995 research outputs found

    Apsidal Motion of the Massive, Benchmark Eclipsing Binary V578 Mon

    Full text link
    V578 Mon is a system of two early B-type stars in the Rosette Nebula star-forming region (NGC 2244), and is one of only nine eclipsing binaries with component masses greater than 10 M\odot whose physical parameters have been determined with an accuracy of better than 3%. It is therefore a benchmark system for evolutionary and stellar structure models of newly formed massive stars. Combining our multi-band light curves spanning 40 yr with previous light curve data from the literature, we fit a model light curve that for the first time includes the effects of apsidal motion of the system. We measure an apsidal period of 33.48+0.10-0.06 yr. As a consequence of incorporating the apsidal motion into the modeling of the system's orbital parameters, we determine an updated eccentricity of e = 0.07755+0.00022-0.00027, which differs significantly from the value previously reported in the literature. Evidently, the inclusion of apsidal motion in the light curve modeling significantly affects the eccentricity determination. Incorporating these key parameters into a comprehensive model of the system's physical parameters-including internal structure constraints- will bring V578 Mon to the next level of benchmark precision and utility.Comment: 17 pages, 7 figures, to appear in the Astronomical Journa

    Excessive anticoagulation identified by emergency medical service through point-of-care coagulometry

    Get PDF
    Bleeding because of excessive anticoagulation is a well-recognized complication of coumadin therapy. In cases of potentially life-threatening bleeding such as intracranial haemorrhage, reversal of anticoagulation should be carried out as soon as possible. Here we report the case of an emergency patient in whom excessive anticoagulation was diagnosed at the scene by emergency medical service personnel through the use of a point-of-care coagulometer. Following hospital admission, findings were confirmed by central laboratory assessment of prothrombin time. The time gained through the use of portable coagulometers may contribute to improved pre-hospital emergency management of anticoagulated patients

    Ancient DNA reveals the timing and persistence of organellar genetic bottlenecks over 3,000 years of sunflower domestication and improvement

    Get PDF
    Here, we report a comprehensive paleogenomic study of archaeological and ethnographic sunflower remains that provides significant new insights into the process of domestication of this important crop. DNA from both ancient and historic contexts yielded high proportions of endogenous DNA, and although archaeological DNA was found to be highly degraded, it still provided sufficient coverage to analyze genetic changes over time. Shotgun sequencing data from specimens from the Eden's Bluff archaeological site in Arkansas yielded organellar DNA sequence from specimens up to 3,100 years old. Their sequences match those of modern cultivated sunflowers and are consistent with an early domestication bottleneck in this species. Our findings also suggest that recent breeding of sunflowers has led to a loss of genetic diversity that was present only a century ago in Native American landraces. These breeding episodes also left a profound signature on the mitochondrial and plastid haplotypes in cultivars, as two types were intentionally introduced from other Helianthus species for crop improvement. These findings gained from ancient and historic sunflower specimens underscore how future in-depth gene-based analyses can advance our understanding of the pace and targets of selection during the domestication of sunflower and other crop species

    Nanoscale mobility mapping in semiconducting polymer films

    Get PDF
    This work was supported by grant No 19-12-00066 of the Russian Science Foundation.Local electrical properties of thin films of the polymer PTB7 are studied by conductive atomic force microscopy (C-AFM). Non-uniform nanoscale current distribution in the neat PTB7 film is revealed and connected with the existence of ordered PTB7 crystallites. The shape of local I-V curves is explained by the presence of space charge limited current. We modify an existing semi-empirical model for estimation of the nanoscale hole mobility from our experimental C-AFM measurements. The procedure of nanoscale charge mobility estimation was described and applied to the PTB7 films. The calculated average C-AFM hole mobility is in good agreement with macroscopic values reported for this material. Mapping of nanoscale hole mobility was achieved using the described procedure. Local mobility values, influenced by nanoscale structure, vary more than two times in value and have a root-mean-square value 0.22 × 10−8 m2/(Vs), which is almost 20% from average hole mobility.PostprintPeer reviewe

    Common activation of canonical Wnt signaling in pancreatic adenocarcinoma.

    Get PDF
    Pancreatic ductal adenocarcinoma (PDA) is an extremely aggressive malignancy, which carries a dismal prognosis. Activating mutations of the Kras gene are common to the vast majority of human PDA. In addition, recent studies have demonstrated that embryonic signaling pathway such as Hedgehog and Notch are inappropriately upregulated in this disease. The role of another embryonic signaling pathway, namely the canonical Wnt cascade, is still controversial. Here, we use gene array analysis as a platform to demonstrate general activation of the canonical arm of the Wnt pathway in human PDA. Furthermore, we provide evidence for Wnt activation in mouse models of pancreatic cancer. Our results also indicate that Wnt signaling might be activated downstream of Hedgehog signaling, which is an early event in PDA evolution. Wnt inhibition blocked proliferation and induced apoptosis of cultured adenocarcinoma cells, thereby providing evidence to support the development of novel therapeutical strategies for Wnt inhibition in pancreatic adenocarcinoma

    Recognizing Treelike k-Dissimilarities

    Full text link
    A k-dissimilarity D on a finite set X, |X| >= k, is a map from the set of size k subsets of X to the real numbers. Such maps naturally arise from edge-weighted trees T with leaf-set X: Given a subset Y of X of size k, D(Y) is defined to be the total length of the smallest subtree of T with leaf-set Y . In case k = 2, it is well-known that 2-dissimilarities arising in this way can be characterized by the so-called "4-point condition". However, in case k > 2 Pachter and Speyer recently posed the following question: Given an arbitrary k-dissimilarity, how do we test whether this map comes from a tree? In this paper, we provide an answer to this question, showing that for k >= 3 a k-dissimilarity on a set X arises from a tree if and only if its restriction to every 2k-element subset of X arises from some tree, and that 2k is the least possible subset size to ensure that this is the case. As a corollary, we show that there exists a polynomial-time algorithm to determine when a k-dissimilarity arises from a tree. We also give a 6-point condition for determining when a 3-dissimilarity arises from a tree, that is similar to the aforementioned 4-point condition.Comment: 18 pages, 4 figure

    Benchmarking Crimes: An Emerging Threat in Systems Security

    Get PDF
    Properly benchmarking a system is a difficult and intricate task. Unfortunately, even a seemingly innocuous benchmarking mistake can compromise the guarantees provided by a given systems security defense and also put its reproducibility and comparability at risk. This threat is particularly insidious as it is generally not a result of malice and can easily go undetected by both authors and reviewers. Moreover, as modern defenses often trade off security for performance in an attempt to find an ideal design point in the performance-security space, the damage caused by benchmarking mistakes is increasingly worrisome. To analyze the magnitude of the phenomenon, we identify a set of 22 "benchmarking crimes" that threaten the validity of systems security evaluations and perform a survey of 50 defense papers published in top venues. To ensure the validity of our results, we perform the complete survey twice, with two independent readers. We find only a very small number of disagreements between readers, showing that our assessment of benchmarking crimes is highly reproducible. We show that benchmarking crimes are widespread even in papers published at tier-1 venues. We find that tier-1 papers commit an average of five benchmarking crimes and we find only a single paper in our sample that committed no benchmarking crimes. Moreover, we find that the scale of the problem is constant over time, suggesting that the community is not yet addressing it despite the problem being now more relevant than ever. This threatens the scientific process, which relies on reproducibility and comparability to ensure that published research advances the state of the art. We hope to raise awareness of these issues and provide recommendations to improve benchmarking quality and safeguard the scientific process in our community. Computer Systems, Imagery and Medi

    Static analysis of device drivers: we can do better!

    No full text
    We argue that the device driver architecture enforced by current operating systems complicates both manual and automatic reasoning about driver behaviour. In particular, it makes it hard and in some cases impossible to statically verify that the driver correctly interacts with the rest of the kernel. This limitation cannot be addressed solely via better verification tools. We maintain that qualitative improvement in the effectiveness of static driver verification must rely on an improved driver architecture, leading to drivers that are easier to write, understand, and verify. To support our claims, we present a device driver architecture, called active drivers, that satisfies these requirements. We outline our methodology for specifying and verifying active driver protocols using existing model checking tools and describe initial experimental results. © 2011 ACM
    corecore