1,895 research outputs found

    Tenth-order lepton g-2: Contribution from diagrams containing a sixth-order light-by-light-scattering subdiagram internally

    Full text link
    This paper reports the result of our evaluation of the tenth-order QED correction to the lepton g-2 from Feynman diagrams which have sixth-order light-by-light-scattering subdiagrams, none of whose vertices couple to the external magnetic field. The gauge-invariant set of these diagrams, called Set II(e), consists of 180 vertex diagrams. In the case of the electron g-2 (a_e), where the light-by-light subdiagram consists of the electron loop, the contribution to a_e is found to be - 1.344 9 (10) (\alpha /\pi)^5. The contribution of the muon loop to a_e is - 0.000 465 (4) (\alpha /\pi)^5. The contribution of the tau-lepton loop is about two orders of magnitudes smaller than that of the muon loop and hence negligible. The sum of all of these contributions to a_e is - 1.345 (1) (\alpha /\pi)^5. We have also evaluated the contribution of Set II(e) to the muon g-2 (a_\mu). The contribution to a_\mu from the electron loop is 3.265 (12) (\alpha /\pi)^5, while the contribution of the tau-lepton loop is -0.038 06 (13) (\alpha /\pi)^5. The total contribution to a_\mu, which is the sum of these two contributions and the mass-independent part of a_e, is 1.882 (13) (\alpha /\pi)^5.Comment: 18 pages, 3 figures, REVTeX4, axodraw.sty used, changed title, corrected uncertainty of a_mu, added a referenc

    Protective Effects of Bacterial Immunostimulants, OK-432 and LC 9018 on Pseudomonas aeruginosa Infection in Tumor-Bearing Mice

    Get PDF
    Survival rates among sarcoma-180 bearing mice against Pseudomonas aeruginosa infection were fewer than those among normal mice. However, the mortality of tumorbearing mice against the infection was reduced in case of administration of bacterial immunostimulants such as OK-432 and LC 9018

    Updatable Public Key Encryption with Strong CCA Security: Security Analysis and Efficient Generic Construction

    Get PDF
    With applications in secure messaging, Updatable Public Key Encryption (UPKE) was proposed by Jost et al. (EUROCRYPT \u2719) and Alwen et al. (CRYPTO \u2720). It is a natural relaxation of forward-secure public-key encryption. In UPKE, we can update secret keys by using update ciphertexts which any sender can generate. The UPKE schemes proposed so far that satisfy the strong CCA security are Haidar et al.\u27s concrete construction (CCS \u2722) and Dodis et al\u27s generic construction that use Non-Interactive Zero-Knowledge (NIZK) arguments. Yet, even despite the aid of random oracles, their concrete efficiency is quite far from the most efficient CPA-secure scheme. In this paper, we first demonstrate a simple and efficient attack against Dodis et al.\u27s strongly CCA-secure scheme, and show how to fix it. Then, based on the observation from the attack and fix, we propose a new strongly CCA-secure generic construction for a UPKE scheme with random oracles and show that its instantiation is almost as concretely efficient as the most efficient CPA-secure one

    NOD1-Mediated Mucosal Host Defense against Helicobacter pylori

    Get PDF
    Infection of the stomach with Helicobacter pylori is an important risk factor for gastritis, peptic ulcer, and gastric carcinoma. Although it has been well established that persistent colonization by H. pylori is associated with adaptive Th1 responses, the innate immune responses leading to these Th1 responses are poorly defined. Recent studies have shown that the activation of nucleotide-binding oligomerization domain 1 (NOD1) in gastric epithelial cells plays an important role in innate immune responses against H. pylori. The detection of H. pylori-derived ligands by cytosolic NOD1 induces several host defense factors, including antimicrobial peptides, cytokines, and chemokines. In this paper, we review the molecular mechanisms by which NOD1 contributes to mucosal host defense against H. pylori infection of the stomach
    corecore