WIMP is expected. With underground installation well underway, LZ is on track for commissioning at SURF in 2020

    The Immune Landscape of Cancer

    Get PDF
    We performed an extensive immunogenomic anal-ysis of more than 10,000 tumors comprising 33diverse cancer types by utilizing data compiled byTCGA. Across cancer types, we identified six im-mune subtypes\u2014wound healing, IFN-gdominant,inflammatory, lymphocyte depleted, immunologi-cally quiet, and TGF-bdominant\u2014characterized bydifferences in macrophage or lymphocyte signa-tures, Th1:Th2 cell ratio, extent of intratumoral het-erogeneity, aneuploidy, extent of neoantigen load,overall cell proliferation, expression of immunomod-ulatory genes, and prognosis. Specific drivermutations correlated with lower (CTNNB1,NRAS,orIDH1) or higher (BRAF,TP53,orCASP8) leukocytelevels across all cancers. Multiple control modalitiesof the intracellular and extracellular networks (tran-scription, microRNAs, copy number, and epigeneticprocesses) were involved in tumor-immune cell inter-actions, both across and within immune subtypes.Our immunogenomics pipeline to characterize theseheterogeneous tumors and the resulting data areintended to serve as a resource for future targetedstudies to further advance the field

    Reducing the environmental impact of surgery on a global scale: systematic review and co-prioritization with healthcare workers in 132 countries

    Get PDF
    Background Healthcare cannot achieve net-zero carbon without addressing operating theatres. The aim of this study was to prioritize feasible interventions to reduce the environmental impact of operating theatres. Methods This study adopted a four-phase Delphi consensus co-prioritization methodology. In phase 1, a systematic review of published interventions and global consultation of perioperative healthcare professionals were used to longlist interventions. In phase 2, iterative thematic analysis consolidated comparable interventions into a shortlist. In phase 3, the shortlist was co-prioritized based on patient and clinician views on acceptability, feasibility, and safety. In phase 4, ranked lists of interventions were presented by their relevance to high-income countries and low–middle-income countries. Results In phase 1, 43 interventions were identified, which had low uptake in practice according to 3042 professionals globally. In phase 2, a shortlist of 15 intervention domains was generated. In phase 3, interventions were deemed acceptable for more than 90 per cent of patients except for reducing general anaesthesia (84 per cent) and re-sterilization of ‘single-use’ consumables (86 per cent). In phase 4, the top three shortlisted interventions for high-income countries were: introducing recycling; reducing use of anaesthetic gases; and appropriate clinical waste processing. In phase 4, the top three shortlisted interventions for low–middle-income countries were: introducing reusable surgical devices; reducing use of consumables; and reducing the use of general anaesthesia. Conclusion This is a step toward environmentally sustainable operating environments with actionable interventions applicable to both high– and low–middle–income countries

    Fast elliptic curve cryptography in OpenSSL

    No full text
    Abstract. We present a 64-bit optimized implementation of the NIS

    Signatures resilient to continual leakage on memory and computation

    Get PDF
    Abstract. Recent breakthrough results by Brakerski et al and Dodis et al have shown that signature schemes can be made secure even if the adversary continually obtains information leakage from the secret key of the scheme. However, the schemes currently do not allow leakage on the secret key and randomness during signing, except in the random oracle model. Further, the random oracle based schemes require updates to the secret key in order to maintain security, even when no leakage during computation is present. We present the first signature scheme that is resilient to full continual leakage: memory leakage as well as leakage from processing during signing (both from the secret key and the randomness), in key generation, and in update. Our scheme can tolerate leakage of a 1 − o(1) fraction of the secret key between updates, and is proven secure in the standard model based on the symmetric external DDH (SXDH) assumption in bilinear groups. The time periods between updates are a function of the amount of leakage in the period (and nothing more). As an additional technical contribution, we introduce a new tool: independent pre-image resistant hash functions, which may be of independent interest.
    corecore