Search results for "Vectors"
showing 10 items of 601 documents
(p,2)-equations resonant at any variational eigenvalue
2018
We consider nonlinear elliptic Dirichlet problems driven by the sum of a p-Laplacian and a Laplacian (a (p,2) -equation). The reaction term at ±∞ is resonant with respect to any variational eigenvalue of the p-Laplacian. We prove two multiplicity theorems for such equations.
Combined effect of AAV-U7-induced dystrophin exon skipping and soluble activin Type IIB receptor in mdx mice.
2012
Adeno-associated virus (AAV)-U7-mediated skipping of dystrophin-exon-23 restores dystrophin expression and muscle function in the mdx mouse model of Duchenne muscular dystrophy. Soluble activin receptor IIB (sActRIIB-Fc) inhibits signaling of myostatin and homologous molecules and increases muscle mass and function of wild-type and mdx mice. We hypothesized that combined treatment with AAV-U7 and sActRIIB-Fc may synergistically improve mdx muscle function. Bioactivity of sActRIIB-Fc on skeletal muscle was first demonstrated in wild-type mice. In mdx mice we show that AAV-U7-mediated dystrophin restoration improved specific muscle force and resistance to eccentric contractions when applied a…
Editorial: Zoonotic Diseases: Their Host and Vectors
2021
On Prefix Normal Words
2011
We present a new class of binary words: the prefix normal words. They are defined by the property that for any given length $k$, no factor of length $k$ has more $a$'s than the prefix of the same length. These words arise in the context of indexing for jumbled pattern matching (a.k.a. permutation matching or Parikh vector matching), where the aim is to decide whether a string has a factor with a given multiplicity of characters, i.e., with a given Parikh vector. Using prefix normal words, we give the first non-trivial characterization of binary words having the same set of Parikh vectors of factors. We prove that the language of prefix normal words is not context-free and is strictly contai…
IoT -based adversarial attack's effect on cloud data platform services in a smart building context
2020
IoT sensors and sensor networks are widely employed in businesses. The common problem is a remarkable number of IoT device transactions are unencrypted. Lack of correctly implemented and robust defense leaves the organization's IoT devices vulnerable to numerous cyber threats, such as adversarial and man-in-the-middle attacks or malware infections. A perpetrator can utilize adversarial examples when attacking machine learning (ML) models, such as convolutional neural networks (CNN) or deep neural networks (DNN) used, e.g., in DaaS cloud data platform service of smart buildings. DaaS cloud data platform's function in this study is to connect data from multiple IoT sensors, databases, private…
Kohn-Sham Decomposition in Real-Time Time-Dependent Density-Functional Theory An Efficient Tool for Analyzing Plasmonic Excitations
2017
The real-time-propagation formulation of time-dependent density-functional theory (RT-TDDFT) is an efficient method for modeling the optical response of molecules and nanoparticles. Compared to the widely adopted linear-response TDDFT approaches based on, e.g., the Casida equations, RT-TDDFT appears, however, lacking efficient analysis methods. This applies in particular to a decomposition of the response in the basis of the underlying single-electron states. In this work, we overcome this limitation by developing an analysis method for obtaining the Kohn-Sham electron-hole decomposition in RT-TDDFT. We demonstrate the equivalence between the developed method and the Casida approach by a be…
Well-defined polypeptide-based systems as non-viral vectors for cytosolic delivery
2017
A convenient cytosolic drug delivery constitutes a very powerful tool for the treatment and/or prevention of several relevant human diseases. Along with recent advances in therapeutic technologies based on biomacromolecules (e.g. oligonucleotides or proteins), we also require the development of technologies which improve the transport of therapeutic molecules to the cell of choice. This has led to the emergence of a variety of promising methods over the last 20 years. Despite significant progress, these methods still suffer from several shortcomings including low/variable delivery efficiency, high cytotoxicity, and perhaps most importantly, ineffective endosomal/lysosomal escape. In this co…
Operators in Rigged Hilbert Spaces, Gel’fand Bases and Generalized Eigenvalues
2022
Given a self-adjoint operator A in a Hilbert space H, we analyze its spectral behavior when it is expressed in terms of generalized eigenvectors. Using the formalism of Gel’fand distribution bases, we explore the conditions for the generalized eigenspaces to be one-dimensional, i.e., for A to have a simple spectrum.
Maladie du huanglongbing
2019
Maladie du huanglongbing. Analyse du risque phytosanitaire pour l’Union européenne
Polymeric nanoparticles for siRNA delivery: Production and applications
2017
Gene therapy through the use of siRNA and a polymeric carrier are becoming an efficient therapeutic option to conventional pharmaceutical formulations for the treatment of deadly diseases, such as cancer, pulmonary, ocular and neurodegenerative diseases. However, several considerations regarding the stability, formulation, and efficacy have to be faced up until these systems could be considered to be a marketable pharmaceutical products for to extend siRNA application to clinical practice. This review is focused on the key challenges of siRNA therapeutics, with special attention on the faced obstacles and on the formulation-related difficulties, providing a list of requirements needed for o…