12 research outputs found

    Thermodynamic curvature and black holes

    Full text link
    I give a relatively broad survey of thermodynamic curvature RR, one spanning results in fluids and solids, spin systems, and black hole thermodynamics. RR results from the thermodynamic information metric giving thermodynamic fluctuations. RR has a unique status in thermodynamics as being a geometric invariant, the same for any given thermodynamic state. In fluid and solid systems, the sign of RR indicates the character of microscopic interactions, repulsive or attractive. R|R| gives the average size of organized mesoscopic fluctuating structures. The broad generality of thermodynamic principles might lead one to believe the same for black hole thermodynamics. This paper explores this issue with a systematic tabulation of results in a number of cases.Comment: 27 pages, 10 figures, 7 tables, 78 references. Talk presented at the conference Breaking of Supersymmetry and Ultraviolet Divergences in extended Supergravity, in Frascati, Italy, March 27, 2013. v2 corrects some small problem

    The Effect of a ΔK280 Mutation on the Unfolded State of a Microtubule-Binding Repeat in Tau

    Get PDF
    Tau is a natively unfolded protein that forms intracellular aggregates in the brains of patients with Alzheimer's disease. To decipher the mechanism underlying the formation of tau aggregates, we developed a novel approach for constructing models of natively unfolded proteins. The method, energy-minima mapping and weighting (EMW), samples local energy minima of subsequences within a natively unfolded protein and then constructs ensembles from these energetically favorable conformations that are consistent with a given set of experimental data. A unique feature of the method is that it does not strive to generate a single ensemble that represents the unfolded state. Instead we construct a number of candidate ensembles, each of which agrees with a given set of experimental constraints, and focus our analysis on local structural features that are present in all of the independently generated ensembles. Using EMW we generated ensembles that are consistent with chemical shift measurements obtained on tau constructs. Thirty models were constructed for the second microtubule binding repeat (MTBR2) in wild-type (WT) tau and a ΔK280 mutant, which is found in some forms of frontotemporal dementia. By focusing on structural features that are preserved across all ensembles, we find that the aggregation-initiating sequence, PHF6*, prefers an extended conformation in both the WT and ΔK280 sequences. In addition, we find that residue K280 can adopt a loop/turn conformation in WT MTBR2 and that deletion of this residue, which can adopt nonextended states, leads to an increase in locally extended conformations near the C-terminus of PHF6*. As an increased preference for extended states near the C-terminus of PHF6* may facilitate the propagation of β-structure downstream from PHF6*, these results explain how a deletion at position 280 can promote the formation of tau aggregates

    Calculating adversarial risk from attack trees: control strength and probabilistic attackers

    Get PDF
    Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of multiple steps and alternative paths. It is possible to derive properties of the overall attacks from properties of individual steps, such as cost for the attacker and probability of success. However, in existing formalisms, such properties are considered independent. For example, investing more in an attack step would not increase the probability of success. As this seems counterintuitive, we introduce a framework for reasoning about attack trees based on the notion of control strength, annotating nodes with a function from attacker investment to probability of success. Calculation rules on such trees are defined to enable analysis of optimal attacker investment. Our second result consists of the translation of optimal attacker investment into the associated adversarial risk, yielding what we call adversarial risk trees. The third result is the introduction of probabilistic attacker strate- gies, based on the fitness (utility) of available scenarios. Together these contributions improve the possibilities for using attack trees in adversarial risk analysis

    Redox Homeostasis

    No full text
    International audienc

    All the trinomial roots, their powers and logarithms from the Lambert series, Bell polynomials and Fox–Wright function: illustration for genome multiplicity in survival of irradiated cells

    No full text

    Regulation of Mitochondrial Functions by Transcription Factor NRF2

    No full text
    corecore