167 research outputs found

    Antheraea pernyi Silk Fiber: A Potential Resource for Artificially Biospinning Spider Dragline Silk

    Get PDF
    The outstanding properties of spider dragline silk are likely to be determined by a combination of the primary sequences and the secondary structure of the silk proteins. Antheraea pernyi silk has more similar sequences to spider dragline silk than the silk from its domestic counterpart, Bombyx mori. This makes it much potential as a resource for biospinning spider dragline silk. This paper further verified its possibility as the resource from the mechanical properties and the structures of the A. pernyi silks prepared by forcible reeling. It is surprising that the stress-strain curves of the A. pernyi fibers show similar sigmoidal shape to those of spider dragline silk. Under a controlled reeling speed of 95 mm/s, the breaking energy was 1.04 × 105 J/kg, the tensile strength was 639 MPa and the initial modulus was 9.9 GPa. It should be noted that this breaking energy of the A. pernyi silk approaches that of spider dragline silk. The tensile properties, the optical orientation and the β-sheet structure contents of the silk fibers are remarkably increased by raising the spinning speeds up to 95 mm/s

    Settlement analysis of the giant open caisson during the construction of the Changtai Yangtze River Bridge

    Get PDF
    With the increasing size of open caissons in large-span bridge projects, the overall settlement of giant open caissons is vital to the safe construction of bridge superstructures. Taking the engineering case of the Changtai Yangtze River Bridge, the overall deformation of an open caisson was studied during the construction stage of the bridge’s superstructures. First, the theoretical layer-wise summation method was utilized to analyze the settlement of the open caisson. Then, a 3-D finite element model was established to simulate the installation stage of the bridge superstructure. Finally, a large centrifuge model test was performed to obtain the deformation of the open caisson at each step of bridge’s construction. The results of these approaches demonstrated that final settlements were quite consistent—approximately 225 mm when the bridge superstructure was completely installed—and the settlement deformation curve could be divided into three stages: slowly increasing, rapid, and stabilizing. This study can provide significant guidance for the construction of the Changtai Yangtze River Bridge and be a reference for similar open caisson engineering projects

    LtpA, a CdnL-type CarD regulator, is important for the enzootic cycle of the Lyme disease pathogen

    Get PDF
    Little is known about how Borrelia burgdorferi, the Lyme disease pathogen, adapts and survives in the tick vector. We previously identified a bacterial CarD N-terminal-like (CdnL) protein, LtpA (BB0355), in B. burgdorferi that is preferably expressed at lower temperatures, which is a surrogate condition mimicking the tick portion of the enzootic cycle of B. burgdorferi. CdnL-family proteins, an emerging class of bacterial RNAP-interacting transcription factors, are essential for the viability of Mycobacterium tuberculosis and Myxococcus xanthus. Previous attempts to inactivate ltpA in B. burgdorferi have not been successful. In this study, we report the construction of a ltpA mutant in the infectious strain of B. burgdorferi, strain B31-5A4NP1. Unlike CdnL in M. tuberculosis and M. xanthus, LtpA is dispensable for the viability of B. burgdorferi. However, the ltpA mutant exhibits a reduced growth rate and a cold-sensitive phenotype. We demonstrate that LtpA positively regulates 16S rRNA expression, which contributes to the growth defects in the ltpA mutant. The ltpA mutant remains capable of infecting mice, albeit with delayed infection. Additionally, the ltpA mutant produces markedly reduced spirochetal loads in ticks and was not able to infect mice via tick infection. Overall, LtpA represents a novel regulator in the CdnL family that has an important role in the enzootic cycle of B. burgdorferi

    Privacy-preserving recommendation system based on user classification

    Get PDF
    Recommender systems have become ubiquitous in many application domains such as e-commerce and entertainment to recommend items that are interesting to the users. Collaborative Filtering is one of the most widely known techniques for implementing a recommender system, it models user–item interactions using data such as ratings to predict user preferences, which could potentially violate user privacy and expose sensitive data. Although there exist solutions for protecting user data in recommender systems, such as utilising cryptography, they are less practical due to computational overhead. In this paper, we propose RSUC, a privacy-preserving Recommender System based on User Classification. RSUC incorporates homomorphic encryption for better data confidentiality. To mitigate performance issues, RSUC classifies similar users in groups and computes the recommendation in a group while retaining privacy and accuracy. Furthermore, an optimised approach is applied to RSUC to further reduce communication and computational costs using data packing. Security analysis indicates that RSUC is secure under the semi-honest adversary model. Experimental results show that RSUC achieves 4× performance improvement over the standard approach and offers 54× better overall performance over the existing solution

    Protecting private information for two classes of aggregated database queries

    Get PDF
    An important direction of informatics is devoted to the protection of privacy of confidential information while providing answers to aggregated queries that can be used for analysis of data. Protecting privacy is especially important when aggregated queries are used to combine personal information stored in several databases that belong to different owners or come from different sources. Malicious attackers may be able to infer confidential information even from aggregated numerical values returned as answers to queries over large collections of data. Formal proofs of security guarantees are important, because they can be used for implementing practical systems protecting privacy and providing answers to aggregated queries. The investigation of formal conditions which guarantee protection of private information against inference attacks originates from a fundamental result obtained by Chin and Ozsoyoglu in 1982 for linear queries. The present paper solves similar problems for two new classes of aggregated nonlinear queries. We obtain complete descriptions of conditions, which guarantee the protection of privacy of confidential information against certain possible inference attacks, if a collection of queries of this type are answered. Rigorous formal security proofs are given which guarantee that the conditions obtained ensure the preservation of privacy of confidential data. In addition, we give necessary and sufficient conditions for the protection of confidential information from special inference attacks aimed at achieving a group compromise

    Interferon-γ-Induced Intestinal Epithelial Barrier Dysfunction by NF-κB/HIF-1α Pathway

    Full text link
    Interferon-? (IFN-?) plays an important role in intestinal barrier dysfunction. However, the mechanisms are not fully understood. As hypoxia-inducible factor-1 (HIF-1) is a critical determinant response to hypoxia and inflammation, which has been shown to be deleterious to intestinal barrier function, we hypothesized that IFN-? induces loss of barrier function through the regulation of HIF-1α activation and function. In this study, we detected the expressions of HIF-1α and tight junction proteins in IFN-?-treated T84 intestinal epithelial cell line. IFN-? led to an increase of HIF-1α expression in time- and dose-dependent manners but did not change the expression of HIF-1?. The IFN-?-induced increase in HIF-1α was associated with an activation of NF-?B. Treatment with the NF-?B inhibitor, pyrolidinedithiocarbamate (PDTC), significantly suppressed the activation of NF-?B and the expression of HIF-1α. In addition, IFN-? also increased intestinal epithelial permeability and depletion of tight junction proteins; inhibition of NF-?B or HIF-1α prevented the increase in intestinal permeability and alteration in tight junction protein expressions. Interestingly, we demonstrated that a significant portion of IFN-? activation NF-kB and modulation tight junction expression is mediated through HIF-1α. Taken together, this study suggested that IFN-? induced the loss of epithelial barrier function and disruption of tight junction proteins, by upregulation of HIF-1α expression through NF-?B pathway.Peer Reviewedhttps://deepblue.lib.umich.edu/bitstream/2027.42/140108/1/jir.2013.0044.pd

    6

    Get PDF
    6′-O-galloylpaeoniflorin (GPF), a galloylated derivative of paeoniflorin isolated from peony root, has been proven to possess antioxidant potential. In this present study, we revealed that GPF treatment exerted significant neuroprotection of PC12 cells following OGD, as evidenced by a reduction of oxidative stress, inflammatory response, cellular injury, and apoptosis in vitro. Furthermore, treatment with GPF increased the levels of phosphorylated Akt (p-Akt) and nuclear factor-erythroid 2-related factor 2 (Nrf2), as well as promoted Nrf2 translocation in PC12 cells, which could be inhibited by Ly294002, an inhibitor of phosphoinositide 3-kinase (PI3K). In addition, Nrf2 knockdown or Ly294002 treatment significantly attenuated the antioxidant, anti-inflammatory, and antiapoptotic activities of GPF in vitro. In vivo studies indicated that GPF treatment significantly reduced infarct volume and improved neurological deficits in rats subjected to CIRI, as well as decreased oxidative stress, inflammation, and apoptosis, which could be inhibited by administration of Ly294002. In conclusion, these results revealed that GPF possesses neuroprotective effects against oxidative stress, inflammation, and apoptosis after ischemia-reperfusion insult via activation of the PI3K/Akt/Nrf2 pathway
    corecore