417 research outputs found
Acute and chronic respiratory effects of sodium borate particulate exposures.
This study examined work-related chronic abnormality in pulmonary function and work-related acute irritant symptoms associated with exposure to borate dust in mining and processing operations. Chronic effects were examined by pulmonary function at the beginning and end of a 7-year interval. Time-specific estimates of sodium borate particulate exposures were used to estimate cumulative exposure during the study interval. Change in pulmonary function over the 7 years was found unrelated to the estimate of cumulative exposure during that interval. Exposure-response associations also were examined with respect to short-term peak exposures and incidence of five symptoms of acute respiratory irritation. Hourly measures of health outcome and continuous measures of particulate exposure were made on each subject throughout the day. Whenever a subject reported one of the irritant symptoms, a symptom intensity score was also recorded along with the approximate time of onset. The findings indicated that exposure-response relationships were present for each of the specific symptoms at several symptom intensity levels. The associations were present when exposure was estimated by both day-long and short-term (15-min) time-weighted average exposures. Associations persisted after taking account of smoking, age, and the presence of a common cold. No significant difference in response rate was found between workers exposed to different types of sodium borate dusts
Quantum authentication with key recycling
We show that a family of quantum authentication protocols introduced in
[Barnum et al., FOCS 2002] can be used to construct a secure quantum channel
and additionally recycle all of the secret key if the message is successfully
authenticated, and recycle part of the key if tampering is detected. We give a
full security proof that constructs the secure channel given only insecure
noisy channels and a shared secret key. We also prove that the number of
recycled key bits is optimal for this family of protocols, i.e., there exists
an adversarial strategy to obtain all non-recycled bits. Previous works
recycled less key and only gave partial security proofs, since they did not
consider all possible distinguishers (environments) that may be used to
distinguish the real setting from the ideal secure quantum channel and secret
key resource.Comment: 38+17 pages, 13 figures. v2: constructed ideal secure channel and
secret key resource have been slightly redefined; also added a proof in the
appendix for quantum authentication without key recycling that has better
parameters and only requires weak purity testing code
Monomeric IgA Antagonizes IgG-Mediated Enhancement of DENV Infection
Dengue virus (DENV) is a prevalent human pathogen, infecting approximately 400 million individuals per year and causing symptomatic disease in approximately 100 million. A distinct feature of dengue is the increased risk for severe disease in some individuals with preexisting DENV-specific immunity. One proposed mechanism for this phenomenon is antibody-dependent enhancement (ADE), in which poorly-neutralizing IgG antibodies from a prior infection opsonize DENV to increase infection of Fc gamma receptor-bearing cells. While IgM and IgG are the most commonly studied DENV-reactive antibody isotypes, our group and others have described the induction of DENV-specific serum IgA responses during dengue. We hypothesized that monomeric IgA would be able to neutralize DENV without the possibility of ADE. To test this, we synthesized IgG and IgA versions of two different DENV-reactive monoclonal antibodies. We demonstrate that isotype-switching does not affect the antigen binding and neutralization properties of the two mAbs. We show that DENV-reactive IgG, but not IgA, mediates ADE in Fc gamma receptor-positive K562 cells. Furthermore, we show that IgA potently antagonizes the ADE activity of IgG. These results suggest that levels of DENV-reactive IgA induced by DENV infection might regulate the overall IgG mediated ADE activity of DENV-immune plasma in vivo, and may serve as a predictor of disease risk
Daylight quantum key distribution over 1.6 km
Quantum key distribution (QKD) has been demonstrated over a point-to-point
-km atmospheric optical path in full daylight. This record
transmission distance brings QKD a step closer to surface-to-satellite and
other long-distance applications.Comment: 4 pages, 2 figures, 1 table. Submitted to PRL on 14 January 2000 for
publication consideratio
Quantum encryption with certified deletion
Given a ciphertext, is it possible to prove the deletion of the underlying
plaintext? Since classical ciphertexts can be copied, clearly such a feat is
impossible using classical information alone. In stark contrast to this, we
show that quantum encodings enable certified deletion. More precisely, we show
that it is possible to encrypt classical data into a quantum ciphertext such
that the recipient of the ciphertext can produce a classical string which
proves to the originator that the recipient has relinquished any chance of
recovering the plaintext should the decryption key be revealed. Our scheme is
feasible with current quantum technology: the honest parties only require
quantum devices for single-qubit preparation and measurements; the scheme is
also robust against noise in these devices. Furthermore, we provide an analysis
that is suitable in the finite-key regime.Comment: 28 pages, 1 figure. Some technical details modifie
Author correction : a global database for metacommunity ecology, integrating species, traits, environment and space
Correction to: Scientific Data https://doi.org/10.1038/s41597-019-0344-7, published online 08 January 202
Author correction : a global database for metacommunity ecology, integrating species, traits, environment and space
Correction to: Scientific Data https://doi.org/10.1038/s41597-019-0344-7, published online 08 January 202
Data visualization in yield component analysis: an expert study
Even though data visualization is a common analytical tool in numerous disciplines, it has rarely been used in agricultural sciences, particularly in agronomy. In this paper, we discuss a study on employing data visualization to analyze a multiplicative model. This model is often used by agronomists, for example in the so-called yield component analysis. The multiplicative model in agronomy is normally analyzed by statistical or related methods. In practice, unfortunately, usefulness of these methods is limited since they help to answer only a few questions, not allowing for a complex view of the phenomena studied. We believe that data visualization could be used for such complex analysis and presentation of the multiplicative model. To that end, we conducted an expert survey. It showed that visualization methods could indeed be useful for analysis and presentation of the multiplicative model
MYD88 mutations identify a molecular subgroup of diffuse large B-cell lymphoma with an unfavorable prognosis
The 2016 World Health Organization classification defines diffuse large B-cell lymphoma (DLBCL) subtypes based on Epstein-Barr virus (EBV) infection and oncogenic rearrangements of MYC/BCL2/BCL6 as drivers of lymphomagenesis. A subset of DLBCL, however, is characterized by activating mutations in MYD88/CD79B. We investigated whether MYD88/CD79B mutations could improve the classification and prognostication of DLBCL. In 250 primary DLBCL, MYD88/CD79B mutations were identified by allele-specific polymerase chain reaction or next-generationsequencing, MYC/BCL2/BCL6 rearrangements were analyzed by fluorescence in situ hybridization, and EBV was studied by EBV-encoded RNA in situ hybridization. Associations of molecular features with clinicopathologic characteristics, outcome, and prognosis according to the International Prognostic Index (IPI) were investigated. MYD88 and CD79B mutations were identified in 29.6% and 12.3%, MYC, BCL2, and BCL6 rearrangements in 10.6%, 13.6%, and 20.3%, and EBV in 11.7% of DLBCL, respectively. Prominent mutual exclusivity between EBV positivity, rearrangements, and MYD88/CD79B mutations established the value of molecular markers for the recognition of biologically distinct DLBCL subtypes. MYD88-mutated DLBCL had a significantly inferior 5-year overall survival than wild-type MYD88 DLBCL (log-rank; P=0.019). DLBCL without any of the studied aberrations had superior overall survival compared to cases carrying .1 aberrancy (log-rank; P=0.010). MYD88 mutations retained their adverse prognostic impact upon adjustment for other genetic and clinical variables by multivariable analysis and improved the prognostic performance of the IPI. This study demonstrates the clinical utility of defining MYD88-mutated DLBCL as a distinct molecular subtype with adverse prognosis. Our data call for sequence analysis of MYD88 in routine diagnostics of DLBCL to optimize classification and prognostication, and to guide the development of improved treatment strategies
Family-based clusters of cognitive test performance in familial schizophrenia
BACKGROUND: Cognitive traits derived from neuropsychological test data are considered to be potential endophenotypes of schizophrenia. Previously, these traits have been found to form a valid basis for clustering samples of schizophrenia patients into homogeneous subgroups. We set out to identify such clusters, but apart from previous studies, we included both schizophrenia patients and family members into the cluster analysis. The aim of the study was to detect family clusters with similar cognitive test performance. METHODS: Test scores from 54 randomly selected families comprising at least two siblings with schizophrenia spectrum disorders, and at least two unaffected family members were included in a complete-linkage cluster analysis with interactive data visualization. RESULTS: A well-performing, an impaired, and an intermediate family cluster emerged from the analysis. While the neuropsychological test scores differed significantly between the clusters, only minor differences were observed in the clinical variables. CONCLUSIONS: The visually aided clustering algorithm was successful in identifying family clusters comprising both schizophrenia patients and their relatives. The present classification method may serve as a basis for selecting phenotypically more homogeneous groups of families in subsequent genetic analyses
- …