1,943 research outputs found
Introductory Computer Forensics
INTERPOL (International Police) built cybercrime programs to keep up with emerging cyber threats, and aims to coordinate and assist international operations for ?ghting crimes involving computers. Although signi?cant international efforts are being made in dealing with cybercrime and cyber-terrorism, ?nding effective, cooperative, and collaborative ways to deal with complicated cases that span multiple jurisdictions has proven dif?cult in practic
Ni/Ni3C Core-Shell Nanochains and Its Magnetic Properties: One-Step Synthesis at low temperature
One-dimensional Ni/Ni3C core-shell nanoball chains with an average diameter
by around 30 nm were synthesized by means of a mild chemical solution method
using a soft template of trioctylphosphineoxide (TOPO). It was revealed that
the uniform Ni nanochains were capped with Ni3C thin shells by about 1 to 4 nm
in thickness and each Ni core consists of polygrains. The coercivity of the
core-shell nanochains is much enhanced (600 Oe at 5 K) and comparable with
single Ni nanowires due to the one-dimensional shape anisotropy. Deriving from
the distinctive structure of Ni core and Ni3C shell, this architecture may
possess a possible bi-functionality. This unique architecture is also useful
for the study on the magnetization reversal mechanism of one-dimensional
magnetic nanostructure.Comment: 17 pages, 6 figur
Design of Immersed Tunnel and How We Research Submerged Floating Tunnel
This chapter begins with the discussion of the immersed tunnel design, concerning its reason of existence, historical review, general design, transverse and longitudinal design, the interaction, and the critical issues. The discussion is founded on the author’s 10 year experience in building the Hong Kong-Zhuhai-Macao Bridge (HZMB) immersed tunnel as a site design engineer. The experience of building immersed tunnel is transferable to build the submerged floating tunnel, which has never been built. In author’s opinion, the submerged floating tunnel (SFT) technique will be the next generation of IMT technique. In the second part of this chapter, the author proceeds to discuss the strategy of SFT research and the latest development in CCCC SFT Technical Joint Research Team
Hair cell damage recruited Lgr5-expressing cells are hair cell progenitors in neonatal mouse utricle
Damage-activated stem/progenitor cells play important roles in regenerating lost cells and in tissue repair. Previous studies reported that the mouse utricle has limited hair cell regeneration ability after hair cell ablation. However, the potential progenitor cell population regenerating new hair cells remains undiscovered. In this study, we first found that Lgr5, a Wnt target gene that is not usually expressed in the neonatal mouse utricle, can be activated by 24 hour neomycin treatment in a sub-population of supporting cells in the striolar region of the neonatal mouse utricle. Lineage tracing demonstrated that these Lgr5-positive supporting cells could regenerate new hair cells in explant culture. We isolated the damage-activated Lgr5-positive cells with flow cytometry and found that these Lgr5-positive supporting cells could regenerate hair cells in vitro, and self-renew to form spheres, which maintained the capacity to differentiate into hair cells over seven generations of passages. Our results suggest that damage-activated Lgr5-positive supporting cells act as hair cell progenitors in the neonatal mouse utricle, which may help to uncover a potential route to regenerate hair cell in mammals
- …