5,825 research outputs found

    Positive autoregulation of GDNF levels in the ventral tegmental area mediates long-lasting inhibition of excessive alcohol consumption.

    Get PDF
    Glial cell line-derived neurotrophic factor (GDNF) is an essential growth factor for the survival and maintenance of the midbrain dopaminergic (DA-ergic) neurons. Activation of the GDNF pathway in the ventral tegmental area (VTA), where the GDNF receptors are expressed, produces a long-lasting suppression of excessive alcohol consumption in rats. Previous studies conducted in the DA-ergic-like cells, SHSY5Y, revealed that GDNF positively regulates its own expression, leading to a long-lasting activation of the GDNF signaling pathway. Here we determined whether GDNF activates a positive autoregulatory feedback loop in vivo within the VTA, and if so, whether this mechanism underlies the long-lasting suppressive effects of the growth factor on excessive alcohol consumption. We found that a single infusion of recombinant GDNF (rGDNF; 10 μg) into the VTA induces a long-lasting local increase in GDNF mRNA and protein levels, which depends upon de novo transcription and translation of the polypeptide. Importantly, we report that the GDNF-mediated positive autoregulatory feedback loop accounts for the long-lasting inhibitory actions of GDNF in the VTA on excessive alcohol consumption. Specifically, the long-lasting suppressive effects of a single rGDNF infusion into the VTA on excessive alcohol consumption were prevented when protein synthesis was inhibited, as well as when the upregulation of GDNF expression was prevented using short hairpin RNA to focally knock down GDNF mRNA in the VTA. Our results could have implications for the development of long-lasting treatments for disorders in which GDNF has a beneficial role, including drug addiction, chronic stress and Parkinson's disease

    Dispersal and Re-Capture of Marked, Overwintering \u3ci\u3eTomicus Piniperda\u3c/i\u3e (Coleoptera: Scolytidae) From Scotch Pine Bolts

    Get PDF
    The pine shoot beetle (PSB), Tomicus piniperda is a recently established exotic pest of live pine in the southern Great Lakes of the U.S. and Canada. Scotch pine, Pinus sylvestris L. is the most susceptible pine species, but the adult also attacks several other North American species of Pinus. This research investigated the dispersal behavior of beetles emerging from overwintering sites to aid in the development of effective monitoring and management practices. Scotch pine logs with overwintering PSB were sprayed with fluorescent pigments to mark dispersing beetles. These logs were placed in piles in the centers of three circular trap arrays of 8-unit Lindgren traps, baited with a-pinene, and placed at distances of 50, 100,200, 300 and 400 meters from the center along equally spaced radii. An estimated average of 393 PSB, or 23.4% of the overwintering PSB, dispersed from each of three log piles during the initial spring dispersal flight, and 21.9% of these were captured in traps. Traps within 100 meters caught 56.0 to 67.8% of the marked PSB recovered. Most (95.3%) marked PSB were trapped within 400 meters, but 12 beetles (4.7%) were trapped 780-2,000 meters away in adjacent trap arrays. The dispersal pattern of the population, as indicated by trap catch, was to the northeast, in the direction of prevailing westerly/ southerly winds up to 4.77 mls daily average during beetle flight. Regression analysis suggests that the PSB within the experimental area had a predicted dispersal distance of 900 meters in an area that contained numerous traps. Dispersal distances may be greater under of conditions of strong and steady winds or iftraps or abundant host material removed fewer PSB from the dispersing population. The use of traps to monitor specific sites should consider the direction of prevailing winds. Trap catches of wild PSB suggest that optimal inter-trap spacing for efficient detection could be about 78 m

    JGraphT -- A Java library for graph data structures and algorithms

    Full text link
    Mathematical software and graph-theoretical algorithmic packages to efficiently model, analyze and query graphs are crucial in an era where large-scale spatial, societal and economic network data are abundantly available. One such package is JGraphT, a programming library which contains very efficient and generic graph data-structures along with a large collection of state-of-the-art algorithms. The library is written in Java with stability, interoperability and performance in mind. A distinctive feature of this library is the ability to model vertices and edges as arbitrary objects, thereby permitting natural representations of many common networks including transportation, social and biological networks. Besides classic graph algorithms such as shortest-paths and spanning-tree algorithms, the library contains numerous advanced algorithms: graph and subgraph isomorphism; matching and flow problems; approximation algorithms for NP-hard problems such as independent set and TSP; and several more exotic algorithms such as Berge graph detection. Due to its versatility and generic design, JGraphT is currently used in large-scale commercial, non-commercial and academic research projects. In this work we describe in detail the design and underlying structure of the library, and discuss its most important features and algorithms. A computational study is conducted to evaluate the performance of JGraphT versus a number of similar libraries. Experiments on a large number of graphs over a variety of popular algorithms show that JGraphT is highly competitive with other established libraries such as NetworkX or the BGL.Comment: Major Revisio

    Secret-Sharing for NP

    Get PDF
    A computational secret-sharing scheme is a method that enables a dealer, that has a secret, to distribute this secret among a set of parties such that a "qualified" subset of parties can efficiently reconstruct the secret while any "unqualified" subset of parties cannot efficiently learn anything about the secret. The collection of "qualified" subsets is defined by a Boolean function. It has been a major open problem to understand which (monotone) functions can be realized by a computational secret-sharing schemes. Yao suggested a method for secret-sharing for any function that has a polynomial-size monotone circuit (a class which is strictly smaller than the class of monotone functions in P). Around 1990 Rudich raised the possibility of obtaining secret-sharing for all monotone functions in NP: In order to reconstruct the secret a set of parties must be "qualified" and provide a witness attesting to this fact. Recently, Garg et al. (STOC 2013) put forward the concept of witness encryption, where the goal is to encrypt a message relative to a statement "x in L" for a language L in NP such that anyone holding a witness to the statement can decrypt the message, however, if x is not in L, then it is computationally hard to decrypt. Garg et al. showed how to construct several cryptographic primitives from witness encryption and gave a candidate construction. One can show that computational secret-sharing implies witness encryption for the same language. Our main result is the converse: we give a construction of a computational secret-sharing scheme for any monotone function in NP assuming witness encryption for NP and one-way functions. As a consequence we get a completeness theorem for secret-sharing: computational secret-sharing scheme for any single monotone NP-complete function implies a computational secret-sharing scheme for every monotone function in NP

    Reduction of quantum noise in optical interferometers using squeezed light

    Full text link
    We study the photon counting noise in optical interferometers used for gravitational wave detection. In order to reduce quantum noise a squeezed vacuum state is injected into the usually unused input port. Here, we specifically investigate the so called `dark port case', when the beam splitter is oriented close to 90{\deg} to the incoming laser beam, such that nearly all photons go to one output port of the interferometer, and only a small fraction of photons is seen in the other port (`dark port'). For this case it had been suggested that signal amplification is possible without concurrent noise amplification [R.Barak and Y.Ben-Aryeh, J.Opt.Soc.Am.B25(361)2008]. We show that by injection of a squeezed vacuum state into the second input port, counting noise is reduced for large values of the squeezing factor, however the signal is not amplified. Signal strength only depends on the intensity of the laser beam.Comment: 8 pages, 1 figur

    Dynamical vs. Auxiliary Fields in Gravitational Waves around a Black Hole

    Full text link
    The auxiliary/dynamic decoupling method of hep-th/0609001 applies to perturbations of any co-homogeneity 1 background (such as a spherically symmetric space-time or a homogeneous cosmology). Here it is applied to compute the perturbations around a Schwarzschild black hole in an arbitrary dimension. The method provides a clear insight for the existence of master equations. The computation is straightforward, coincides with previous results of Regge-Wheeler, Zerilli and Kodama-Ishibashi but does not require any ingenuity in either the definition of variables or in fixing the gauge. We note that the method's emergent master fields are canonically conjugate to the standard ones. In addition, our action approach yields the auxiliary sectors.Comment: 26 page

    Order from disorder in lattice QCD at high density

    Full text link
    We investigate the properties of the ground state of strong coupling lattice QCD at finite density. Our starting point is the effective Hamiltonian for color singlet objects, which looks at lowest order as an antiferromagnet, and describes meson physics with a fixed baryon number background. We concentrate on uniform baryon number backgrounds (with the same baryon number on all sites), for which the ground state was extracted in an earlier work, and calculate the dispersion relations of the excitations. Two types of Goldstone boson emerge. The first, antiferromagnetic spin waves, obey a linear dispersion relation. The others, ferromagnetic magnons, have energies that are quadratic in their momentum. These energies emerge only when fluctuations around the large-N_c ground state are taken into account, along the lines of ``order from disorder'' in frustrated magnetic systems. Unlike other spectrum calculations in order from disorder, we employ the Euclidean path integral. For comparison, we also present a Hamiltonian calculation using a generalized Holstein-Primakoff transformation. The latter can only be constructed for a subset of the cases we consider.Comment: 24 pages, 6 figures, 1 tabl

    Decomposition of Condensed Phase Energetic Materials: Interplay between Uni- and Bimolecular Mechanisms

    Get PDF
    Activation energy for the decomposition of explosives is a crucial parameter of performance. The dramatic suppression of activation energy in condensed phase decomposition of nitroaromatic explosives has been an unresolved issue for over a decade. We rationalize the reduction in activation energy as a result of a mechanistic change from unimolecular decomposition in the gas phase to a series of radical bimolecular reactions in the condensed phase. This is in contrast to other classes of explosives, such as nitramines and nitrate esters, whose decomposition proceeds via unimolecular reactions both in the gas and in the condensed phase. The thermal decomposition of a model nitroaromatic explosive, 2,4,6-trinitrotoluene (TNT), is presented as a prime example. Electronic structure and reactive molecular dynamics (ReaxFF-lg) calculations enable to directly probe the condensed phase chemistry under extreme conditions of temperature and pressure, identifying the key bimolecular radical reactions responsible for the low activation route. This study elucidates the origin of the difference between the activation energies in the gas phase (∼62 kcal/mol) and the condensed phase (∼35 kcal/mol) of TNT and identifies the corresponding universal principle. On the basis of these findings, the different reactivities of nitro-based organic explosives are rationalized as an interplay between uni- and bimolecular processes

    Nonlinear Dynamic Phenomena in Macroscopic Tunneling

    Full text link
    Numerical simulations of the NLSE (or GPE) are presented demonstrating emission of short pulses of the matter (light) density formed in the course of tunneling in wave-guided light and/or trapped BEC. The phenomenon is observed under various conditions, for nonlinearities of different signs, zero nonlinearity included. We study, both numerically and analytically, pulsations of matter (light) remaining within the trap and use the results in order to induce emission of sequential pulses by properly narrowing the trap. This allows us to propose a mechanism for a realization of Atom Pulse Laser.Comment: 14 pages, 6 figure

    Munchausen by internet: current research and future directions.

    Get PDF
    The Internet has revolutionized the health world, enabling self-diagnosis and online support to take place irrespective of time or location. Alongside the positive aspects for an individual's health from making use of the Internet, debate has intensified on how the increasing use of Web technology might have a negative impact on patients, caregivers, and practitioners. One such negative health-related behavior is Munchausen by Internet
    corecore