25 research outputs found

    Extragonadal LH/hCG action-Not yet time to rewrite textbooks

    Get PDF
    Gonadotropins are indispensable in both sexes in the regulation of gonadal sex steroid production and gametogenesis. In addition to their well-established classical actions, numerous recent publications have indicated the presence and function of luteinizing hormone/chorionic gonadotropin receptors (LH/hCG-R) in a variety of extragonadal tissues. However, the physiological significance of such effects has remained unclear. We have generated two genetically modified mouse models, one with excessive production of hCG and the other with targeted disruption of LH/hCG-R gene, and used them to address the functions of LH and hCG. Numerous gonadal and extragonadal phenotypes were found in the models with the two extremes of LH/hCG action. However, when the extragonadal effects were scrutinized in greater detail, they all appeared to arise through modification of gonadal function, either through enhanced or inhibited response to LH/hCG stimulation. Hence, further evidence is needed before the extragonadal LH/hCG-R expression can be considered functionally significant.Fil: Pakarainen, Tomi. University of Turku; FinlandiaFil: Ahtiainen, Petteri. University of Turku; FinlandiaFil: Zhang, Fu Ping. University of Helsinki; FinlandiaFil: Rulli, Susana Beatriz. Consejo Nacional de Investigaciones Científicas y Técnicas. Instituto de Biología y Medicina Experimental. Fundación de Instituto de Biología y Medicina Experimental. Instituto de Biología y Medicina Experimental; ArgentinaFil: Poutanen, Matti. University of Turku; FinlandiaFil: Huhtaniemi, Ilpo. University of Turku; Finlandia. IMperial College London; Reino Unid

    DuETT: Dual Event Time Transformer for Electronic Health Records

    Full text link
    Electronic health records (EHRs) recorded in hospital settings typically contain a wide range of numeric time series data that is characterized by high sparsity and irregular observations. Effective modelling for such data must exploit its time series nature, the semantic relationship between different types of observations, and information in the sparsity structure of the data. Self-supervised Transformers have shown outstanding performance in a variety of structured tasks in NLP and computer vision. But multivariate time series data contains structured relationships over two dimensions: time and recorded event type, and straightforward applications of Transformers to time series data do not leverage this distinct structure. The quadratic scaling of self-attention layers can also significantly limit the input sequence length without appropriate input engineering. We introduce the DuETT architecture, an extension of Transformers designed to attend over both time and event type dimensions, yielding robust representations from EHR data. DuETT uses an aggregated input where sparse time series are transformed into a regular sequence with fixed length; this lowers the computational complexity relative to previous EHR Transformer models and, more importantly, enables the use of larger and deeper neural networks. When trained with self-supervised prediction tasks, that provide rich and informative signals for model pre-training, our model outperforms state-of-the-art deep learning models on multiple downstream tasks from the MIMIC-IV and PhysioNet-2012 EHR datasets.Comment: Accepted at MLHC 2023, camera-ready versio

    PoGOLite - A High Sensitivity Balloon-Borne Soft Gamma-ray Polarimeter

    Full text link
    We describe a new balloon-borne instrument (PoGOLite) capable of detecting 10% polarisation from 200mCrab point-like sources between 25 and 80keV in one 6 hour flight. Polarisation measurements in the soft gamma-ray band are expected to provide a powerful probe into high-energy emission mechanisms as well as the distribution of magnetic fields, radiation fields and interstellar matter. At present, only exploratory polarisation measurements have been carried out in the soft gamma-ray band. Reduction of the large background produced by cosmic-ray particles has been the biggest challenge. PoGOLite uses Compton scattering and photo-absorption in an array of 217 well-type phoswich detector cells made of plastic and BGO scintillators surrounded by a BGO anticoincidence shield and a thick polyethylene neutron shield. The narrow FOV (1.25msr) obtained with well-type phoswich detector technology and the use of thick background shields enhance the detected S/N ratio. Event selections based on recorded phototube waveforms and Compton kinematics reduce the background to that expected for a 40-100mCrab source between 25 and 50keV. A 6 hour observation on the Crab will differentiate between the Polar Cap/Slot Gap, Outer Gap, and Caustic models with greater than 5 sigma; and also cleanly identify the Compton reflection component in the Cygnus X-1 hard state. The first flight is planned for 2010 and long-duration flights from Sweden to Northern Canada are foreseen thereafter.Comment: 11 pages, 11 figures, 2 table

    Automation of Telecom Network Vulnerability Management : risk driven approach

    No full text
    Many network assets use some free and open-source software (FOSS) or commercial off-the-shelf software (COTS) to provide industry standard services or functionality. This makes vulnerability management a crucial part of network security, same applies also to telecommunication networks. Modern, highly complex, telecommunications networks are constantly evolving and use of old methods in managing vulnerabilities, risks, in the networks will not work much longer. At the same time the number of possible vulnerabilities is increasing year by year. This thesis helps commissioner company to map the information in the pre-existing systems and services in a way that brings most value to the operators. Limiting the visibility to the risks, vulnerabilities, that really matter. This will allow efficient use of resources. The thesis is limited to the Security Manager and Vulnerability Management Service database integration, this was also the first to be implemented in the study. Integration of external vulnerability feeds and scanner reports were excluded. Excluded were also the connectivity from operator networks towards the vulnerability management database and the UX/UI layer. Most of these will require further studies

    Kesätyöntekijän perehdytysohje

    No full text
    Opinnäytetyön tarkoitus oli parantaa kesätyöntekijöiden perehdytysprosessia Konecranes Finland Oy:n Hyvinkään komponenttitehtaan logistiikkatiimissä. Työ toteutettiin toimeksiantona Konecranes Finland Oy:lle. Tavoitteena oli luoda kattavat ja helposti luettavat sähköiset ohjeet, jotka auttavat uuden kesätyöntekijän perehdytyksessä sekä työnopastuksessa. Teoriaosuudessa käsitellään ohjeen koostamisen kannalta tärkeitä aiheita perehdyttämisestä, työnopastuksesta sekä työturvallisuudesta. Työtä varten toteutettiin logistiikkatiimissä myös avoimia haastatteluita ja keskusteluita. Haastatteluissa saatujen tulosten perusteella kasattiin itse ohje käyttäen hyödyksi myös aikaisempaa kokemusta toiminnasta kyseisessä kesätyötehtävässä. Ohjeessa kesätyöntekijälle opastetaan työhön oleellisesti liittyviä työturvallisuusasioita sekä työtehtäviin liittyvää toimintaa. Opinnäytetyön seurauksena syntynyt ohje otetaan logistiikkatiimissä käyttöön tulevaisuudessa uusien kesätyöntekijöiden perehdytysprosessin tueksi

    NetCents protocol for inexpensive Internet payments

    No full text
    grantor: University of TorontoNetCents is a lightweight, flexible and secure protocol for electronic commerce over the Internet. It is designed to support purchases ranging in value from a fraction of a penny to several dollars, with an emphasis on micropayments. It is based on decentralized verification of electronic currency at a vendor's server with offline payment capture and policing. This is accomplished with floating scrips, or signed containers of electronic currency, that are passed from vendor to vendor. No customer trust is required, but the system does place a certain amount of trust in vendors, for example, to guard against double spending, and therefore requires a probabilistic verification scheme to limit vendor fraud to unprofitable levels. The protocol can be extended to support fully anonymous payments. An online arbiter is implemented that will ensure proper delivery of purchased goods and that can settle most customer/vendor disputes.M.A.Sc

    Fertility in luteinizing hormone receptor-knockout mice after wild-type ovary transplantation demonstrates redundancy of extragonadal luteinizing hormone action

    No full text
    The luteinizing hormone receptor (LHR), mainly expressed in gonads, is essential for normal reproduction. However, numerous recent studies have also demonstrated LHR expression in multiple extragonadal reproductive and nonreproductive tissues. Although some effects of luteinizing hormone (LH) or its agonist, human chorionic gonadotropin, have been shown in extragonadal sites, their physiological significance remains open. In the present study, we have addressed the function of the extragonadal LHR using LHR-KO mice (LuRKO mice), in which the ovaries of prepubertal mice were orthotopically replaced with pieces of WT ovary using similarly transplanted WT mice as controls. Most ovarian transplants attained normal endocrine function in both groups of mice, as demonstrated by normal age at vaginal opening, estrous cycles, and sexual behavior. Both the LuRKO and WT mice repeatedly became pregnant (9/16 vs. 16/20 after first mating; difference not significant) and delivered similarly sized litters, which grew normally after birth, indicating normal lactation. In conclusion, fertility is restored in LuRKO mice by transplantation of WT ovarian tissue. This is achieved in the absence of extragonadal LHR expression, which indicates physiological redundancy for such receptor sites

    SIMD parallelization of applications that traverse irregular data structures

    No full text
    Fine-grained data parallelism is increasingly common in mainstream processors in the form of longer vectors and onchip GPUs. This paper develops support for exploiting such data parallelism for a class of non-numeric, non-graphic applications, which perform computations while traversing many independent, irregular data structures. While the traversal of any one irregular data structure does not give opportunity for parallelization, traversing a set of these does. However, mapping such parallelism to SIMD units is nontrivial and not addressed in prior work. We address this problem by developing an intermediate language for specifying such traversals, followed by a runtime scheduler that maps traversals to SIMD units. A key idea in our run-time scheme is converting branches to arithmetic operations, which then allows us to use SIMD hardware. In order to make our approach fast, we demonstrate several optimizations including a stream compaction method that aids with control flow in SIMD, a set of layouts that reduce memory latency, and a tiling approach that enables more effective prefetching. Using our approach, we demonstrate significant increases in single-core performance over optimized baselines for two applications

    Fine-grained Parallel Traversals of Irregular Data Structures

    No full text
    Fine-grain data parallelism is increasingly common in mainstream processors in the form of long vectors and on-chip GPUs. This paper develops compiler and runtime support to exploit such data parallelism for non-numeric, non-graphic, irregular parallel tasks that perform simple computations while traversing many independent, irregular data structures, like trees and graphs. We vectorize the traversal of trees and graphs by treating a set of irregular data structures as a parallel control-flow graph and compiling the traversal into a domain-specific bytecodes. We produce a SIMD interpreter for these bytecodes, so each lane of a SIMD unit traverses one irregular data structure. Despite the overhead of interpretation, we demonstrate significant increases in single-core performance over optimized baselines
    corecore