A pathological feature of Parkinson’s disease (PD) is Lewy bodies (LBs) composed of α-synuclein (α-syn) amyloid fibrils. α-Syn is a 140 amino acids–long protein, but truncated α-syn is enriched in ...LBs. The proteolytic processes that generate these truncations are not well-understood. On the basis of our previous work, we propose that these truncations could originate from lysosomal activity attributable to cysteine cathepsins (Cts). Here, using a transgenic SNCAA53T mouse model, overexpressing the PD-associated α-syn variant A53T, we compared levels of α-syn species in purified brain lysosomes from nonsymptomatic mice with those in age-matched symptomatic mice. In the symptomatic mice, antibody epitope mapping revealed enrichment of C-terminal truncations, resulting from CtsB, CtsL, and asparagine endopeptidase. We did not observe changes in individual cathepsin activities, suggesting that the increased levels of C-terminal α-syn truncations are because of the burden of aggregated α-syn. Using LC-MS and purified α-syn, we identified C-terminal truncations corresponding to amino acids 1–122 and 1–90 from the SNCAA53T lysosomes. Feeding rat dopaminergic N27 cells with exogenous α-syn fibrils confirmed that these fragments originate from incomplete fibril degradation in lysosomes. We mimicked these events in situ by asparagine endopeptidase degradation of α-syn fibrils. Importantly, the resulting C-terminally truncated fibrils acted as superior seeds in stimulating α-syn aggregation compared with that of the full-length fibrils. These results unequivocally show that C-terminal α-syn truncations in LBs are linked to Cts activities, promote amyloid formation, and contribute to PD pathogenesis.
In experiments that measure the lifetime of trapped particles, in addition to loss mechanisms with exponential survival probability functions, particles can be lost by mechanisms with non-exponential ...survival probability functions. Failure to account for such loss mechanisms produces systematic measurement error and associated systematic uncertainties in these measurements. In this work, we develop a general competing risks survival analysis method to account for the joint effect of loss mechanisms with either exponential or non-exponential survival probability functions, and a method to quantify the size of systematic effects and associated uncertainties for lifetime estimates. As a case study, we apply our survival analysis formalism and method to the Ultra Cold Neutron lifetime experiment at NIST. In this experiment, neutrons can escape a magnetic trap before they decay due to a wall loss mechanism with an associated non-exponential survival probability function.
The purpose of this study was to define the incidence and characterization of cardiovascular cause of sudden death in the young.
The epidemiology of sudden cardiac death (SCD) in young adults is ...based on small studies and uncontrolled observations. Identifying causes of sudden death in this population is important for guiding approaches to prevention.
We performed a retrospective cohort study using demographic and autopsy data from the Department of Defense Cardiovascular Death Registry over a 10-year period comprising 15.2 million person-years of active surveillance.
We reviewed all nontraumatic sudden deaths in persons 18 years of age and over. We identified 902 subjects in whom the adjudicated cause of death was of potential cardiac etiology, with a mean age of 38 ± 11 years. The mortality rate for SCD per 100,000 person-years for the study period was 6.7 for males and 1.4 for females (p < 0.0001). Sudden death was attributed to a cardiac condition in 715 (79.3%) and was unexplained in 187 (20.7%). The incidence of sudden unexplained death (SUD) was 1.2 per 100,000 person-years for persons <35 years of age, and 2.0 per 100,000 person-years for those ≥ 35 years of age (p < 0.001). The incidence of fatal atherosclerotic coronary artery disease was 0.7 per 100,000 person-years for those <35 years of age, and 13.7 per 100,000 person-years for those ≥ 35 years of age (p < 0.001).
Prevention of sudden death in the young adult should focus on evaluation for causes known to be associated with SUD (e.g., primary arrhythmia) among persons <35 years of age, with an emphasis on atherosclerotic coronary disease in those ≥ 35 years of age.
Neutron spin rotation is expected from quark-quark weak interactions in the standard model, which induce weak interactions among nucleons that violate parity. We present the results from an ...experiment searching for the effect of parity violation via the spin rotation of polarized neutrons in a liquid 4He medium. The value for the neutron spin rotation angle per unit length in 4He, d ϕ / d z = + 2.1 ± 8.3 (stat.) - 0.2 + 2.9 (sys.) × 10 - 7 rad/m, is consistent with zero. The result agrees with the best current theoretical estimates of the size of nucleon-nucleon weak amplitudes from other experiments and with the expectations from recent theoretical approaches to weak nucleon-nucleon interactions. In this paper we review the theoretical status of parity violation in the n → + 4He system and discuss details of the data analysis leading to the quoted result. Analysis tools are presented that quantify systematic uncertainties in this measurement and that are expected to be essential for future measurements.
This paper describes the design, construction, and initial operation of SLD's upgraded vertex detector which comprises 96 two-dimensional charge-coupled devices (CCDs) with a total of 307 Mpixel. ...Each pixel functions as an independent particle detecting element, providing space point measurements of charged particle tracks with a typical precision of 4 μm in each co-ordinate. The CCDs are arranged in three concentric cylinders just outside the beam-pipe which surrounds the e
+e
− collision point of the SLAC Linear Collider (SLC). The detector is a powerful tool for distinguishing displaced vertex tracks, produced by decay in flight of heavy flavour hadrons or tau leptons, from tracks produced at the primary event vertex. The requirements for this detector include a very low mass structure (to minimize multiple scattering) both for mechanical support and to provide signal paths for the CCDs; operation at low temperature with a high degree of mechanical stability; and high speed CCD readout, signal processing, and data sparsification. The lessons learned in achieving these goals should be useful for the construction of large arrays of CCDs or active pixel devices in the future in a number of areas of science and technology.
We present a measurement of the left-right cross-section asymmetry ( A(LR)) for Z boson production by e(+)e(-) collisions. The measurement includes the final data taken with the SLD detector at the ...SLAC Linear Collider during the period 1996-1998. Using a sample of 383 487 Z decays collected during the 1996-1998 runs we measure the pole value of the asymmetry, A(0)(LR), to be 0.150 56+/-0.002 39 which is equivalent to an effective weak mixing angle of sin (2)straight theta(eff)(W) = 0.231 07+/-0.000 30. Our result for the complete 1992-1998 data set comprising approximately 537 000 Z decays is sin (2)straight theta(eff)(W) = 0.230 97+/-0.000 27.
There is a lack of scientific testing of commercially available malware detectors, especially those that boast accurate classification of never-before-seen (i.e., zero-day) files using machine ...learning (ML). Consequently, efficacy of malware detectors is opaque, inhibiting end users from making informed decisions and researchers from targeting gaps in current detectors. In this article, we present a scientific evaluation of four prominent commercial malware detection tools to assist an organization with two primary questions: To what extent do ML-based tools accurately classify previously and never-before-seen files? Is purchasing a network-level malware detector worth the cost? To investigate, we tested each tool against 3,536 total files (2,554 or 72% malicious and 982 or 28% benign) of a variety of file types, including hundreds of malicious zero-days, polyglots, and APT-style files, delivered on multiple protocols. We present statistical results on detection time and accuracy, consider complementary analysis (using multiple tools together), and provide two novel applications of the recent cost–benefit evaluation procedure of Iannacone and Bridges. Although the ML-based tools are more effective at detecting zero-day files and executables, the signature-based tool might still be an overall better option. Both network-based tools provide substantial (simulated) savings when paired with either host tool, yet both show poor detection rates on protocols other than HTTP or SMTP. Our results show that all four tools have near-perfect precision but alarmingly low recall, especially on file types other than executables and office files: Thirty-seven percent of malware, including all polyglot files, were undetected. Priorities for researchers and takeaways for end users are given. Code for future use of the cost model is provided.