53,287 research outputs found

    Direct photons in d+Au and p+p collisions

    Get PDF
    Results are presented from an ongoing analysis of direct photon production with the STAR experiment at RHIC. The direct photon measurement in d+Au collisions and the neutral pion spectrum in p+p collisions are found to be in agreement with NLO pQCD calculations.Comment: 4 pages, 3 figures, proceedings of Quark Matter 200

    Smart Content Recognition from Images Using a Mixture of Convolutional Neural Networks

    Full text link
    With rapid development of the Internet, web contents become huge. Most of the websites are publicly available, and anyone can access the contents from anywhere such as workplace, home and even schools. Nevertheless, not all the web contents are appropriate for all users, especially children. An example of these contents is pornography images which should be restricted to certain age group. Besides, these images are not safe for work (NSFW) in which employees should not be seen accessing such contents during work. Recently, convolutional neural networks have been successfully applied to many computer vision problems. Inspired by these successes, we propose a mixture of convolutional neural networks for adult content recognition. Unlike other works, our method is formulated on a weighted sum of multiple deep neural network models. The weights of each CNN models are expressed as a linear regression problem learned using Ordinary Least Squares (OLS). Experimental results demonstrate that the proposed model outperforms both single CNN model and the average sum of CNN models in adult content recognition.Comment: To be published in LNEE, Code: github.com/mundher/NSF

    UBR2 of the N-end rule pathway is required for chromosome stability via histone ubiquitylation in spermatocytes and somatic cells

    Get PDF
    The N-end rule pathway is a proteolytic system in which its recognition components (N-recognins) recognize destabilizing N-terminal residues of short-lived proteins as an essential element of specific degrons, called N-degrons. The RING E3 ligases UBR2 and UBR1 are major N-recognins that share size (200 kDa), conserved domains and substrate specificities to N-degrons. Despite the known function of the N-end rule pathway in degradation of cytosolic proteins, the major phenotype of UBR2-deficient male mice is infertility caused by arrest of spermatocytes at meiotic prophase I. UBR2-deficient spermatocytes are impaired in transcriptional silencing of sex chromosome-linked genes and ubiquitylation of histone H2A. In this study we show that the recruitment of UBR2 to meiotic chromosomes spatiotemporally correlates to the induction of chromatin-associated ubiquitylation, which is significantly impaired in UBR2-deficient spermatocytes. UBR2 functions as a scaffold E3 that promotes HR6B/UbcH2-dependent ubiquitylation of H2A and H2B but not H3 and H4, through a mechanism distinct from typical polyubiquitylation. The E3 activity of UBR2 in histone ubiquitylation is allosterically activated by dipeptides bearing destabilizing N-terminal residues. Insufficient monoubiquitylation and polyubiquitylation on UBR2-deficient meiotic chromosomes correlate to defects in double strand break (DSB) repair and other meiotic processes, resulting in pachytene arrest at stage IV and apoptosis. Some of these functions of UBR2 are observed in somatic cells, in which UBR2 is a chromatin-binding protein involved in chromatin-associated ubiquitylation upon DNA damage. UBR2-deficient somatic cells show an array of chromosomal abnormalities, including hyperproliferation, chromosome instability, and hypersensitivity to DNA damage-inducing reagents. UBR2-deficient mice enriched in C57 background die upon birth with defects in lung expansion and neural development. Thus, UBR2, known as the recognition component of a major cellular proteolytic system, is associated with chromatin and controls chromatin dynamics and gene expression in both germ cells and somatic cells. © 2012 Kwon et al

    The androgen receptor and signal-transduction pathways in hormone-refractory prostate cancer. Part 2: androgen-receptor cofactors and bypass pathways

    Get PDF
    Prostate cancer is the second leading cause of cancer related deaths in men from the western world. Treatment of prostate cancer has relied on androgen deprivation therapy for the past 50 years. Response rates are initially high (70-80%), however almost all patients develop androgen escape and subsequently die within 1-2 years. Unlike breast cancer, alternative approaches (chemotherapy and radiotherapy) do not increase survival time. The high rate of prostate cancer mortality is therefore strongly linked to both development of androgen escape and the lack of alternate therapies. AR mutations and amplifications can not explain all cases of androgen escape and post-translational modification of the AR has become an alternative theory. However recently it has been suggested that AR co-activators e.g. SRC-1 or pathways the bypass the AR (Ras/MAP kinase or PI3K/Akt) may stimulated prostate cancer progression independent of the AR. This review will focus on how AR coactivators may act to increase AR transactivation during sub-optimal DHT concentrations and also how signal transduction pathways may promote androgen escape via activation of transcription factors, e.g. AP-1, c-Myc and Myb, that induce cell proliferation or inhibit apoptosis

    Formation of Nanometer-Thick Water Layer at High Humidity on Dynamic Crystalline Material Composed of Multi-Interactive Molecules

    Get PDF
    Crystalline powders self-assembled from interactive discrete molecules reversibly transformed from a porous structure to a 2D one with a nanometer-thick H2O layer by hydration/dehydration. Multi-point weak intermolecular interactions contributed to maintenance of each phase. This structure transformation induced a humidity-dependent ion conductivity change from insulator to 3.4 x 10(-3) S cm(-1).open1122sciescopu

    Links of cytoskeletal integrity with disease and aging

    Get PDF
    Aging is a complex feature and involves loss of multiple functions and nonreversible phenotypes. However, several studies suggest it is possible to protect against aging and promote rejuvenation. Aging is associated with many factors, such as telomere shortening, DNA damage, mitochondrial dysfunction, and loss of homeostasis. The integrity of the cytoskeleton is associated with several cellular functions, such as migration, proliferation, degeneration, and mitochondrial bioenergy production, and chronic disorders, including neuronal degeneration and premature aging. Cytoskeletal integrity is closely related with several functional activities of cells, such as aging, proliferation, degeneration, and mitochondrial bioenergy production. Therefore, regulation of cytoskeletal integrity may be useful to elicit antiaging effects and to treat degenerative diseases, such as dementia. The actin cytoskeleton is dynamic because its assembly and disassembly change depending on the cellular status. Aged cells exhibit loss of cytoskeletal stability and decline in functional activities linked to longevity. Several studies reported that improvement of cytoskeletal stability can recover functional activities. In particular, microtubule stabilizers can be used to treat dementia. Furthermore, studies of the quality of aged oocytes and embryos revealed a relationship between cytoskeletal integrity and mitochondrial activity. This review summarizes the links of cytoskeletal properties with aging and degenerative diseases and how cytoskeletal integrity can be modulated to elicit antiaging and therapeutic effects

    Privacy-Preserving Trust Management Mechanisms from Private Matching Schemes

    Full text link
    Cryptographic primitives are essential for constructing privacy-preserving communication mechanisms. There are situations in which two parties that do not know each other need to exchange sensitive information on the Internet. Trust management mechanisms make use of digital credentials and certificates in order to establish trust among these strangers. We address the problem of choosing which credentials are exchanged. During this process, each party should learn no information about the preferences of the other party other than strictly required for trust establishment. We present a method to reach an agreement on the credentials to be exchanged that preserves the privacy of the parties. Our method is based on secure two-party computation protocols for set intersection. Namely, it is constructed from private matching schemes.Comment: The material in this paper will be presented in part at the 8th DPM International Workshop on Data Privacy Management (DPM 2013

    Distinctive Genetic Activity Pattern of the Human Dental Pulp between Deciduous and Permanent Teeth

    Get PDF
    published_or_final_versio
    corecore