84 resultados para Classes of Analytic Functions
Resumo:
The rat nucleus accumbens contains medium-sized, spiny projection neurons and intrinsic, local circuit neurons, or interneurons. Sub-classes of interneurons, revealed by calretinin (CR) or parvalbumin (PV) immunoreactivity or reduced nicotinamide adenine dinucleotide phosphate (NADPH)-diaphorase histochemistry, were compared in the nucleus accumbens core, shell and rostral pole. CR, PV and NADPH-diaphorase-containing neurons are shown to form three non-co-localising populations in these three areas. No significant differences in neuronal population densities were found between the subterritories. NADPH-diaphorase-containing neurons could be further separated morphologically into three sub-groups, but CR- and PV-immunoreactive neurons form homogeneous populations. Ultrastructurally, NADPH-diaphorase-, CR- and PV-containing neurons in the nucleus accumbens all possess nuclear indentations. These are deeper and fewer in neurons immunoreactive for PV than in CR- and NADPH-diaphorase-containing neurons. CR-immunoreactive boutons form asymmetrical and symmetrical synaptic specialisations on spines, dendrites and somata, while PV-immunoreactive boutons make only symmetrical synaptic specialisations. Both CR- and PV-immunoreactive boutons form symmetrical synaptic specialisations with medium-sized spiny neurons and contact other CR- and PV-immunoreactive somata, respectively. A novel non-carcinogenic substrate for the peroxidase reaction (Vector Slate Grey, SG) was found to be characteristically electron-dense and may be distinguishable from the diaminobenzidine reaction product. We conclude that the three markers used in this study are localised in distinct populations of nucleus accumbens interneurons. Our studies of their synaptic connections contribute to an increased understanding of the intrinsic circuitry of this area.
Resumo:
The striped catfish (Pangasianodon hypophthalmus) culture industry in the Mekong Delta in Vietnam has developed rapidly over the past decade. The culture industry now however, faces some significant challenges, especially related to climate change impacts notably from predicted extensive saltwater intrusion into many low topographical coastal provinces across the Mekong Delta. This problem highlights a need for development of culture stocks that can tolerate more saline culture environments as a response to expansion of saline water-intruded land. While a traditional artificial selection program can potentially address this need, understanding the genomic basis of salinity tolerance can assist development of more productive culture lines. The current study applied a transcriptomic approach using Ion PGM technology to generate expressed sequence tag (EST) resources from the intestine and swim bladder from striped catfish reared at a salinity level of 9 ppt which showed best growth performance. Total sequence data generated was 467.8 Mbp, consisting of 4,116,424 reads with an average length of 112 bp. De novo assembly was employed that generated 51,188 contigs, and allowed identification of 16,116 putative genes based on the GenBank non-redundant database. GO annotation, KEGG pathway mapping, and functional annotation of the EST sequences recovered with a wide diversity of biological functions and processes. In addition, more than 11,600 simple sequence repeats were also detected. This is the first comprehensive analysis of a striped catfish transcriptome, and provides a valuable genomic resource for future selective breeding programs and functional or evolutionary studies of genes that influence salinity tolerance in this important culture species.
Resumo:
To determine whether Sertoli cells influence DNA synthesis by rat peritubular myoid cells in vitro, the effects of Sertoli cells on [3H]thymidine incorporation by peritubular myoid cells in a coculture situation were examined. Incubation of testicular peritubular myoid cells with Sertoli cells in coculture induced a significant increase in [3H]thymidine incorporation by peritubular myoid cells. This indicates a cell-cell cooperation between Sertoli and peritubular myoid cells in the testis in terms of DNA synthesis. Secreted factors from Sertoli cells, as tested in a parabiotic culture situation, also increased [3H]thymidine incorporation by peritubular myoid cells. Moreover, in terms of total cellular protein, cocultures of Sertoli cells and peritubular myoid cells resulted in a significant increase when compared with the monocultures, and this coculture effect substituted for the stimulatory response of serum on peritubular myoid cell monoculture. This study investigated the cooperative role of Sertoli cells and peritubular myoid cells in paracrine regulation of testicular functions.
Resumo:
In this paper we tackle the problem of finding an efficient signature verification scheme when the number of signatures is signi.- cantly large and the verifier is relatively weak. In particular, we tackle the problem of message authentication in many-to-one communication networks known as concast communication. The paper presents three signature screening algorithms for a variant of ElGamal-type digital signatures. The cost for these schemes is n applications of hash functions, 2n modular multiplications, and n modular additions plus the verification of one digital signature, where n is the number of signatures. The paper also presents a solution to the open problem of finding a fast screening signature for non-RSA digital signature schemes.
Resumo:
In this article we study the azimuthal shear deformations in a compressible Isotropic elastic material. This class of deformations involves an azimuthal displacement as a function of the radial and axial coordinates. The equilibrium equations are formulated in terms of the Cauchy-Green strain tensors, which form an overdetermined system of partial differential equations for which solutions do not exist in general. By means of a Legendre transformation, necessary and sufficient conditions for the material to support this deformation are obtained explicitly, in the sense that every solution to the azimuthal equilibrium equation will satisfy the remaining two equations. Additionally, we show how these conditions are sufficient to support all currently known deformations that locally reduce to simple shear. These conditions are then expressed both in terms of the invariants of the Cauchy-Green strain and stretch tensors. Several classes of strain energy functions for which this deformation can be supported are studied. For certain boundary conditions, exact solutions to the equilibrium equations are obtained. © 2005 Society for Industrial and Applied Mathematics.
Resumo:
To identify and categorize complex stimuli such as familiar objects or speech, the human brain integrates information that is abstracted at multiple levels from its sensory inputs. Using cross-modal priming for spoken words and sounds, this functional magnetic resonance imaging study identified 3 distinct classes of visuoauditory incongruency effects: visuoauditory incongruency effects were selective for 1) spoken words in the left superior temporal sulcus (STS), 2) environmental sounds in the left angular gyrus (AG), and 3) both words and sounds in the lateral and medial prefrontal cortices (IFS/mPFC). From a cognitive perspective, these incongruency effects suggest that prior visual information influences the neural processes underlying speech and sound recognition at multiple levels, with the STS being involved in phonological, AG in semantic, and mPFC/IFS in higher conceptual processing. In terms of neural mechanisms, effective connectivity analyses (dynamic causal modeling) suggest that these incongruency effects may emerge via greater bottom-up effects from early auditory regions to intermediate multisensory integration areas (i.e., STS and AG). This is consistent with a predictive coding perspective on hierarchical Bayesian inference in the cortex where the domain of the prediction error (phonological vs. semantic) determines its regional expression (middle temporal gyrus/STS vs. AG/intraparietal sulcus).
Resumo:
Environmental monitoring has become increasingly important due to the significant impact of human activities and climate change on biodiversity. Environmental sound sources such as rain and insect vocalizations are a rich and underexploited source of information in environmental audio recordings. This paper is concerned with the classification of rain within acoustic sensor re-cordings. We present the novel application of a set of features for classifying environmental acoustics: acoustic entropy, the acoustic complexity index, spectral cover, and background noise. In order to improve the performance of the rain classification system we automatically classify segments of environmental recordings into the classes of heavy rain or non-rain. A decision tree classifier is experientially compared with other classifiers. The experimental results show that our system is effective in classifying segments of environmental audio recordings with an accuracy of 93% for the binary classification of heavy rain/non-rain.
Resumo:
Polymorphisms of glutathione transferases (GST) are important genetic determinants of susceptibility to environmental carcinogens (Rebbeck, 1997). The GSTs are a multigene family of dimeric enzymes involved in detoxification, and, in a few cases, the bioactivation of a variety of xenobiotics (Hayes et al., 1995). The cytosolic GST enzyme family consists of four major classes of enzymes, referred to as alpha, mu, pi and theta. Several members of this family (for example, GSTM1, GSTT1 and GSTP1) are polymorphic in human populations (Wormhoudt et al., 1999). Molecular epidemiology studies have examined the role of GST polymorphisms as susceptibility factors for environmentally and/or occupationally induced cancers (Wormhoudt et al., 1999). In particular, case-control studies showed a relationship between the GSTM1 null genotype and the development of cancer in association with smoking habits, which has been shown for cancers of the respiratory and gastrointestinal tracts as well as other cancer types (Miller et al., 1997). Only a few molecular epidemiological studies addressed the role of GSTT1 and GSTP1 polymorphisms in cancer susceptibility. Since GSTP1 is a key player in biotransformation/bioactivation of benzo(a)pyrene, GSTP1 may be even more important than GSTM1 in the prevention of tobacco-induced cancers (Harries et al., 1997; Harris et al., 1998). To date, this relationship has not been sufficiently addressed in humans. Comprehensive molecular epidemiological studies may add to the current knowledge of the role of GST polymorphisms in cancer susceptibility and extent of the knowledge gained from approaches that used phenotyping, such as GSTM1 activity as it relates to trans-stilbene oxide, or polymerase chain reaction (PCR) based genotyping of polymorphic isoenzymes (Bell et al., 1993; Pemble et al., 1994; Harries et al., 1997).
Resumo:
PURPOSE/OBJECTIVES: To identify latent classes of individuals with distinct quality-of-life (QOL) trajectories, to evaluate for differences in demographic characteristics between the latent classes, and to evaluate for variations in pro- and anti-inflammatory cytokine genes between the latent classes. DESIGN: Descriptive, longitudinal study. SETTING: Two radiation therapy departments located in a comprehensive cancer center and a community-based oncology program in northern California. SAMPLE: 168 outpatients with prostate, breast, brain, or lung cancer and 85 of their family caregivers (FCs). METHODS: Growth mixture modeling (GMM) was employed to identify latent classes of individuals based on QOL scores measured prior to, during, and for four months following completion of radiation therapy. Single nucleotide polymorphisms (SNPs) and haplotypes in 16 candidate cytokine genes were tested between the latent classes. Logistic regression was used to evaluate the relationships among genotypic and phenotypic characteristics and QOL GMM group membership. MAIN RESEARCH VARIABLES: QOL latent class membership and variations in cytokine genes. FINDINGS: Two latent QOL classes were found: higher and lower. Patients and FCs who were younger, identified with an ethnic minority group, had poorer functional status, or had children living at home were more likely to belong to the lower QOL class. After controlling for significant covariates, between-group differences were found in SNPs in interleukin 1 receptor 2 (IL1R2) and nuclear factor kappa beta 2 (NFKB2). For IL1R2, carrying one or two doses of the rare C allele was associated with decreased odds of belonging to the lower QOL class. For NFKB2, carriers with two doses of the rare G allele were more likely to belong to the lower QOL class. CONCLUSIONS: Unique genetic markers in cytokine genes may partially explain interindividual variability in QOL. IMPLICATIONS FOR NURSING: Determination of high-risk characteristics and unique genetic markers would allow for earlier identification of patients with cancer and FCs at higher risk for poorer QOL. Knowledge of these risk factors could assist in the development of more targeted clinical or supportive care interventions for those identified.
Resumo:
Radiation therapy is a widely used therapeutic approach for cancer. To improve the efficacy of radiotherapy there is an intense interest in combining this modality with two broad classes of compounds, radiosensitizers and radioprotectors. These either enhance tumour-killing efficacy or mitigate damage to surrounding non-malignant tissue, respectively. Radiation exposure often results in the formation of DNA double-strand breaks, which are marked by the induction of H2AX phosphorylation to generate γH2AX. In addition to its essential role in DDR signalling and coordination of double-strand break repair, the ability to visualize and quantitate γH2AX foci using immunofluorescence microscopy techniques enables it to be exploited as an indicator of therapeutic efficacy in a range of cell types and tissues. This review will explore the emerging applicability of γH2AX as a marker for monitoring the effectiveness of radiation-modifying compounds.
Resumo:
We describe a sequence of experiments investigating the strengths and limitations of Fukushima's neocognitron as a handwritten digit classifier. Using the results of these experiments as a foundation, we propose and evaluate improvements to Fukushima's original network in an effort to obtain higher recognition performance. The neocognitron's performance is shown to be strongly dependent on the choice of selectivity parameters and we present two methods to adjust these variables. Performance of the network under the more effective of the two new selectivity adjustment techniques suggests that the network fails to exploit the features that distinguish different classes of input data. To avoid this shortcoming, the network's final layer cells were replaced by a nonlinear classifier (a multilayer perceptron) to create a hybrid architecture. Tests of Fukushima's original system and the novel systems proposed in this paper suggest that it may be difficult for the neocognitron to achieve the performance of existing digit classifiers due to its reliance upon the supervisor's choice of selectivity parameters and training data. These findings pertain to Fukushima's implementation of the system and should not be seen as diminishing the practical significance of the concept of hierarchical feature extraction embodied in the neocognitron. © 1997 IEEE.
Resumo:
Cryptographic hash functions are an important tool of cryptography and play a fundamental role in efficient and secure information processing. A hash function processes an arbitrary finite length input message to a fixed length output referred to as the hash value. As a security requirement, a hash value should not serve as an image for two distinct input messages and it should be difficult to find the input message from a given hash value. Secure hash functions serve data integrity, non-repudiation and authenticity of the source in conjunction with the digital signature schemes. Keyed hash functions, also called message authentication codes (MACs) serve data integrity and data origin authentication in the secret key setting. The building blocks of hash functions can be designed using block ciphers, modular arithmetic or from scratch. The design principles of the popular Merkle–Damgård construction are followed in almost all widely used standard hash functions such as MD5 and SHA-1.
Resumo:
At CRYPTO 2006, Halevi and Krawczyk proposed two randomized hash function modes and analyzed the security of digital signature algorithms based on these constructions. They showed that the security of signature schemes based on the two randomized hash function modes relies on properties similar to the second preimage resistance rather than on the collision resistance property of the hash functions. One of the randomized hash function modes was named the RMX hash function mode and was recommended for practical purposes. The National Institute of Standards and Technology (NIST), USA standardized a variant of the RMX hash function mode and published this standard in the Special Publication (SP) 800-106. In this article, we first discuss a generic online birthday existential forgery attack of Dang and Perlner on the RMX-hash-then-sign schemes. We show that a variant of this attack can be applied to forge the other randomize-hash-then-sign schemes. We point out practical limitations of the generic forgery attack on the RMX-hash-then-sign schemes. We then show that these limitations can be overcome for the RMX-hash-then-sign schemes if it is easy to find fixed points for the underlying compression functions, such as for the Davies-Meyer construction used in the popular hash functions such as MD5 designed by Rivest and the SHA family of hash functions designed by the National Security Agency (NSA), USA and published by NIST in the Federal Information Processing Standards (FIPS). We show an online birthday forgery attack on this class of signatures by using a variant of Dean’s method of finding fixed point expandable messages for hash functions based on the Davies-Meyer construction. This forgery attack is also applicable to signature schemes based on the variant of RMX standardized by NIST in SP 800-106. We discuss some important applications of our attacks and discuss their applicability on signature schemes based on hash functions with ‘built-in’ randomization. Finally, we compare our attacks on randomize-hash-then-sign schemes with the generic forgery attacks on the standard hash-based message authentication code (HMAC).
Resumo:
Many RFID protocols use cryptographic hash functions for their security. The resource constrained nature of RFID systems forces the use of light weight cryptographic algorithms. Tav-128 is one such 128-bit light weight hash function proposed by Peris-Lopez et al. for a low-cost RFID tag authentication protocol. Apart from some statistical tests for randomness by the designers themselves, Tav-128 has not undergone any other thorough security analysis. Based on these tests, the designers claimed that Tav-128 does not posses any trivial weaknesses. In this article, we carry out the first third party security analysis of Tav-128 and show that this hash function is neither collision resistant nor second preimage resistant. Firstly, we show a practical collision attack on Tav-128 having a complexity of 237 calls to the compression function and produce message pairs of arbitrary length which produce the same hash value under this hash function. We then show a second preimage attack on Tav-128 which succeeds with a complexity of 262 calls to the compression function. Finally, we study the constituent functions of Tav-128 and show that the concatenation of nonlinear functions A and B produces a 64-bit permutation from 32-bit messages. This could be a useful light weight primitive for future RFID protocols.
Resumo:
In the modern era of information and communication technology, cryptographic hash functions play an important role in ensuring the authenticity, integrity, and nonrepudiation goals of information security as well as efficient information processing. This entry provides an overview of the role of hash functions in information security, popular hash function designs, some important analytical results, and recent advances in this field.