5,825 research outputs found
Positive autoregulation of GDNF levels in the ventral tegmental area mediates long-lasting inhibition of excessive alcohol consumption.
Glial cell line-derived neurotrophic factor (GDNF) is an essential growth factor for the survival and maintenance of the midbrain dopaminergic (DA-ergic) neurons. Activation of the GDNF pathway in the ventral tegmental area (VTA), where the GDNF receptors are expressed, produces a long-lasting suppression of excessive alcohol consumption in rats. Previous studies conducted in the DA-ergic-like cells, SHSY5Y, revealed that GDNF positively regulates its own expression, leading to a long-lasting activation of the GDNF signaling pathway. Here we determined whether GDNF activates a positive autoregulatory feedback loop in vivo within the VTA, and if so, whether this mechanism underlies the long-lasting suppressive effects of the growth factor on excessive alcohol consumption. We found that a single infusion of recombinant GDNF (rGDNF; 10 μg) into the VTA induces a long-lasting local increase in GDNF mRNA and protein levels, which depends upon de novo transcription and translation of the polypeptide. Importantly, we report that the GDNF-mediated positive autoregulatory feedback loop accounts for the long-lasting inhibitory actions of GDNF in the VTA on excessive alcohol consumption. Specifically, the long-lasting suppressive effects of a single rGDNF infusion into the VTA on excessive alcohol consumption were prevented when protein synthesis was inhibited, as well as when the upregulation of GDNF expression was prevented using short hairpin RNA to focally knock down GDNF mRNA in the VTA. Our results could have implications for the development of long-lasting treatments for disorders in which GDNF has a beneficial role, including drug addiction, chronic stress and Parkinson's disease
Dispersal and Re-Capture of Marked, Overwintering \u3ci\u3eTomicus Piniperda\u3c/i\u3e (Coleoptera: Scolytidae) From Scotch Pine Bolts
The pine shoot beetle (PSB), Tomicus piniperda is a recently established exotic pest of live pine in the southern Great Lakes of the U.S. and Canada. Scotch pine, Pinus sylvestris L. is the most susceptible pine species, but the adult also attacks several other North American species of Pinus. This research investigated the dispersal behavior of beetles emerging from overwintering sites to aid in the development of effective monitoring and management practices. Scotch pine logs with overwintering PSB were sprayed with fluorescent pigments to mark dispersing beetles. These logs were placed in piles in the centers of three circular trap arrays of 8-unit Lindgren traps, baited with a-pinene, and placed at distances of 50, 100,200, 300 and 400 meters from the center along equally spaced radii. An estimated average of 393 PSB, or 23.4% of the overwintering PSB, dispersed from each of three log piles during the initial spring dispersal flight, and 21.9% of these were captured in traps. Traps within 100 meters caught 56.0 to 67.8% of the marked PSB recovered. Most (95.3%) marked PSB were trapped within 400 meters, but 12 beetles (4.7%) were trapped 780-2,000 meters away in adjacent trap arrays. The dispersal pattern of the population, as indicated by trap catch, was to the northeast, in the direction of prevailing westerly/ southerly winds up to 4.77 mls daily average during beetle flight. Regression analysis suggests that the PSB within the experimental area had a predicted dispersal distance of 900 meters in an area that contained numerous traps. Dispersal distances may be greater under of conditions of strong and steady winds or iftraps or abundant host material removed fewer PSB from the dispersing population. The use of traps to monitor specific sites should consider the direction of prevailing winds. Trap catches of wild PSB suggest that optimal inter-trap spacing for efficient detection could be about 78 m
JGraphT -- A Java library for graph data structures and algorithms
Mathematical software and graph-theoretical algorithmic packages to
efficiently model, analyze and query graphs are crucial in an era where
large-scale spatial, societal and economic network data are abundantly
available. One such package is JGraphT, a programming library which contains
very efficient and generic graph data-structures along with a large collection
of state-of-the-art algorithms. The library is written in Java with stability,
interoperability and performance in mind. A distinctive feature of this library
is the ability to model vertices and edges as arbitrary objects, thereby
permitting natural representations of many common networks including
transportation, social and biological networks. Besides classic graph
algorithms such as shortest-paths and spanning-tree algorithms, the library
contains numerous advanced algorithms: graph and subgraph isomorphism; matching
and flow problems; approximation algorithms for NP-hard problems such as
independent set and TSP; and several more exotic algorithms such as Berge graph
detection. Due to its versatility and generic design, JGraphT is currently used
in large-scale commercial, non-commercial and academic research projects. In
this work we describe in detail the design and underlying structure of the
library, and discuss its most important features and algorithms. A
computational study is conducted to evaluate the performance of JGraphT versus
a number of similar libraries. Experiments on a large number of graphs over a
variety of popular algorithms show that JGraphT is highly competitive with
other established libraries such as NetworkX or the BGL.Comment: Major Revisio
Secret-Sharing for NP
A computational secret-sharing scheme is a method that enables a dealer, that
has a secret, to distribute this secret among a set of parties such that a
"qualified" subset of parties can efficiently reconstruct the secret while any
"unqualified" subset of parties cannot efficiently learn anything about the
secret. The collection of "qualified" subsets is defined by a Boolean function.
It has been a major open problem to understand which (monotone) functions can
be realized by a computational secret-sharing schemes. Yao suggested a method
for secret-sharing for any function that has a polynomial-size monotone circuit
(a class which is strictly smaller than the class of monotone functions in P).
Around 1990 Rudich raised the possibility of obtaining secret-sharing for all
monotone functions in NP: In order to reconstruct the secret a set of parties
must be "qualified" and provide a witness attesting to this fact.
Recently, Garg et al. (STOC 2013) put forward the concept of witness
encryption, where the goal is to encrypt a message relative to a statement "x
in L" for a language L in NP such that anyone holding a witness to the
statement can decrypt the message, however, if x is not in L, then it is
computationally hard to decrypt. Garg et al. showed how to construct several
cryptographic primitives from witness encryption and gave a candidate
construction.
One can show that computational secret-sharing implies witness encryption for
the same language. Our main result is the converse: we give a construction of a
computational secret-sharing scheme for any monotone function in NP assuming
witness encryption for NP and one-way functions. As a consequence we get a
completeness theorem for secret-sharing: computational secret-sharing scheme
for any single monotone NP-complete function implies a computational
secret-sharing scheme for every monotone function in NP
Reduction of quantum noise in optical interferometers using squeezed light
We study the photon counting noise in optical interferometers used for
gravitational wave detection. In order to reduce quantum noise a squeezed
vacuum state is injected into the usually unused input port. Here, we
specifically investigate the so called `dark port case', when the beam splitter
is oriented close to 90{\deg} to the incoming laser beam, such that nearly all
photons go to one output port of the interferometer, and only a small fraction
of photons is seen in the other port (`dark port'). For this case it had been
suggested that signal amplification is possible without concurrent noise
amplification [R.Barak and Y.Ben-Aryeh, J.Opt.Soc.Am.B25(361)2008]. We show
that by injection of a squeezed vacuum state into the second input port,
counting noise is reduced for large values of the squeezing factor, however the
signal is not amplified. Signal strength only depends on the intensity of the
laser beam.Comment: 8 pages, 1 figur
Dynamical vs. Auxiliary Fields in Gravitational Waves around a Black Hole
The auxiliary/dynamic decoupling method of hep-th/0609001 applies to
perturbations of any co-homogeneity 1 background (such as a spherically
symmetric space-time or a homogeneous cosmology). Here it is applied to compute
the perturbations around a Schwarzschild black hole in an arbitrary dimension.
The method provides a clear insight for the existence of master equations. The
computation is straightforward, coincides with previous results of
Regge-Wheeler, Zerilli and Kodama-Ishibashi but does not require any ingenuity
in either the definition of variables or in fixing the gauge. We note that the
method's emergent master fields are canonically conjugate to the standard ones.
In addition, our action approach yields the auxiliary sectors.Comment: 26 page
Order from disorder in lattice QCD at high density
We investigate the properties of the ground state of strong coupling lattice
QCD at finite density. Our starting point is the effective Hamiltonian for
color singlet objects, which looks at lowest order as an antiferromagnet, and
describes meson physics with a fixed baryon number background. We concentrate
on uniform baryon number backgrounds (with the same baryon number on all
sites), for which the ground state was extracted in an earlier work, and
calculate the dispersion relations of the excitations. Two types of Goldstone
boson emerge. The first, antiferromagnetic spin waves, obey a linear dispersion
relation. The others, ferromagnetic magnons, have energies that are quadratic
in their momentum. These energies emerge only when fluctuations around the
large-N_c ground state are taken into account, along the lines of ``order from
disorder'' in frustrated magnetic systems. Unlike other spectrum calculations
in order from disorder, we employ the Euclidean path integral. For comparison,
we also present a Hamiltonian calculation using a generalized
Holstein-Primakoff transformation. The latter can only be constructed for a
subset of the cases we consider.Comment: 24 pages, 6 figures, 1 tabl
Decomposition of Condensed Phase Energetic Materials: Interplay between Uni- and Bimolecular Mechanisms
Activation energy for the decomposition of explosives is a crucial parameter of performance. The dramatic suppression of activation energy in condensed phase decomposition of nitroaromatic explosives has been an unresolved issue for over a decade. We rationalize the reduction in activation energy as a result of a mechanistic change from unimolecular decomposition in the gas phase to a
series of radical bimolecular reactions in the condensed phase. This is in contrast to other classes of explosives, such as nitramines and nitrate esters, whose decomposition proceeds via unimolecular reactions both in the gas and in the condensed phase. The thermal decomposition of a model
nitroaromatic explosive, 2,4,6-trinitrotoluene (TNT), is presented as a prime example. Electronic structure and reactive molecular dynamics (ReaxFF-lg) calculations enable to directly probe the condensed phase chemistry under extreme conditions of temperature and pressure, identifying the key bimolecular radical reactions responsible for the low activation route. This study elucidates the origin of the difference between the activation energies in the gas phase (∼62 kcal/mol) and the condensed phase (∼35 kcal/mol) of TNT and identifies the corresponding universal principle. On the basis of these findings, the different reactivities of nitro-based organic explosives are rationalized as an interplay between uni- and bimolecular processes
Nonlinear Dynamic Phenomena in Macroscopic Tunneling
Numerical simulations of the NLSE (or GPE) are presented demonstrating
emission of short pulses of the matter (light) density formed in the course of
tunneling in wave-guided light and/or trapped BEC. The phenomenon is observed
under various conditions, for nonlinearities of different signs, zero
nonlinearity included. We study, both numerically and analytically, pulsations
of matter (light) remaining within the trap and use the results in order to
induce emission of sequential pulses by properly narrowing the trap. This
allows us to propose a mechanism for a realization of Atom Pulse Laser.Comment: 14 pages, 6 figure
Munchausen by internet: current research and future directions.
The Internet has revolutionized the health world, enabling self-diagnosis and online support to take place irrespective of time or location. Alongside the positive aspects for an individual's health from making use of the Internet, debate has intensified on how the increasing use of Web technology might have a negative impact on patients, caregivers, and practitioners. One such negative health-related behavior is Munchausen by Internet
- …
