2,440 research outputs found

    Identification of some human pathogenic fungi using four DNA extraction methods

    Get PDF
    Dermatophytes being animal and human pathogenic fungi infect some human at one point or the other in their lifetime. For effective control of dermatophytes, accurate identification of the specific species/strain involved must be known. Stocks from pathogenic fungi isolated from infected areas on different patients, around Lagos-Nigeria were analysed using molecular methods (DNA extraction, PCR-RFLP and DNA sequencing). Four DNA extraction protocols were employed in the identification of the fungal isolates. Sixteen different fungal isolates were identified, and based on the molecular data these were classified into six species of dermatophytes belonging to the genera Microsporum, Trichophyton and Epidermaphyton, two species of systemic mycoses fungi and eight opportunistic human pathogenic fungi. The results also revealed that CTAB protocol, Modified CTAB protocol and the GNOME kit used in this work were only able to extract non-dermatophytes DNA. Only the Zymo DNA kit was able to isolate dermatophytes DNA. DNA extraction which is the first step in all molecular studies showed that one DNA extraction method might not be able to extract all fungal DNA for proper identification, diagnosis and treatment of fungal infections. Keywords: Dermatophytes, DNA extraction, Identification, Protocols

    AI Researchers, Video Games Are Your Friends!

    Full text link
    If you are an artificial intelligence researcher, you should look to video games as ideal testbeds for the work you do. If you are a video game developer, you should look to AI for the technology that makes completely new types of games possible. This chapter lays out the case for both of these propositions. It asks the question "what can video games do for AI", and discusses how in particular general video game playing is the ideal testbed for artificial general intelligence research. It then asks the question "what can AI do for video games", and lays out a vision for what video games might look like if we had significantly more advanced AI at our disposal. The chapter is based on my keynote at IJCCI 2015, and is written in an attempt to be accessible to a broad audience.Comment: in Studies in Computational Intelligence Studies in Computational Intelligence, Volume 669 2017. Springe

    How does cognitive load influence speech perception? : An encoding hypothesis

    Get PDF
    Two experiments investigated the conditions under which cognitive load exerts an effect on speech perception. These experiments extend earlier research by using a different speech perception task (four-interval oddity task) and by implementing cognitive load through a task often thought to be modular, namely, face processing. In the cognitive-load conditions, participants were required to remember two faces presented before the speech stimuli. In Experiment 1, performance in the speech-perception task under cognitive load was not impaired in comparison to a no-load baseline condition. In Experiment 2, we modified the load condition minimally such that it required encoding of the two faces simultaneously with the speech stimuli. As a reference condition, we also used a visual search task that in earlier experiments had led to poorer speech perception. Both concurrent tasks led to decrements in the speech task. The results suggest that speech perception is affected even by loads thought to be processed modularly, and that, critically, encoding in working memory might be the locus of interference

    Continuous Variable Quantum Cryptography using Two-Way Quantum Communication

    Full text link
    Quantum cryptography has been recently extended to continuous variable systems, e.g., the bosonic modes of the electromagnetic field. In particular, several cryptographic protocols have been proposed and experimentally implemented using bosonic modes with Gaussian statistics. Such protocols have shown the possibility of reaching very high secret-key rates, even in the presence of strong losses in the quantum communication channel. Despite this robustness to loss, their security can be affected by more general attacks where extra Gaussian noise is introduced by the eavesdropper. In this general scenario we show a "hardware solution" for enhancing the security thresholds of these protocols. This is possible by extending them to a two-way quantum communication where subsequent uses of the quantum channel are suitably combined. In the resulting two-way schemes, one of the honest parties assists the secret encoding of the other with the chance of a non-trivial superadditive enhancement of the security thresholds. Such results enable the extension of quantum cryptography to more complex quantum communications.Comment: 12 pages, 7 figures, REVTe

    2D sodium MRI of the human calf using half-sinc excitation pulses and compressed sensing

    Get PDF
    PURPOSE: Sodium MRI can be used to quantify tissue sodium concentration (TSC) in vivo; however, UTE sequences are required to capture the rapidly decaying signal. 2D MRI enables high in-plane resolution but typically has long TEs. Half-sinc excitation may enable UTE; however, twice as many readouts are necessary. Scan time can be minimized by reducing the number of signal averages (NSAs), but at a cost to SNR. We propose using compressed sensing (CS) to accelerate 2D half-sinc acquisitions while maintaining SNR and TSC. METHODS: Ex vivo and in vivo TSC were compared between 2D spiral sequences with full-sinc (TE = 0.73 ms, scan time ≈ 5 min) and half-sinc excitation (TE = 0.23 ms, scan time ≈ 10 min), with 150 NSAs. Ex vivo, these were compared to a reference 3D sequence (TE = 0.22 ms, scan time ≈ 24 min). To investigate shortening 2D scan times, half-sinc data was retrospectively reconstructed with fewer NSAs, comparing a nonuniform fast Fourier transform to CS. Resultant TSC and image quality were compared to reference 150 NSAs nonuniform fast Fourier transform images. RESULTS: TSC was significantly higher from half-sinc than from full-sinc acquisitions, ex vivo and in vivo. Ex vivo, half-sinc data more closely matched the reference 3D sequence, indicating improved accuracy. In silico modeling confirmed this was due to shorter TEs minimizing bias caused by relaxation differences between phantoms and tissue. CS was successfully applied to in vivo, half-sinc data, maintaining TSC and image quality (estimated SNR, edge sharpness, and qualitative metrics) with ≥50 NSAs. CONCLUSION: 2D sodium MRI with half-sinc excitation and CS was validated, enabling TSC quantification with 2.25 × 2.25 mm2 resolution and scan times of ≤5 mins

    Sine-Gordon Model - Renormalization Group Solutions and Applications

    Full text link
    The sine-Gordon model is discussed and analyzed within the framework of the renormalization group theory. A perturbative renormalization group procedure is carried out through a decomposition of the sine-Gordon field in slow and fast modes. An effective slow modes's theory is derived and re-scaled to obtain the model's flow equations. The resulting Kosterlitz-Thouless phase diagram is obtained and discussed in detail. The theory's gap is estimated in terms of the sine-Gordon model paramaters. The mapping between the sine-Gordon model and models for interacting electrons in one dimension, such as the g-ology model and Hubbard model, is discussed and the previous renormalization group results, obtained for the sine-Gordon model, are thus borrowed to describe different aspects of Luttinger liquid systems, such as the nature of its excitations and phase transitions. The calculations are carried out in a thorough and pedagogical manner, aiming the reader with no previous experience with the sine-Gordon model or the renormalization group approach.Comment: 44 pages, 7 figure

    P-rex1 cooperates with PDGFRβ to drive cellular migration in 3D microenvironments

    Get PDF
    Expression of the Rac-guanine nucleotide exchange factor (RacGEF), P-Rex1 is a key determinant of progression to metastasis in a number of human cancers. In accordance with this proposed role in cancer cell invasion and metastasis, we find that ectopic expression of P-Rex1 in an immortalised human fibroblast cell line is sufficient to drive multiple migratory and invasive phenotypes. The invasive phenotype is greatly enhanced by the presence of a gradient of serum or platelet-derived growth factor, and is dependent upon the expression of functional PDGF receptor β. Consistently, the invasiveness of WM852 melanoma cells, which endogenously express P-Rex1 and PDGFRβ, is opposed by siRNA of either of these proteins. Furthermore, the current model of P-Rex1 activation is advanced through demonstration of P-Rex1 and PDGFRβ as components of the same macromolecular complex. These data suggest that P-Rex1 has an influence on physiological migratory processes, such as invasion of cancer cells, both through effects upon classical Rac1-driven motility and a novel association with RTK signalling complexes
    corecore