19,699 research outputs found

    Total coloring of 1-toroidal graphs of maximum degree at least 11 and no adjacent triangles

    Full text link
    A {\em total coloring} of a graph GG is an assignment of colors to the vertices and the edges of GG such that every pair of adjacent/incident elements receive distinct colors. The {\em total chromatic number} of a graph GG, denoted by \chiup''(G), is the minimum number of colors in a total coloring of GG. The well-known Total Coloring Conjecture (TCC) says that every graph with maximum degree Δ\Delta admits a total coloring with at most Δ+2\Delta + 2 colors. A graph is {\em 11-toroidal} if it can be drawn in torus such that every edge crosses at most one other edge. In this paper, we investigate the total coloring of 11-toroidal graphs, and prove that the TCC holds for the 11-toroidal graphs with maximum degree at least~1111 and some restrictions on the triangles. Consequently, if GG is a 11-toroidal graph with maximum degree Δ\Delta at least~1111 and without adjacent triangles, then GG admits a total coloring with at most Δ+2\Delta + 2 colors.Comment: 10 page

    Balanced geological section for extensional tectonic basin and its implication: An example from southern Songliao Basin

    Get PDF
    挤压构造的平衡地质剖面分析已经广泛应用于造山带构造分析, 但伸展构造区的平衡地质剖面分析实例仍然很少. 运用盆地分析的技术与方法, 分层序或阶段将地质构造依次恢复、地层逐层回剥, 并通过在松辽盆地南部吉林两井油田扶余油层4 条剖面的实践, 复原出不同时代盆地构造与地层发育的连续剖面, 揭示出松辽盆地南部主要构造样式是以浅表构造层次的负花状构造及深层剥离断层发育为特征; 断层生长指数、盆地的伸展史和伸展量等参数显示, 晚白垩世是构造转型的重要阶段, 此前主要为走滑构造样式形成阶段, 此后则主要为伸展滑脱构造发育阶段. 在此基础上, 提出松辽盆地具有伸展- 走滑双重力学构造性质, 可能是一个弧后构造盆地.The balanced geological sect ion has been widely used for the analysis of orogenic belt, but it is infrequent for ex tensional basins. In this paper, 4 extensional balanced geological sect ion analysis were practiced in Fuyu oil layer of Liangjing , Jilin oilfield, southern Songliao basin with the technology and method, including deformation history restoration, decompaction and erosion restoration. The structure of different ages and the continuous sedimentary sections have been restored. T he result s show that the structural styles possess the characteristics of negative flower structure in the shallow level and ex tensional detachment in deep level. The parameters, including fault growth index, the basin ex tensional history and fault detachment depth, indicate that Late Cretaceous is an important stage for the structure transferring mainly with a strike-slip style before this time and an ex tensional structure and detachment after this time. Therefore, a basin model with twin dynamic property and back-arc characters is proposed.published_or_final_versio

    Impact of inhaled corticosteroids on growth in children with asthma: systematic review and meta-analysis

    Get PDF
    Background: Long-term inhaled corticosteroids (ICS) may reduce growth velocity and final height of children with asthma. We aimed to evaluate the association between ICS use of >12 months and growth. Methods: We initially searched MEDLINE and EMBASE in July 2013, followed by a PubMed search updated to December 2014. We selected RCTs and controlled observational studies of ICS use in patients with asthma. We conducted random effects meta-analysis of mean differences in growth velocity (cm/year) or final height (cm) between groups. Heterogeneity was assessed using the I2 statistic. Results: We found 23 relevant studies (twenty RCTs and three observational studies) after screening 1882 hits. Meta-analysis of 16 RCTs showed that ICS use significantly reduced growth velocity at one year follow-up (mean difference -0.48 cm/year (95% CI -0.66 to -0.29)). There was evidence of a dose-response effect in three RCTs. Final adult height showed a mean reduction of -1.20 cm (95% CI -1.90 cm to -0.50 cm) with budesonide versus placebo in a high quality RCT. Meta-analysis of two lower quality observational studies revealed uncertainty in the association between ICS use and final adult height, pooled mean difference -0.85 cm (95% CI -3.35 to 1.65). Conclusion: Use of ICS for >12 months in children with asthma has a limited impact on annual growth velocity. In ICS users, there is a slight reduction of about a centimeter in final adult height, which when interpreted in the context of average adult height in England (175 cm for men and 161 cm for women), represents a 0.7% reduction compared to non-ICS users

    Atomic Layer Deposition of ZnO on Multi-walled Carbon Nanotubes and Its Use for Synthesis of CNT-ZnO Heterostructures.

    Get PDF
    In this article, direct coating of ZnO on PECVD-grown multi-walled carbon nanotubes (MWCNTs) is achieved using atomic layer deposition (ALD). Transmission electron microscopy investigation shows that the deposited ZnO shell is continuous and uniform, in contrast to the previously reported particle morphology. The ZnO layer has a good crystalline quality as indicated by Raman and photoluminescence (PL) measurements. We also show that such ZnO layer can be used as seed layer for subsequent hydrothermal growth of ZnO nanorods, resulting in branched CNT-inorganic hybrid nanostructures. Potentially, this method can also apply to the fabrication of ZnO-based hybrid nanostructures on other carbon nanomaterials.RIGHTS : This article is licensed under the BioMed Central licence at http://www.biomedcentral.com/about/license which is similar to the 'Creative Commons Attribution Licence'. In brief you may : copy, distribute, and display the work; make derivative works; or make commercial use of the work - under the following conditions: the original author must be given credit; for any reuse or distribution, it must be made clear to others what the license terms of this work are

    SILAC-based phosphoproteomics reveals an inhibitory role of KSR1 in p53 transcriptional activity via modulation of DBC1

    Get PDF
    BACKGROUND We have previously identified kinase suppressor of ras-1 (KSR1) as a potential regulatory gene in breast cancer. KSR1, originally described as a novel protein kinase, has a role in activation of mitogen-activated protein kinases. Emerging evidence has shown that KSR1 may have dual functions as an active kinase as well as a scaffold facilitating multiprotein complex assembly. Although efforts have been made to study the role of KSR1 in certain tumour types, its involvement in breast cancer remains unknown. METHODS A quantitative mass spectrometry analysis using stable isotope labelling of amino acids in cell culture (SILAC) was implemented to identify KSR1-regulated phosphoproteins in breast cancer. In vitro luciferase assays, co-immunoprecipitation as well as western blotting experiments were performed to further study the function of KSR1 in breast cancer. RESULTS Of significance, proteomic analysis reveals that KSR1 overexpression decreases deleted in breast cancer-1 (DBC1) phosphorylation. Furthermore, we show that KSR1 decreases the transcriptional activity of p53 by reducing the phosphorylation of DBC1, which leads to a reduced interaction of DBC1 with sirtuin-1 (SIRT1); this in turn enables SIRT1 to deacetylate p53. CONCLUSION Our findings integrate KSR1 into a network involving DBC1 and SIRT1, which results in the regulation of p53 acetylation and its transcriptional activity

    Accelerated gas-liquid visible light photoredox catalysis with continuous-flow photochemical microreactors

    Get PDF
    In this protocol, we describe the construction and use of an operationally simple photochemical microreactor for gas-liquid photoredox catalysis using visible light. The general procedure includes details on how to set up the microreactor appropriately with inlets for gaseous reagents and organic starting materials, and it includes examples of how to use it to achieve continuous-flow preparation of disulfides or trifluoromethylated heterocycles and thiols. The reported photomicroreactors are modular, inexpensive and can be prepared rapidly from commercially available parts within 1 h even by nonspecialists. Interestingly, typical reaction times of gas-liquid visible light photocatalytic reactions performed in microflow are lower (in the minute range) than comparable reactions performed as a batch process (in the hour range). This can be attributed to the improved irradiation efficiency of the reaction mixture and the enhanced gas-liquid mass transfer in the segmented gas-liquid flow regime

    Water resources: future Nile river flows

    Get PDF
    Climate change is projected to increase annual Nile river flow; importantly, year-to-year variability is also expected to increase markedly. More variable flows could present a challenge for consistent water resource provision in this region

    Peer-to-Peer Secure Multi-Party Numerical Computation Facing Malicious Adversaries

    Full text link
    We propose an efficient framework for enabling secure multi-party numerical computations in a Peer-to-Peer network. This problem arises in a range of applications such as collaborative filtering, distributed computation of trust and reputation, monitoring and other tasks, where the computing nodes is expected to preserve the privacy of their inputs while performing a joint computation of a certain function. Although there is a rich literature in the field of distributed systems security concerning secure multi-party computation, in practice it is hard to deploy those methods in very large scale Peer-to-Peer networks. In this work, we try to bridge the gap between theoretical algorithms in the security domain, and a practical Peer-to-Peer deployment. We consider two security models. The first is the semi-honest model where peers correctly follow the protocol, but try to reveal private information. We provide three possible schemes for secure multi-party numerical computation for this model and identify a single light-weight scheme which outperforms the others. Using extensive simulation results over real Internet topologies, we demonstrate that our scheme is scalable to very large networks, with up to millions of nodes. The second model we consider is the malicious peers model, where peers can behave arbitrarily, deliberately trying to affect the results of the computation as well as compromising the privacy of other peers. For this model we provide a fourth scheme to defend the execution of the computation against the malicious peers. The proposed scheme has a higher complexity relative to the semi-honest model. Overall, we provide the Peer-to-Peer network designer a set of tools to choose from, based on the desired level of security.Comment: Submitted to Peer-to-Peer Networking and Applications Journal (PPNA) 200
    corecore