2,117 research outputs found

    A matrix reverse Hölder inequality

    Get PDF
    AbstractA matrix reverse Hölder inequality is given. This result is a counterpart to the concavity property of matrix weighted geometric means. It extends a scalar inequality due to Gheorghiu and contains several Kantorovich type inequalities

    Ferroportin disease mutations influence manganese accumulation and cytotoxicity

    Full text link
    Hemochromatosis is a frequent genetic disorder, characterized by the accumulation of excess iron across tissues. Mutations in the FPN1 gene, encoding a cell surface iron exporter [ferroportin (Fpn)], are responsible for hemochromatosis type 4, also known as ferroportin disease. Recently, Fpn has been implicated in the regulation of manganese (Mn), another essential nutrient required for numerous cellular enzymes. However, the roles of Fpn in Mn regulation remain ill‐defined, and the impact of disease mutations on cellular Mn levels is unknown. Here, we provide evidence that Fpn can export Mn from cells into extracellular space. Fpn seems to play protective roles in Mn‐induced cellular toxicity and oxidative stress. Finally, disease mutations interfere with the role of Fpn in controlling Mn levels as well as the stability of Fpn. These results define the function of Fpn as an exporter of both iron and Mn and highlight the potential involvement of Mn dysregulation in ferroportin disease.—Choi, E.‐K., Nguyen, T.‐T., Iwase, S., Seo, Y. A. Ferroportin disease mutations influence manganese accumulation and cytotoxicity. FASEB J. 33, 2228–2240 (2019). www.fasebj.orgPeer Reviewedhttps://deepblue.lib.umich.edu/bitstream/2027.42/154252/1/fsb2fj201800831r.pd

    Towards Neural Decoding of Imagined Speech based on Spoken Speech

    Full text link
    Decoding imagined speech from human brain signals is a challenging and important issue that may enable human communication via brain signals. While imagined speech can be the paradigm for silent communication via brain signals, it is always hard to collect enough stable data to train the decoding model. Meanwhile, spoken speech data is relatively easy and to obtain, implying the significance of utilizing spoken speech brain signals to decode imagined speech. In this paper, we performed a preliminary analysis to find out whether if it would be possible to utilize spoken speech electroencephalography data to decode imagined speech, by simply applying the pre-trained model trained with spoken speech brain signals to decode imagined speech. While the classification performance of imagined speech data solely used to train and validation was 30.5 %, the transferred performance of spoken speech based classifier to imagined speech data displayed average accuracy of 26.8 % which did not have statistically significant difference compared to the imagined speech based classifier (p = 0.0983, chi-square = 4.64). For more comprehensive analysis, we compared the result with the visual imagery dataset, which would naturally be less related to spoken speech compared to the imagined speech. As a result, visual imagery have shown solely trained performance of 31.8 % and transferred performance of 26.3 % which had shown statistically significant difference between each other (p = 0.022, chi-square = 7.64). Our results imply the potential of applying spoken speech to decode imagined speech, as well as their underlying common features.Comment: 4 pages, 2 figure

    Bloody nipple discharge in an infant

    Get PDF
    Although milky nipple discharge appears frequently in infants, bloody nipple discharge is a very rare finding. We experienced a 4-month-old, breast-fed infant who showed bilateral bloody nipple discharge with no signs of infection, engorgement, or hypertrophy. The infant's hormonal examination and coagulation tests were normal, and an ultrasound examination revealed mammary duct ectasia. The symptoms resolved spontaneously within 6 weeks without any specific treatment, except that we advised the mother to refrain from taking herbal medicine. Since no such case has been previously reported in Korea, we present this case with a brief review of the literature

    Anti-malarial activity of 6-(8'Z-pentadecenyl)-salicylic acid from Viola websteri in mice

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Petroleum ether extracts of <it>Viola websteri </it>Hemsl (Violaceae) were reported to have anti-plasmodial activity against <it>Plasmodium falciparum in vitro</it>, with this activity being largely attributable to 6-(8'Z-pentadecenyl)-salicylic acid (6-SA).</p> <p>Methods</p> <p>The schizontocidal activity of 6-SA on early <it>Plasmodium berghei </it>infections was evaluated in a four-day test. The possible 'repository' activity of 6-SA was assessed using the method described by Peters. The median lethal dose (LD<sub>50</sub>) of 6-SA, when given intraperitoneally, was also determined using uninfected ICR mice and the method of Lorke.</p> <p>Results</p> <p>In the present study, 6-SA was found to have anti-malarial activity <it>in vivo</it>, when tested against <it>P. berghei </it>in mice. 6-SA at 5, 10 and 25 mg/kg·day exhibited a significant blood schizontocidal activity in four-day early infections, repository evaluations and established infections with a significant mean survival time comparable to that of the standard drug, chloroquine (5 mg/kg·day).</p> <p>Conclusion</p> <p>6-SA possesses a moderate anti-malarial activity that could be exploited for malaria therapy.</p

    Peregrine: Toward Fastest FALCON Based on GPV Framework

    Get PDF
    FALCON and Crystals-Dilithium are the digital signatures algorithms selected as NIST PQC standards at the end of the third round. FALCON has the advantage of the shortest size of the combined public key and signature but has the disadvantage of the relatively long signing time. Since FALCON algorithm is faithfully designed based on theoretical security analysis, the implementation of the algorithms is quite complex and needs considerable complexity. In order to implement the FALCON algorithm, the isochronous discrete Gaussian sampling algorithm should be used to prevent the side-channel attack, which causes a longer signature time. Also, FFT operations with floating-point numbers should be performed in FALCON, and they cause difficulty in applying the masking technique, making it vulnerable to side-channel attacks. We propose the Peregrine signature algorithm by devising two methods to make the signing algorithm of the FALCON scheme efficient. To reduce the signing time, Peregrine replaces the discrete Gaussian sampling algorithm with the sampling algorithm from the centered binomial distribution in the key generation algorithm and the signing algorithm by adjusting the encryption parameters. Also, it replaces the fast Fourier transform (FFT) operations of floating-point numbers with the number theoretic transform (NTT) operations of integers represented in residue number system (RNS), making the scheme faster and easy to be applied with a masking technique to prevent the side channel attack
    corecore