110 research outputs found

    The Budget Control Act of 2011: Implications for Medicare

    Get PDF
    Outlines how the timeline for and process of lowering the federal deficit in exchange for raising the debt ceiling could affect Medicare spending through sequestration, including cuts in payments to Medicare Advantage plans, Part D, and providers

    Face Off: Overcoming the Fifth Amendment Conflict Between Cybersecurity and Self-Incrimination

    Get PDF
    The Founders included the privilege against self-incrimination in the Constitution to protect individual privacy and ensure a fair judicial process. Courts have failed U.S. citizens by neglecting to protect them from compelled unlocking of biometrically encrypted devices. This inaction has created a loophole that contradicts the framework of the privilege against self-incrimination. To correct this mistake courts should reconsider the trend they have set for the Constitution and the Fifth Amendment and consider adopting a forward-thinking cybersecurity lens to conclude that biometric authentication is testimonial. Courts should consider that biometric encryption is akin to a compelled password entry for the purposes of the foregone conclusion doctrine. The foregone conclusion doctrine should be applied in limited circumstances with a specific and high burden of proof so that the jealous protection of the privilege against self-incriminating testimony can be preserved. Allowing law enforcement such easy access to smart devices narrows Fifth Amendment protections and the expansive foregone conclusion exception is contrary to both principles of cybersecurity and the spirit of the Fifth Amendment. Courts should move to remediate this at once. These liberties and values can only be guaranteed by courts that are willing to take on cases with issues revolving around biometric encryption, the Fifth Amendment, and the foregone conclusion doctrine

    Commutator Leavitt path algebras

    Full text link
    For any field K and directed graph E, we completely describe the elements of the Leavitt path algebra L_K(E) which lie in the commutator subspace [L_K(E),L_K(E)]. We then use this result to classify all Leavitt path algebras L_K(E) that satisfy L_K(E)=[L_K(E),L_K(E)]. We also show that these Leavitt path algebras have the additional (unusual) property that all their Lie ideals are (ring-theoretic) ideals, and construct examples of such rings with various ideal structures.Comment: 24 page

    High-Frequency (> 100 GHz) Electronic Devices

    Get PDF
    Contains reports on five research projects and a list of publications.MIT Lincoln LaboratoryNational Aeronautics and Space Administration Grant NAG2-693National Science Foundation Grant ECS 91-09330Defense Advanced Research Projects Agency Contract MDA972-90-C-0021U.S. Army - Research Office Grant DAAL03-92-G-025

    Building a community to engineer synthetic cells and organelles from the bottom-up

    Get PDF
    Employing concepts from physics, chemistry and bioengineering, 'learning-by-building' approaches are becoming increasingly popular in the life sciences, especially with researchers who are attempting to engineer cellular life from scratch. The SynCell2020/21 conference brought together researchers from different disciplines to highlight progress in this field, including areas where synthetic cells are having socioeconomic and technological impact. Conference participants also identified the challenges involved in designing, manipulating and creating synthetic cells with hierarchical organization and function. A key conclusion is the need to build an international and interdisciplinary research community through enhanced communication, resource-sharing, and educational initiatives

    In silico design and biological evaluation of a dual specificity kinase inhibitor targeting cell cycle progression and angiogenesis

    Get PDF
    Methodology: We have utilized a rational in silico-based approach to demonstrate the design and study of a novel compound that acts as a dual inhibitor of vascular endothelial growth factor receptor 2 (VEGFR2) and cyclin-dependent kinase 1 (CDK1). This compound acts by simultaneously inhibiting pro-Angiogenic signal transduction and cell cycle progression in primary endothelial cells. JK-31 displays potent in vitro activity against recombinant VEGFR2 and CDK1/cyclin B proteins comparable to previously characterized inhibitors. Dual inhibition of the vascular endothelial growth factor A (VEGF-A)-mediated signaling response and CDK1-mediated mitotic entry elicits anti-Angiogenic activity both in an endothelial-fibroblast co-culture model and a murine ex vivo model of angiogenesis

    The Public Repository of Xenografts enables discovery and randomized phase II-like trials in mice

    Get PDF
    More than 90% of drugs with preclinical activity fail in human trials, largely due to insufficient efficacy. We hypothesized that adequately powered trials of patient-derived xenografts (PDX) in mice could efficiently define therapeutic activity across heterogeneous tumors. To address this hypothesis, we established a large, publicly available repository of well-characterized leukemia and lymphoma PDXs that undergo orthotopic engraftment, called the Public Repository of Xenografts (PRoXe). PRoXe includes all de-identified information relevant to the primary specimens and the PDXs derived from them. Using this repository, we demonstrate that large studies of acute leukemia PDXs that mimic human randomized clinical trials can characterize drug efficacy and generate transcriptional, functional, and proteomic biomarkers in both treatment-naive and relapsed/refractory disease

    Advances in Molecular Quantum Chemistry Contained in the Q-Chem 4 Program Package

    Get PDF
    A summary of the technical advances that are incorporated in the fourth major release of the Q-Chem quantum chemistry program is provided, covering approximately the last seven years. These include developments in density functional theory methods and algorithms, nuclear magnetic resonance (NMR) property evaluation, coupled cluster and perturbation theories, methods for electronically excited and open-shell species, tools for treating extended environments, algorithms for walking on potential surfaces, analysis tools, energy and electron transfer modelling, parallel computing capabilities, and graphical user interfaces. In addition, a selection of example case studies that illustrate these capabilities is given. These include extensive benchmarks of the comparative accuracy of modern density functionals for bonded and non-bonded interactions, tests of attenuated second order Møller–Plesset (MP2) methods for intermolecular interactions, a variety of parallel performance benchmarks, and tests of the accuracy of implicit solvation models. Some specific chemical examples include calculations on the strongly correlated Cr2 dimer, exploring zeolite-catalysed ethane dehydrogenation, energy decomposition analysis of a charged ter-molecular complex arising from glycerol photoionisation, and natural transition orbitals for a Frenkel exciton state in a nine-unit model of a self-assembling nanotube
    • …
    corecore