1,452 research outputs found

    Development and Applications of Mass Spectrometric Methods for Phosphorylation Analysis

    Full text link
    Protein phosphorylation modification regulates numerous cellular functions by a reversible and selective control of kinases and phosphatases. To understand the entire dynamic network of phosphorylation requires sensitive and reliable quantification of phosphorylation, measurements that can be achieved by mass spectrometry. In this research, we established efficient MALDI-mass spectrometric methods as strategies for single- or multi-site phosphorylation quantification without the use of isotopes, chromatography and calibration curves. The methods were assessed by analyzing peptide standards with different single-multiple phosphorylation sites, showing a wide dynamic range, good accuracy and reproducibility. This is the first label-free MALDI method without using a calibration methodology proposed for quantification of in vitro phosphorylation in a kinase assay. Moreover, advanced mass spectrometry empowers identification of a highly conserved Cdk2 phosphorylation site of HIV-1 reverse transcriptase (RT) at Thr 261 across thousands of HIV-1 strains. We demonstrated phosphorylation on HIV-1 RT peptides and protein in in vitro assays, and confirmed phosphorylation in vivo with antibodies and mutation studies. Blocking this phosphorylation by p21, a naturally occurring Cdk inhibitor, defines a potential Cdk2-mediated cell-intrinsic mechanism for restricting HIV-replication in a clinically significant way

    Decision support and risk management system for competitive bidding in refurbishment work

    Get PDF
    This study is concerned with the management of risks in competitive bidding for refurbishment work (lump sum contracts). It investigates the main difficulties and risks faced by contractors when they are making decisions in competitive bidding as a result of the general lack of information both inside and outside a contractor's organisation. A decision support and risk management system model is developed which provides a systematic and objective approach to risk management in competitive bidding for refurbishment work. The model provides a framework whereby both quantitative (tender bid records) and qualitative (risk perception of contractors) information may be obtained to support the decisions of contractors during tendering. The research adopts a combination of both Archival and Opinion research methodologies to build up two main databases consisting of tender bid records and information on the risk perception of contractors during tendering. From the analysis, a decision support and risk management system is developed consisting of six modules namely: (i) Module 1 - Databases of tender bid records and Repertory grid data, (ii) Module 2 - General information of bidding characteristics, (iii) Module 3 - Contractor's analysis, (iv) Module 4 - Competitor's analysis, (v) Module 5 - Bidding models, and (vi) Module 6 - Risk management system. This study has demonstrated that past tender bid records of contractors may be organised in a systematic way to provide invaluable strategic information to enhance the understanding of contractors with respect to their competitive bidding environments, their own bidding performance and the bidding behaviour of their competitors, thereby enabling contractors to manage risks more effectively and efficiently

    Spectral Weights, d-wave Pairing Amplitudes, and Particle-hole Tunneling Asymmetry of a Strongly Correlated Superconductor

    Get PDF
    The spectral weights (SW's) for adding and removing an electron of the Gutzwiller projected d-wave superconducting (SC) state of the t-J-type models are studied numerically on finite lattices. Restrict to the uniform system but treat exactly the strong correlation between electrons, we show that the product of weights is equal to the pairing amplitude squared, same as in the weakly coupled case. In addition, we derive a rigorous relation of SW with doping in the electron doped system and obtain particle-hole asymmetry of the conductance-proportional quantity within the SC gap energy and, also, the anti-correlation between gap sizes and peak heights observed in tunneling spectroscopy on high Tc cuprates.Comment: 4 Revtex pages and 4 .eps figures. Published versio

    Gas Sensing Ionic Liquids on Quartz Crystal Microbalance

    Get PDF
    Recent advances in “designer solvents” have facilitated the development of ultrasensitive gas sensing ionic liquids (SILs) based on quartz crystal microbalance (QCM) that can real‐time detect and discriminate volatile molecules. The amalgamation of tailored‐made SILs and label‐free QCM resulted in a new class of qualitative and semi‐quantitative gas sensing device, which represents a model system of electronic nose. Because a myriad of human‐made or naturally occurring volatile organic compounds (VOCs) are of great interest in many areas, several functional SILs have been designed to detect gaseous aldehyde, ketone, amine and azide molecules chemoselectively in our laboratory. The versatility of this platform lies in the selective capture of volatile compounds by thin‐coated reactive SILs on QCM at room temperature. Notably, the detection limit of the prototype system can be as low as single‐digit parts‐per‐billion. This chapter briefly introduces some conventional gas sensing approaches and collates recent research results in the integration of SILs and QCM and finally gives an account of the state‐of‐the‐art gas sensing technology

    Effect of the translational diffusion mechanism on the low-field NMR spin-lattice relaxation time in the rotating reference frame: calculation of order parameter

    Get PDF
    Journal ArticleThe effect of the translational-diffusion mechanism on the low-field NMR spin-lattice relaxation time in the rotating reference frame is calculated for simple cubic, body-centered cubic, and face-centered cubic lattices. The results of these calculations suggest a new method for determining the preferred diffusion mechanism. Previously NMR has been able to provide a direct measurement of the activation energy only; a theory has always been needed to determine the jump frequency from the experimentally measured relaxation time. Recently Slichter and Ailion developed a new technique for the study of ultraslow diffusion which is applicable when the mean time r between atomic jumps is less than the spin-lattice relaxation time T\. In their theory, an order parameter p appears in the relationship between the experimentally measured relaxation time and r. This parameter p depends upon the diffusion mechanism and the angle 6, which describes the orientation of the crystal with respect to the external magnetic field. In this paper we have calculated p versus 6 for vacancy diffusion, interstitialcy diffusion, and interstitial diffusion in bcc, fee, and sc lattices for two cases. In the first case, we have assumed that r;, the mean time that an interstitial atom occupies a particular site between jumps, is longer than T2, the spin-spin relaxation time, and we have found that the angular dependence of p is quite different for different mechanisms. In the second case, we have assumed that r% < T% and have found that the angular dependence of p for interstitialcy diffusion differs from the vacancy results by approximately 10% for the three lattices considered. These theoretical results, when combined with experimental measurements of the angular dependence of the low-field relaxation time, provide a method for the direct determination of the mechanism responsible for diffusion in these crystals

    Perpendicular Magnetic Anisotropy Materials for Spintronics Applications

    Get PDF
    Ph.DDOCTOR OF PHILOSOPH

    RADAR: Robust AI-Text Detection via Adversarial Learning

    Full text link
    Recent advances in large language models (LLMs) and the intensifying popularity of ChatGPT-like applications have blurred the boundary of high-quality text generation between humans and machines. However, in addition to the anticipated revolutionary changes to our technology and society, the difficulty of distinguishing LLM-generated texts (AI-text) from human-generated texts poses new challenges of misuse and fairness, such as fake content generation, plagiarism, and false accusation of innocent writers. While existing works show that current AI-text detectors are not robust to LLM-based paraphrasing, this paper aims to bridge this gap by proposing a new framework called RADAR, which jointly trains a Robust AI-text Detector via Adversarial leaRning. RADAR is based on adversarial training of a paraphraser and a detector. The paraphraser's goal is to generate realistic contents to evade AI-text detection. RADAR uses the feedback from the detector to update the paraphraser, and vice versa. Evaluated with 8 different LLMs (Pythia, Dolly 2.0, Palmyra, Camel, GPT-J, Dolly 1.0, LLaMA, and Vicuna) across 4 datasets, experimental results show that RADAR significantly outperforms existing AI-text detection methods, especially when paraphrasing is in place. We also identify the strong transferability of RADAR from instruction-tuned LLMs to other LLMs, and evaluate the improved capability of RADAR via GPT-3.5.Comment: Preprint. Project page and demos: https://radar.vizhub.a

    Neighborhood Failure Localization in All-Optical Networks via Monitoring Trails

    Get PDF
    Shared protection, such as failure dependent protection (FDP), is well recognized for its outstanding capacity efficiency in all-optical mesh networks, at the expense of lengthy restoration time due to multi-hop signaling mechanisms for failure localization, notification, and device configuration. This paper investigates a novel monitoring trail (m-trail) scenario, called Global Neighborhood Failure Localization (G-NFL), that aims to enable any shared protection scheme, including FDP, for achieving all-optical and ultra-fast failure restoration. We firstly define neighborhood of a node, which is a set of links whose failure states should be known to the node in restoration of the corresponding working lightpaths (W-LPs). By assuming every node can obtain the on-off status of traversing m-trails and W-LPs via lambda monitoring, the proposed G-NFL problem routes a set of m-trails such that each node can localize any failure in its neighborhood. Bound analysis is performed on the minimum bandwidth required for m-trails under the proposed G-NFL problem. Then a simple yet efficient heuristic approach is presented. Extensive simulation is conducted to verify the proposed G-NFL scenario under a number of different definitions of nodal neighborhood which concern the extent of dependency between the monitoring plane and data plane. The effect of reusing the spare capacity by FDP for supporting m-trails is examined. We conclude that the proposed G-NFL scenario enables a general shared protection scheme, toward signaling-free and ultra-fast failure restoration like p-Cycle, while achieving optimal capacity efficiency as FDP

    How to Backdoor Diffusion Models?

    Full text link
    Diffusion models are state-of-the-art deep learning empowered generative models that are trained based on the principle of learning forward and reverse diffusion processes via progressive noise-addition and denoising. To gain a better understanding of the limitations and potential risks, this paper presents the first study on the robustness of diffusion models against backdoor attacks. Specifically, we propose BadDiffusion, a novel attack framework that engineers compromised diffusion processes during model training for backdoor implantation. At the inference stage, the backdoored diffusion model will behave just like an untampered generator for regular data inputs, while falsely generating some targeted outcome designed by the bad actor upon receiving the implanted trigger signal. Such a critical risk can be dreadful for downstream tasks and applications built upon the problematic model. Our extensive experiments on various backdoor attack settings show that BadDiffusion can consistently lead to compromised diffusion models with high utility and target specificity. Even worse, BadDiffusion can be made cost-effective by simply finetuning a clean pre-trained diffusion model to implant backdoors. We also explore some possible countermeasures for risk mitigation. Our results call attention to potential risks and possible misuse of diffusion models
    corecore