1,372 research outputs found

    Markers of automaticity in sleep-associated consolidation of novel words

    Get PDF
    Two experiments investigated effects of sleep on consolidation and integration of novel form-meaning mappings using size congruity and semantic distance paradigms. Both paradigms have been used in previous studies to measure automatic access to word meanings. When participants compare semantic or physical font size of written word-pairs (e.g. BEE–COW), judgments are typically faster if relative sizes are congruent across both dimensions. Semantic distance effects are also found for wellestablished words, with semantic size judgements faster for pairs that differ substantially on this dimension. English-speaking participants learned novel form-meaning mappings with Mandarin (Experiment 1) or Malay (Experiment 2) words and were tested following overnight sleep or a similar duration awake. Judgements on English words controlled for circadian effects. The sleep group demonstrated selective stronger size congruity and semantic distance effects for novel word-pairs. This benefit occurred in Experiment 1 for semantic size comparisons of novel words, and in Experiment 2 on comparisons where novel pairs had large distances and font differences (for congruity effects) or in congruent trials (for semantic distance effects). Conversely, these effects were equivalent across sleep and wake for English words. Experiment 2 included polysomnography data and revealed that changes in the strength of semantic distance and congruity effects were positively correlated with slow-wave sleep and sleep spindles respectively. These findings support systems consolidation accounts of declarative learning and suggest that sleep plays an active role in integrating new words with existing knowledge, resulting in increased automatic access of the acquired knowledge

    A Study on Causes of Condemnation of Carcass and Organs at Shah Alam Abattoir

    Get PDF
    A two-week study of the causes of condemnation at Shah Alam abattoir was conducted. In the bovine species, liver and lungs w.ere the main organs condemned due to fluke infestation. and emphysema respectively. Ninety-five percent of pig lungs were condemned because of back bleeding, while in sheep caseous lymphadenitis was the major cause of organ condemnedtion affectingg mainly the lungs and lymph nodes. No total carcass condemnation was observed in any species during the study perio

    Spontaneous autologous erythrocyte-rosette formation of lymphocytes from cerebrospinal fluid of a dog with canine distemper.

    Get PDF
    An adult female crossbed dog, with pyrexia, ocular, neurologic and respiratory problems suggestive of distemper, was observed for 28 days. Marked lymphopenia was present on days, 8, 12, and 245, and myoclonus of the fore- and hind-limbs was seen on day 22. At day 24, a cytopahogenic agent with paramyxovirus morphology was isolated from peripheral blood mononuclear cells by co-cultivation with Vero cells. On day 28, cerebrospinal fluid was found to contain 82.7% of lymphocytes and 10% monocytes. About 19% of these lymphocytes formed spontaneous autologous erythrocyte-rosettes. The demonstration of such rosettes (at 4-5 times the level normal for dogs) is unusual. It is possible that is rosette test may be specific for distemper infection. This technique must be further investigated to determine if it can be used as a specific diagnostic test for distemper in dogs

    Experimental Demonstration of Quantum Fully Homomorphic Encryption with Application in a Two-Party Secure Protocol

    Get PDF
    A fully homomorphic encryption system hides data from unauthorized parties while still allowing them to perform computations on the encrypted data. Aside from the straightforward benefit of allowing users to delegate computations to a more powerful server without revealing their inputs, a fully homomorphic cryptosystem can be used as a building block in the construction of a number of cryptographic functionalities. Designing such a scheme remained an open problem until 2009, decades after the idea was first conceived, and the past few years have seen the generalization of this functionality to the world of quantum machines. Quantum schemes prior to the one implemented here were able to replicate some features in particular use cases often associated with homomorphic encryption but lacked other crucial properties, for example, relying on continual interaction to perform a computation or leaking information about the encrypted data. We present the first experimental realization of a quantum fully homomorphic encryption scheme. To demonstrate the versatility of a a quantum fully homomorphic encryption scheme, we further present a toy two-party secure computation task enabled by our scheme

    Experimental Demonstration of Quantum Fully Homomorphic Encryption with Application in a Two-Party Secure Protocol

    Get PDF
    A fully homomorphic encryption system hides data from unauthorized parties, while still allowing them to perform computations on the encrypted data. Aside from the straightforward benefit of allowing users to delegate computations to a more powerful server without revealing their inputs, a fully homomorphic cryptosystem can be used as a building block in the construction of a number of cryptographic functionalities. Designing such a scheme remained an open problem until 2009, decades after the idea was first conceived, and the past few years have seen the generalization of this functionality to the world of quantum machines. Quantum schemes prior to the one implemented here were able to replicate some features in particular use-cases often associated with homomorphic encryption but lacked other crucial properties, for example, relying on continual interaction to perform a computation or leaking information about the encrypted data. We present the first experimental realisation of a quantum fully homomorphic encryption scheme. We further present a toy two-party secure computation task enabled by our scheme. Finally, as part of our implementation, we also demonstrate a post-selective two-qubit linear optical controlled-phase gate with a much higher post-selection success probability (1/2) when compared to alternate implementations, e.g. with post-selective controlled-ZZ or controlled-XX gates (1/9).Comment: 11 pages, 16 figures, 2 table

    Exploring Access and Equity in Malaysia’s Private Higher Education

    Full text link
    Private higher education institutions (PrHEIs) are utilized to complement public provision due to financial constraints faced in public provision. However, increasing private provision has raised interesting questions as to who gets educated in these PrHEIs. Is increasing private supply enlarging the circle of opportunity to reach those who might otherwise have been unable to enter university or college? In other words, has the explosion in private supply translated into greater inclusion or increased exclusion? This paper explores the access and equity issues in Malaysia's private higher education system. Malaysia is an interesting case study due to the significant presence of PrHEIs in the country and their contribution toward student enrolment. The findings show that the Malaysian government has provided considerable financial support for the development of PrHEIs, through the provision of incentives, subsidized loans, and scholarships. Quality assurance efforts further enhance the development of private provision, as student loans and scholarships are only provided for students on accredited programs. Therefore, PrHEIs have widened access and equity, with the help of government support. Despite this, Malaysia's model of providing access and equity through private provision may be unsustainable, due to the poor repayment record of student loans and the economic need to reduce the fiscal deficit of the government

    Plasmodium falciparum ligand binding to erythrocytes induce alterations in deformability essential for invasion

    Get PDF
    The most lethal form of malaria in humans is caused by Plasmodium falciparum. These parasites invade erythrocytes, a complex process involving multiple ligand-receptor interactions. The parasite makes initial contact with the erythrocyte followed by dramatic deformations linked to the function of the Erythrocyte binding antigen family and P. falciparum reticulocyte binding-like families. We show EBA-175 mediates substantial changes in the deformability of erythrocytes by binding to glycophorin A and activating a phosphorylation cascade that includes erythrocyte cytoskeletal proteins resulting in changes in the viscoelastic properties of the host cell. TRPM7 kinase inhibitors FTY720 and waixenicin A block the changes in the deformability of erythrocytes and inhibit merozoite invasion by directly inhibiting the phosphorylation cascade. Therefore, binding of P. falciparum parasites to the erythrocyte directly activate a signaling pathway through a phosphorylation cascade and this alters the viscoelastic properties of the host membrane conditioning it for successful invasion

    Randomised controlled trial of ranitidine versus omeprazole in combination with antibiotics for eradication of Helicobacter pylori.

    Get PDF
    This study compared high dose ranitidine versus low dose omeprazole with antibiotics for the eradication of H pylori. 80 patients (mean age 48 years, range 18-75) who had H pylori infection were randomised in an investigator-blind manner to either a two-week regime of omeprazole 20 mg daily, amoxycillin 500 mg tid and metronidazole 400 mg tid (OAM), or ranitidine 600 mg bd, amoxycillin 500 mg tid and metronidazole 400 mg tid (RAM), or omeprazole 20 mg daily and clarithromycin 500 mg tid (OC), or omeprazole 20 mg daily and placebo (OP). H pylori was eradicated in 6 of 19 patients in the OAM group (32%); 8 of 18 in the RAM group (44%), 4 of 15 in the OC group (27%); none of 18 in the OP group (0%). [< P0.005 for OAM, RAM, OC vs OP; P = N.S. between OAM, RAM, OC]. Overall metronidazole resistance was unexpectedly high at 58%. Eradication rates in metronidazole sensitive patients were 71% (5/7) and 100% (3/3) for OAM and RAM respectively. In conclusion, H pylori eradication rates using high dose ranitidine plus amoxycillin and metronidazole may be similar to that of low dose omeprazole in combination with the same antibiotics for omeprazole with clarithromycin. Overall eradication rates were low due to a high incidence of metronidazole resistance but were higher in metronidazole-sensitive patients. Even high dose ranitidine with two antibiotics achieves a relatively low eradication rate. These metronidazole-based regimens cannot be recommended in areas with a high incidence of metronidazole resistance

    Experimental Demonstration of Quantum Fully Homomorphic Encryption with Application in a Two-Party Secure Protocol

    Get PDF
    A fully homomorphic encryption system hides data from unauthorized parties while still allowing them to perform computations on the encrypted data. Aside from the straightforward benefit of allowing users to delegate computations to a more powerful server without revealing their inputs, a fully homomorphic cryptosystem can be used as a building block in the construction of a number of cryptographic functionalities. Designing such a scheme remained an open problem until 2009, decades after the idea was first conceived, and the past few years have seen the generalization of this functionality to the world of quantum machines. Quantum schemes prior to the one implemented here were able to replicate some features in particular use cases often associated with homomorphic encryption but lacked other crucial properties, for example, relying on continual interaction to perform a computation or leaking information about the encrypted data. We present the first experimental realization of a quantum fully homomorphic encryption scheme. To demonstrate the versatility of a a quantum fully homomorphic encryption scheme, we further present a toy two-party secure computation task enabled by our scheme
    corecore