204 research outputs found

    Memory consolidation in the cerebellar cortex

    Get PDF
    Several forms of learning, including classical conditioning of the eyeblink, depend upon the cerebellum. In examining mechanisms of eyeblink conditioning in rabbits, reversible inactivations of the control circuitry have begun to dissociate aspects of cerebellar cortical and nuclear function in memory consolidation. It was previously shown that post-training cerebellar cortical, but not nuclear, inactivations with the GABA(A) agonist muscimol prevented consolidation but these findings left open the question as to how final memory storage was partitioned across cortical and nuclear levels. Memory consolidation might be essentially cortical and directly disturbed by actions of the muscimol, or it might be nuclear, and sensitive to the raised excitability of the nuclear neurons following the loss of cortical inhibition. To resolve this question, we simultaneously inactivated cerebellar cortical lobule HVI and the anterior interpositus nucleus of rabbits during the post-training period, so protecting the nuclei from disinhibitory effects of cortical inactivation. Consolidation was impaired by these simultaneous inactivations. Because direct application of muscimol to the nuclei alone has no impact upon consolidation, we can conclude that post-training, consolidation processes and memory storage for eyeblink conditioning have critical cerebellar cortical components. The findings are consistent with a recent model that suggests the distribution of learning-related plasticity across cortical and nuclear levels is task-dependent. There can be transfer to nuclear or brainstem levels for control of high-frequency responses but learning with lower frequency response components, such as in eyeblink conditioning, remains mainly dependent upon cortical memory storage

    Glucose Starvation Boosts Entamoeba histolytica Virulence

    Get PDF
    The unicellular parasite, Entamoeba histolytica, is exposed to numerous adverse conditions, such as nutrient deprivation, during its life cycle stages in the human host. In the present study, we examined whether the parasite virulence could be influenced by glucose starvation (GS). The migratory behaviour of the parasite and its capability to kill mammalian cells and to lyse erythrocytes is strongly enhanced following GS. In order to gain insights into the mechanism underlying the GS boosting effects on virulence, we analyzed differences in protein expression levels in control and glucose-starved trophozoites, by quantitative proteomic analysis. We observed that upstream regulatory element 3-binding protein (URE3-BP), a transcription factor that modulates E.histolytica virulence, and the lysine-rich protein 1 (KRiP1) which is induced during liver abscess development, are upregulated by GS. We also analyzed E. histolytica membrane fractions and noticed that the Gal/GalNAc lectin light subunit LgL1 is up-regulated by GS. Surprisingly, amoebapore A (Ap-A) and cysteine proteinase A5 (CP-A5), two important E. histolytica virulence factors, were strongly down-regulated by GS. While the boosting effect of GS on E. histolytica virulence was conserved in strains silenced for Ap-A and CP-A5, it was lost in LgL1 and in KRiP1 down-regulated strains. These data emphasize the unexpected role of GS in the modulation of E.histolytica virulence and the involvement of KRiP1 and Lgl1 in this phenomenon

    Testing for Fictive Learning in Decision-Making Under Uncertainty

    Get PDF
    We conduct two experiments where subjects make a sequence of binary choices between risky and ambiguous binary lotteries. Risky lotteries are defined as lotteries where the relative frequencies of outcomes are known. Ambiguous lotteries are lotteries where the relative frequencies of outcomes are not known or may not exist. The trials in each experiment are divided into three phases: pre-treatment, treatment and post-treatment. The trials in the pre-treatment and post-treatment phases are the same. As such, the trials before and after the treatment phase are dependent, clustered matched-pairs, that we analyze with the alternating logistic regression (ALR) package in SAS. In both experiments, we reveal to each subject the outcomes of her actual and counterfactual choices in the treatment phase. The treatments differ in the complexity of the random process used to generate the relative frequencies of the payoffs of the ambiguous lotteries. In the first experiment, the probabilities can be inferred from the converging sample averages of the observed actual and counterfactual outcomes of the ambiguous lotteries. In the second experiment the sample averages do not converge. If we define fictive learning in an experiment as statistically significant changes in the responses of subjects before and after the treatment phase of an experiment, then we expect fictive learning in the first experiment, but no fictive learning in the second experiment. The surprising finding in this paper is the presence of fictive learning in the second experiment. We attribute this counterintuitive result to apophenia: “seeing meaningful patterns in meaningless or random data.” A refinement of this result is the inference from a subsequent Chi-squared test, that the effects of fictive learning in the first experiment are significantly different from the effects of fictive learning in the second experiment

    An ex-vivo Human Intestinal Model to Study Entamoeba histolytica Pathogenesis

    Get PDF
    Amoebiasis (a human intestinal infection affecting 50 million people every year) is caused by the protozoan parasite Entamoeba histolytica. To study the molecular mechanisms underlying human colon invasion by E. histolytica, we have set up an ex vivo human colon model to study the early steps in amoebiasis. Using scanning electron microscopy and histological analyses, we have established that E. histolytica caused the removal of the protective mucus coat during the first two hours of incubation, detached the enterocytes, and then penetrated into the lamina propria by following the crypts of Lieberkühn. Significant cell lysis (determined by the release of lactodehydrogenase) and inflammation (marked by the secretion of pro-inflammatory molecules such as interleukin 1 beta, interferon gamma, interleukin 6, interleukin 8 and tumour necrosis factor) were detected after four hours of incubation. Entamoeba dispar (a closely related non-pathogenic amoeba that also colonizes the human colon) was unable to invade colonic mucosa, lyse cells or induce an inflammatory response. We also examined the behaviour of trophozoites in which genes coding for known virulent factors (such as amoebapores, the Gal/GalNAc lectin and the cysteine protease 5 (CP-A5), which have major roles in cell death, adhesion (to target cells or mucus) and mucus degradation, respectively) were silenced, together with the corresponding tissue responses. Our data revealed that the signalling via the heavy chain Hgl2 or via the light chain Lgl1 of the Gal/GalNAc lectin is not essential to penetrate the human colonic mucosa. In addition, our study demonstrates that E. histolytica silenced for CP-A5 does not penetrate the colonic lamina propria and does not induce the host's pro-inflammatory cytokine secretion

    Always Have a Backup Plan: Fully Secure Synchronous MPC with Asynchronous Fallback

    Get PDF
    Protocols for secure Multi-Party Computation (MPC) can be classified according to the underlying communication model. Two prominent communication models considered in the literature are the synchronous and asynchronous models, which considerably differ in terms of the achievable security guarantees. Synchronous MPC protocols can achieve the optimal corruption threshold n/2n/2 and allow every party to give input, but become completely insecure when synchrony assumptions are violated. On the other hand, asynchronous MPC protocols remain secure under arbitrary network conditions, but can tolerate only n/3n/3 corruptions and parties with slow connections unavoidably cannot give input. A natural question is whether there exists a protocol for MPC that can tolerate up to ts<n/2t_s < n/2 corruptions under a synchronous network and ta<n/3t_a < n/3 corruptions even when the network is asynchronous. We answer this question by showing tight feasibility and impossibility results. More specifically, we show that such a protocol exists if and only if ta+2ts<nt_a + 2t_s < n and the number of inputs taken into account under an asynchronous network is at most ntsn-t_s

    Global analysis of gene expression in response to L-Cysteine deprivation in the anaerobic protozoan parasite Entamoeba histolytica

    Get PDF
    <p>Abstract</p> <p>Background</p> <p><it>Entamoeba histolytica</it>, an enteric protozoan parasite, causes amebic colitis and extra intestinal abscesses in millions of inhabitants of endemic areas. <it>E. histolytica </it>completely lacks glutathione metabolism but possesses L-cysteine as the principle low molecular weight thiol. L-Cysteine is essential for the structure, stability, and various protein functions, including catalysis, electron transfer, redox regulation, nitrogen fixation, and sensing for regulatory processes. Recently, we demonstrated that in <it>E. histolytica</it>, L-cysteine regulates various metabolic pathways including energy, amino acid, and phospholipid metabolism.</p> <p>Results</p> <p>In this study, employing custom-made Affymetrix microarrays, we performed time course (3, 6, 12, 24, and 48 h) gene expression analysis upon L-cysteine deprivation. We identified that out of 9,327 genes represented on the array, 290 genes encoding proteins with functions in metabolism, signalling, DNA/RNA regulation, electron transport, stress response, membrane transport, vesicular trafficking/secretion, and cytoskeleton were differentially expressed (≥3 fold) at one or more time points upon L-cysteine deprivation. Approximately 60% of these modulated genes encoded proteins of no known function and annotated as hypothetical proteins. We also attempted further functional analysis of some of the most highly modulated genes by L-cysteine depletion.</p> <p>Conclusions</p> <p>To our surprise, L-cysteine depletion caused only limited changes in the expression of genes involved in sulfur-containing amino acid metabolism and oxidative stress defense. In contrast, we observed significant changes in the expression of several genes encoding iron sulfur flavoproteins, a major facilitator super-family transporter, regulator of nonsense transcripts, NADPH-dependent oxido-reductase, short chain dehydrogenase, acetyltransferases, and various other genes involved in diverse cellular functions. This study represents the first genome-wide analysis of transcriptional changes induced by L-cysteine deprivation in protozoan parasites, and in eukaryotic organisms where L-cysteine represents the major intracellular thiol.</p

    Black-Box Transformations from Passive to Covert Security with Public Verifiability

    Get PDF
    In the context of secure computation, protocols with security against covert adversaries ensure that any misbehavior by malicious parties will be detected by the honest parties with some constant probability. As such, these protocols provide better security guarantees than passively secure protocols and, moreover, are easier to construct than protocols with full security against active adversaries. Protocols that, upon detecting a cheating attempt, allow the honest parties to compute a certificate that enables third parties to verify whether an accused party misbehaved or not are called publicly verifiable. In this work, we present the first generic compilers for constructing two-party protocols with covert security and public verifiability from protocols with passive security. We present two separate compilers, which are both fully blackbox in the underlying protocols they use. Both of them only incur a constant multiplicative factor in terms of bandwidth overhead and a constant additive factor in terms of round complexity on top of the passively secure protocols they use. The first compiler applies to all two-party protocols that have no private inputs. This class of protocols covers the important class of preprocessing protocols that are used to setup correlated randomness among parties. We use our compiler to obtain the first secret-sharing based two-party protocol with covert security and public verifiability. Notably, the produced protocol achieves public verifiability essentially for free when compared with the best known previous solutions based on secret-sharing that did not provide public verifiability Our second compiler constructs protocols with covert security and public verifiability for arbitrary functionalities from passively secure protocols. It uses our first compiler to perform a setup phase, which is independent of the parties\u27 inputs as well as the protocol they would like to execute. Finally, we show how to extend our techniques to obtain multiparty computation protocols with covert security and public verifiability against arbitrary constant fractions of corruptions

    The Interplay between Entamoeba and Enteropathogenic Bacteria Modulates Epithelial Cell Damage

    Get PDF
    In amoebiasis, a human disease that is a serious health problem in many developing countries, efforts have been made to identify responsible factors for the tissue damage inflicted by the parasite Entamoeba histolytica. This amoeba lives in the lumen of the colon without causing damage to the intestinal mucosa, but under unknown circumstances becomes invasive, destroying the intestinal tissue. Bacteria in the intestinal flora have been proposed as inducers of higher amoebic virulence, but the causes or mechanisms responsible for the induction are still undetermined. Mixed intestinal infections with Entamoeba histolytica and enteropathogenic bacteria, showing exacerbated manifestations of disease, are common in endemic countries. We implemented an experimental system to study amoebic virulence in the presence of pathogenic bacteria and its consequences on epithelial cells. Results showed that amoebae that ingested enteropathogenic bacteria became more virulent, causing more damage to epithelial cells. Bacteria induced release of inflammatory proteins by the epithelial cells that attracted amoebae, facilitating amoebic contact to the epithelial cells and higher damage. Our results, although a first approach to this complex problem, provide insights into amoebic infections, as interplay with other pathogens apparently influences the intestinal environment, the behavior of cells involved and the manifestations of the disease
    corecore