2,739 research outputs found

    A high performance scanning force microscope head design

    Get PDF
    A stable and highly sensitive scanning force microscope head design is presented. The head provides an implementation of the optical lever detection method in which mechanical vibration noise has been minimized

    CLAVATA3 is a specific regulator of shoot and floral meristem development affecting the same processes as CLAVATA1

    Get PDF
    We have previously described the phenotype of Arabidopsis thaliana plants with mutations at the CLAVATA1 (CLV1) locus (Clark, S. E., Running, M. P. and Meyerowitz, E. M. (1993) Development 119, 397-418). Our investigations demonstrated that clv1 plants develop enlarged vegetative and inflorescence apical meristems, and enlarged and indeterminate floral meristems. Here, we present an analysis of mutations at a separate locus, CLAVATA3(CLV3), that disrupt meristem development in a manner similar to clv1mutations. clv3 plants develop enlarged apical meristems as early as the mature embryo stage. clv3 floral meristems are also enlarged compared with wild type, and maintain a proliferating meristem throughout flower development. clv3 root meristems are unaffected, indicating that CLV3 is a specific regulator of shoot and floral meristem development. We demonstrate that the strong clv3-2 mutant is largely epistatic to clv1 mutants, and that the semi-dominance of clv1 alleles is enhanced by double heterozygosity with clv3 alleles, suggesting that these genes work in the same pathway to control meristem development. We propose that CLV1 and CLV3 are required to promote the differentiation of cells at the shoot and floral meristem

    The CLAVATA and SHOOT MERISTEMLESS loci competitively regulate meristem activity in Arabidopsis

    Get PDF
    The CLAVATA (CLV1 and CLV3) and SHOOT MERISTEMLESS (STM) genes specifically regulate shoot meristem development in Arabidopsis. CLV and STH appear to have opposite functions: c1v1 and Clv3 mutants accumulate excess undifferentiated cells in the shoot and floral meristem, while stm mutants fail to form the undifferentiated cells of the shoot meristem during embryonic development. We have identified a weak allele of stm (stm-2) that reveals STM is not only required for the establish- ment of the shoot meristem, but is also required for the continued maintenance of undifferentiated cells in the shoot meristem and for proper proliferation of cells in the floral meristem. We have found evidence of genetic interactions between the CLV and STM loci. clv1 and c1v3 mutations partially suppressed the stm-1 and stm-2 phenotypes, and were capable of suppression in a dominant fashion. clv stm double mutants and plants homozygous for stm but heterozygous for clv, while still lacking an embryonic shoot meristem, exhibited greatly enhanced postembryonic shoot and floral meristem development. Although stm phenotypes are recessive, stm mutations dominantly suppressed clv homozygous and heterozygous phenotypes. These results indicate that the stm phenotype is sensitive to the levels of CLV activity, while the clv phenotype is sensitive to the level of STM activity. We propose that these genes play related but opposing roles in the regulation of cell division and/or cell differentiation in shoot and floral meristems

    CLAVATA1, a regulator of meristem and flower development in Arabidopsis

    Get PDF
    We have investigated the effects on plant development of mutations in the Arabidopsis thaliana CLAVATA1 gene. In clavata1 plants, vegetative, inflorescence and floral meristems are all enlarged relative to wild type. The apical meristem can fasciate in the more severe mutant alleles, and this fasciation can occur prior to the transition to flowering. Flowers of clavata1 plants can have increased numbers of organs in all four whorls, and can also have additional whorls not present in wild-type flowers. Double mutant combinations of clavata1 with agamous, apetala2, apetala3 and pistillata indicate that CLAVATA1 controls the underlying floral meristem structure upon which these homeotic genes act. Double mutant combinations of clavata1 with apetala1 and leafy indicate CLAVATA1 plays a role in establishing and maintaining floral meristem identity, in addition to its role in controlling meristem size. In support of this, RNA expression patterns of AGAMOUS and APETALA1 are altered in clavata1 flowers

    Law-Based Arguments and Messages to Advocate for Later School Start Time Policies in the United States

    Get PDF
    The increasing scientific evidence that early school start times are harmful to the health and safety of teenagers has generated much recent debate about changing school start times policies for adolescent students. Although efforts to promote and implement such changes have proliferated in the United States in recent years, they have rarely been supported by law-based arguments and messages that leverage the existing legal infrastructure regulating public education and child welfare in the United States. Furthermore, the legal bases to support or resist such changes have not been explored in detail to date. This article provides an overview of how law-based arguments and messages can be constructed and applied to advocate for later school start time policies in U.S. public secondary schools. The legal infrastructure impacting school start time policies in the United States is briefly reviewed, including descriptions of how government regulates education, what legal obligations school officials have concerning their students\u27 welfare, and what laws and public policies currently exist that address adolescent sleep health and safety. On the basis of this legal infrastructure, some hypothetical examples of law-based arguments and messages that could be applied to various types of advocacy activities (e.g., litigation, legislative and administrative advocacy, media and public outreach) to promote later school start times are discussed. Particular consideration is given to hypothetical arguments and messages aimed at emphasizing the consistency of later school start time policies with existing child welfare law and practices, legal responsibilities of school officials and governmental authorities, and societal values and norms

    On the functions, mechanisms, and malfunctions of intracortical contextual modulation

    Get PDF
    A broad neuron-centric conception of contextual modulation is reviewed and re-assessed in the light of recent neurobiological studies of amplification, suppression, and synchronization. Behavioural and computational studies of perceptual and higher cognitive functions that depend on these processes are outlined, and evidence that those functions and their neuronal mechanisms are impaired in schizophrenia is summarized. Finally, we compare and assess the long-term biological functions of contextual modulation at the level of computational theory as formalized by the theories of coherent infomax and free energy reduction. We conclude that those theories, together with the many empirical findings reviewed, show how contextual modulation at the neuronal level enables the cortex to flexibly adapt the use of its knowledge to current circumstances by amplifying and grouping relevant activities and by suppressing irrelevant activities

    Lawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet

    Get PDF
    For years, legal wiretapping was straightforward: the officer doing the intercept connected a tape recorder or the like to a single pair of wires. By the 1990s, however, the changing structure of telecommunications—there was no longer just “Ma Bell” to talk to—and new technologies such as ISDN and cellular telephony made executing a wiretap more complicated for law enforcement. Simple technologies would no longer suffice. In response, Congress passed the Communications Assistance for Law Enforcement Act (CALEA) which mandated a standardized lawful intercept interface on all local phone switches. Since its passage, technology has continued to progress, and in the face of new forms of communication—Skype, voice chat during multiplayer online games, instant messaging, etc.—law enforcement is again experiencing problems. The FBI has called this “Going Dark”: their loss of access to suspects’ communication. According to news reports, law enforcement wants changes to the wiretap laws to require a CALEA-like interface in Internet software. CALEA, though, has its own issues: it is complex software specifically intended to create a security hole—eavesdropping capability—in the already-complex environment of a phone switch. It has unfortunately made wiretapping easier for everyone, not just law enforcement. Congress failed to heed experts’ warnings of the danger posed by this mandated vulnerability, and time has proven the experts right. The so-called “Athens Affair,” where someone used the built-in lawful intercept mechanism to listen to the cell phone calls of high Greek officials, including the Prime Minister, is but one example. In an earlier work, we showed why extending CALEA to the Internet would create very serious problems, including the security problems it has visited on the phone system. In this paper, we explore the viability and implications of an alternative method for addressing law enforcements need to access communications: legalized hacking of target devices through existing vulnerabilities in end-user software and platforms. The FBI already uses this approach on a small scale; we expect that its use will increase, especially as centralized wiretapping capabilities become less viable. Relying on vulnerabilities and hacking poses a large set of legal and policy questions, some practical and some normative. Among these are: (1) Will it create disincentives to patching? (2) Will there be a negative effect on innovation? (Lessons from the so-called “Crypto Wars” of the 1990s, and in particular the debate over export controls on cryptography, are instructive here.) (3) Will law enforcement’s participation in vulnerabilities purchasing skew the market? (4) Do local and even state law enforcement agencies have the technical sophistication to develop and use exploits? If not, how should this be handled? A larger FBI role? (5) Should law enforcement even be participating in a market where many of the sellers and other buyers are themselves criminals? (6) What happens if these tools are captured and repurposed by miscreants? (7) Should we sanction otherwise illegal network activity to aid law enforcement? (8) Is the probability of success from such an approach too low for it to be useful? As we will show, these issues are indeed challenging. We regard the issues raised by using vulnerabilities as, on balance, preferable to adding more complexity and insecurity to online systems

    A Pathway to Solving the Structure of cl-Par-4 Tumor Suppressor Protein: Challenges & Findings

    Get PDF
    Prostate apoptosis response-4 (Par-4) is a pro-apoptotic tumor suppressor protein. Down-regulation of this protein has been reported in a myriad of cancers. Conversely, up-regulation of Par-4 is found to be associated with several neurodegenerative disorders. Par-4 is unique in the sense it can selectively induce apoptosis in cancer cells. For this, caspase-dependent intracellular cleavage of Par-4 is essential to produce the functionally active fragment, cl-Par-4 (caspase-cleaved Par-4). The cl-Par-4 protein inhibits the NF-κB-mediated cell survival pathway and causes selective apoptosis in various tumor cells. Our laboratory is interested in determining the structure of cl-Par-4 and understanding it’s interaction with various proteins. Currently, we are using biophysical techniques such as circular dichroism (CD) spectroscopy, dynamic light scattering (DLS), and SDS-PAGE to characterize the structure of cl-Par-4 in the presence of various concentrations of monovalent and divalent ions, in order to shed light on the possible ion-specific role of cl-Par-4 in inducing structure and self-association of this protein. Results show that effects on cl-Par-4 conformation are ion-specific, and effects of divalent cations are considerably more pronounced than effects from monovalent cations. We have also found that the cl-Par-4 shows a better stability in presence of Cl- ions than in presence of SO42- ions. Further, with the help of D313K mutant of cl-Par-4, we investigated that charge-charge repulsion between similar charged amino acid residues in leucine zipper is responsible for high salt at neutral pH or low salt at low pH requirement of cl-Par-4. All these findings will be helpful in getting the structured conformation of cl-Par-4 and, therefore, determining the structure of this protein via X-ray crystallography or via nuclear magnetic resonance (NMR).https://digitalcommons.odu.edu/gradposters2022_sciences/1013/thumbnail.jp
    corecore