3,237 research outputs found

    Targeting self-renewal pathways in myeloid malignancies

    Get PDF
    A fundamental property of hematopoietic stem cells (HSCs) is the ability to self-renew. This is a complex process involving multiple signal transduction cascades which control the fine balance between self-renewal and differentiation through transcriptional networks. Key activators/regulators of self-renewal include chemokines, cytokines and morphogens which are expressed in the bone marrow niche, either in a paracrine or autocrine fashion, and modulate stem cell behaviour. Increasing evidence suggests that the downstream signaling pathways induced by these ligands converge at multiple levels providing a degree of redundancy in steady state hematopoiesis. Here we will focus on how these pathways cross-talk to regulate HSC self-renewal highlighting potential therapeutic windows which could be targeted to prevent leukemic stem cell self-renewal in myeloid malignancies

    A large, single pulmonary arteriovenous fistula presenting hours after birth

    Get PDF
    This article reports a case of a single, large pulmonary artery to left atrial fistula presenting within hours of birth. Symptomatic fistulas of this type are exceptionally rare in the neonatal period. The images of the fistula obtained during echocardiography and cardiac catheterisation is included. This case highlights the importance of intra-operative echocardigraphic guidance during surgical ligation of fistulas of this type.peer-reviewe

    A follow-up study of the commercial graduates of a selected community

    Full text link
    Thesis (Ed.M.)--Boston University, 1947. This item was digitized by the Internet Archive

    Critique of Two Methods for Assessing the Nutrient Adequacy of Diets

    Get PDF
    The adequacy of diets can be assessed using several analytical approaches. This paper reviews two methods of assessment: a cutoff method, which estimates the percentage of the population having usual intakes below a given value; and a probability method, which assesses the percentage of the population whose usual intakes are below their individual requirements. First, the concept of usual nutrient intakes and the problems associated with estimating usual intake distributions are discussed. Next, the two methods of dietary assessment and their related assumptions are described and compared. The more specific inference of the probability method is shown to rely on its assumptions and data that are currently not available. While the cutoff method is simpler, its use may result in misclassification errors and its estimates are highly influenced by the cut-off standard selected.

    Thermodynamic Entropy And The Accessible States of Some Simple Systems

    Full text link
    Comparison of the thermodynamic entropy with Boltzmann's principle shows that under conditions of constant volume the total number of arrangements in simple thermodynamic systems with temperature-independent heat capacities is TC/k. A physical interpretation of this function is given for three such systems; an ideal monatomic gas, an ideal gas of diatomic molecules with rotational motion, and a solid in the Dulong-Petit limit of high temperature. T1/2 emerges as a natural measure of the number of accessible states for a single particle in one dimension. Extension to N particles in three dimensions leads to TC/k as the total number of possible arrangements or microstates. The different microstates of the system are thus shown a posteriori to be equally probable, with probability T-C/k, which implies that for the purposes of counting states the particles of the gas are distinguishable. The most probable energy state of the system is determined by the degeneracy of the microstates.Comment: 9 pages, 1 figur

    Assumptions and guarantees for compositional noninterference

    Get PDF
    The idea of building secure systems by plugging together "secure" components is appealing, but this requires a definition of security which, in addition to taking care of top-level security goals, is strengthened appropriately in order to be compositional. This approach has been previously studied for information-flow security of shared-variable concurrent programs, but the price for compositionality is very high: a thread must be extremely pessimistic about what an environment might do with shared resources. This pessimism leads to many intuitively secure threads being labelled as insecure. Since in practice it is only meaningful to compose threads which follow an agreed protocol for data access, we take advantage of this to develop a more liberal compositional security condition. The idea is to give the security definition access to the intended pattern of data usage, as expressed by assumption-guarantee style conditions associated with each thread. We illustrate the improved precision by developing the first flow-sensitive security type system that provably enforces a noninterference-like property for concurrent programs. \ua9 2011 IEEE

    On the Initial Stages of the Densification and Lithification of Sediments

    Get PDF
    Peer reviewedPostprin

    Computation of Iwasawa Lambda invariants for imaginary quadratic fields

    Get PDF
    A method for computing the Iwasawa lambda invariants of an imaginary quadratic field is developed and used to construct a table of these invariants for discriminants up to 1,000 and primes up to 20,000

    Non-Volatile Memory Characteristics of Submicrometre Hall Structures Fabricated in Epitaxial Ferromagnetic MnAl Films on GaAs

    Get PDF
    Hall-effect structures with submicrometre linewidths (<0.3pm) have been fabricated in ferromagnetic thin films of Mn[sub 0.60]Al[sub 0.40] which are epitaxially grown on a GaAs substrate. The MnAl thin films exhibit a perpendicular remanent magnetisation and an extraordinary Hall effect with square hysteretic behaviour. The presence of two distinct stable readout states demonstrates the potential of using ultrasmall ferromagnetic volumes for electrically addressable, nonvolatile storage of digital information
    • 

    corecore