2,145 research outputs found

    Osteoblast interactions within a biomimetic apatite microenvironment.

    Get PDF
    Numerous reports have shown that accelerated apatites can mediate osteoblastic differentiation in vitro and bone formation in vivo. However, how cells interact within the apatite microenvironment remains largely unclear, despite the vast literature available today. In response, this study evaluates the in vitro interactions of a well-characterized osteoblast cell line (MC3T3-E1) with the apatite microenvironment. Specifically, cell attachment, spreading, and viability were evaluated in the presence and absence of serum proteins. Proteins were found to be critical in the mediation of cell-apatite interactions, as adherence of MC3T3-E1 cells to apatite surfaces without protein coatings resulted in significant levels of cell death within 24 h in serum-free media. In the absence of protein-apatite interaction, cell viability could be "rescued" upon treatment of MC3T3-E1 cells with inhibitors to phosphate (PO(4) (3-)) transport, suggesting that PO(4) (3-) uptake may play a role in viability. In contrast, rescue was not observed upon treatment with calcium (Ca(2+)) channel inhibitors. Interestingly, a rapid "pull-down" of extracellular Ca(2+) and PO(4) (3-) ions onto the apatite surface could be measured upon the incubation of apatites with α-MEM, suggesting that cells may be subject to changing levels of Ca(2+) and PO(4) (3-) within their microenvironment. Therefore, the biomimetic apatite surface may significantly alter the microenvironment of adherent osteoblasts and, as such, be capable of affecting both cell survival and differentiation

    How Do Tor Users Interact With Onion Services?

    Full text link
    Onion services are anonymous network services that are exposed over the Tor network. In contrast to conventional Internet services, onion services are private, generally not indexed by search engines, and use self-certifying domain names that are long and difficult for humans to read. In this paper, we study how people perceive, understand, and use onion services based on data from 17 semi-structured interviews and an online survey of 517 users. We find that users have an incomplete mental model of onion services, use these services for anonymity and have varying trust in onion services in general. Users also have difficulty discovering and tracking onion sites and authenticating them. Finally, users want technical improvements to onion services and better information on how to use them. Our findings suggest various improvements for the security and usability of Tor onion services, including ways to automatically detect phishing of onion services, more clear security indicators, and ways to manage onion domain names that are difficult to remember.Comment: Appeared in USENIX Security Symposium 201

    System and Method for Scan Range Gating

    Get PDF
    A system for scanning light to define a range gated signal includes a pulsed coherent light source that directs light into the atmosphere, a light gathering instrument that receives the light modified by atmospheric backscatter and transfers the light onto an image plane, a scanner that scans collimated light from the image plane to form a range gated signal from the light modified by atmospheric backscatter, a control circuit that coordinates timing of a scan rate of the scanner and a pulse rate of the pulsed coherent light source so that the range gated signal is formed according to a desired range gate, an optical device onto which an image of the range gated signal is scanned, and an interferometer to which the image of the range gated signal is directed by the optical device. The interferometer is configured to modify the image according to a desired analysis

    On the Connection Between Momentum Cutoff and Operator Cutoff Regularizations

    Full text link
    Operator cutoff regularization based on the original Schwinger's proper-time formalism is examined. By constructing a regulating smearing function for the proper-time integration, we show how this regularization scheme simulates the usual momentum cutoff prescription yet preserves gauge symmetry even in the presence of the cutoff scales. Similarity between the operator cutoff regularization and the method of higher (covariant) derivatives is also observed. The invariant nature of the operator cutoff regularization makes it a promising tool for exploring the renormalization group flow of gauge theories in the spirit of Wilson-Kadanoff blocking transformation.Comment: 28 pages in plain TeX, no figures. revised and expande

    The Intrinsic Dimensionality of Attractiveness: A Study in Face Profiles

    Get PDF
    The study of human attractiveness with pattern analysis techniques is an emerging research field. One still largely unresolved problem is which are the facial features relevant to attractiveness, how they combine together, and the number of independent parameters required for describing and identifying harmonious faces. In this paper, we present a first study about this problem, applied to face profiles. First, according to several empirical results, we hypothesize the existence of two well separated manifolds of attractive and unattractive face profiles. Then, we analyze with manifold learning techniques their intrinsic dimensionality. Finally, we show that the profile data can be reduced, with various techniques, to the intrinsic dimensions, largely without loosing their ability to discriminate between attractive and unattractive face

    Flow Equations for U_k and Z_k

    Get PDF
    By considering the gradient expansion for the wilsonian effective action S_k of a single component scalar field theory truncated to the first two terms, the potential U_k and the kinetic term Z_k, I show that the recent claim that different expansion of the fluctuation determinant give rise to different renormalization group equations for Z_k is incorrect. The correct procedure to derive this equation is presented and the set of coupled differential equations for U_k and Z_k is definitely established.Comment: 5 page

    Renormalization Group Flow Equations and the Phase Transition in O(N)-models

    Get PDF
    We derive and solve flow equations for a general O(N)-symmetric effective potential including wavefunction renormalization corrections combined with a heat-kernel regularization. We investigate the model at finite temperature and study the nature of the phase transition in detail. Beta functions, fixed points and critical exponents \beta, \nu, \delta and \eta for various N are independently calculated which allow for a verification of universal scaling relations.Comment: 34 pages, 3 tables, 11 postscript figures, LaTe

    The promoters of human cell cycle genes integrate signals from two tumor suppressive pathways during cellular transformation

    Get PDF
    Deciphering regulatory events that drive malignant transformation represents a major challenge for systems biology. Here we analyzed genome-wide transcription profiling of an in-vitro transformation process. We focused on a cluster of genes whose expression levels increased as a function of p53 and p16INK4A tumor suppressors inactivation. This cluster predominantly consists of cell cycle genes and constitutes a signature of a diversity of cancers. By linking expression profiles of the genes in the cluster with the dynamic behavior of p53 and p16INK4A, we identified a promoter architecture that integrates signals from the two tumor suppressive channels and that maps their activity onto distinct levels of expression of the cell cycle genes, which in turn, correspond to different cellular proliferation rates. Taking components of the mitotic spindle as an example, we experimentally verified our predictions that p53-mediated transcriptional repression of several of these novel targets is dependent on the activities of p21, NFY and E2F. Our study demonstrates how a well-controlled transformation process allows linking between gene expression, promoter architecture and activity of upstream signaling molecules.Comment: To appear in Molecular Systems Biolog
    corecore