scholarly journals Rhizobial Volatiles: Potential New Players in the Complex Interkingdom Signaling With Legumes

2021 ◽  
Vol 12 ◽  
Author(s):  
María J. Soto ◽  
Isabel M. López-Lara ◽  
Otto Geiger ◽  
María C. Romero-Puertas ◽  
Pieter van Dillewijn

Bacteria release a wide range of volatile compounds that play important roles in intermicrobial and interkingdom communication. Volatile metabolites emitted by rhizobacteria can promote plant growth and increase plant resistance to both biotic and abiotic stresses. Rhizobia establish beneficial nitrogen-fixing symbiosis with legume plants in a process starting with a chemical dialog in the rhizosphere involving various diffusible compounds. Despite being one of the most studied plant-interacting microorganisms, very little is known about volatile compounds produced by rhizobia and their biological/ecological role. Evidence indicates that plants can perceive and respond to volatiles emitted by rhizobia. In this perspective, we present recent data that open the possibility that rhizobial volatile compounds have a role in symbiotic interactions with legumes and discuss future directions that could shed light onto this area of investigation.

2020 ◽  
Vol 29 (3S) ◽  
pp. 631-637
Author(s):  
Katja Lund ◽  
Rodrigo Ordoñez ◽  
Jens Bo Nielsen ◽  
Dorte Hammershøi

Purpose The aim of this study was to develop a tool to gain insight into the daily experiences of new hearing aid users and to shed light on aspects of aided performance that may not be unveiled through standard questionnaires. Method The tool is developed based on clinical observations, patient experiences, expert involvement, and existing validated hearing rehabilitation questionnaires. Results An online tool for collecting data related to hearing aid use was developed. The tool is based on 453 prefabricated sentences representing experiences within 13 categories related to hearing aid use. Conclusions The tool has the potential to reflect a wide range of individual experiences with hearing aid use, including auditory and nonauditory aspects. These experiences may hold important knowledge for both the patient and the professional in the hearing rehabilitation process.


2020 ◽  
Vol 48 (3-4) ◽  
pp. 13-26
Author(s):  
Brandon W. Hawk

Literature written in England between about 500 and 1100 CE attests to a wide range of traditions, although it is clear that Christian sources were the most influential. Biblical apocrypha feature prominently across this corpus of literature, as early English authors clearly relied on a range of extra-biblical texts and traditions related to works under the umbrella of what have been called “Old Testament Pseudepigrapha” and “New Testament/Christian Apocrypha." While scholars of pseudepigrapha and apocrypha have long trained their eyes upon literature from the first few centuries of early Judaism and early Christianity, the medieval period has much to offer. This article presents a survey of significant developments and key threads in the history of scholarship on apocrypha in early medieval England. My purpose is not to offer a comprehensive bibliography, but to highlight major studies that have focused on the transmission of specific apocrypha, contributed to knowledge about medieval uses of apocrypha, and shaped the field from the nineteenth century up to the present. Bringing together major publications on the subject presents a striking picture of the state of the field as well as future directions.


2020 ◽  
Author(s):  
Anna Gerlicher ◽  
Merel Kindt

A cue that indicates imminent threat elicits a wide range of physiological, hormonal, autonomic, cognitive, and emotional fear responses in humans and facilitates threat-specific avoidance behavior. The occurrence of a threat cue can, however, also have general motivational effects and affect behavior. That is, the encounter with a threat cue can increase our tendency to engage in general avoidance behavior that does neither terminate nor prevent the threat-cue or the threat itself. Furthermore, the encounter with a threat-cue can substantially reduce our likelihood to engage in behavior that leads to rewarding outcomes. Such general motivational effects of threat-cues on behavior can be informative about the transition from normal to pathological anxiety and could also explain the development of comorbid disorders, such as depression and substance abuse. Despite the unmistakable relevance of the motivational effects of threat for our understanding of anxiety disorders, their investigation is still in its infancy. Pavlovian-to-Instrumental transfer is one paradigm that allows us to investigate such motivational effects of threat cues. Here, we review studies investigating aversive transfer in humans and discuss recent results on the neural circuits mediating Pavlovian-to-Instrumental transfer effects. Finally, we discuss potential limitations of the transfer paradigm and future directions for employing Pavlovian-to-Instrumental transfer for the investigation of motivational effects of fear and anxiety.


HortScience ◽  
1990 ◽  
Vol 25 (5) ◽  
pp. 556-559 ◽  
Author(s):  
Fredy Van Wassenhove ◽  
Patrick Dirinck ◽  
Georges Vulsteke ◽  
Niceas Schamp

A two-dimensional capillary gas chromatographic method was developed to separate and quantify aromatic volatiles of celery in one analysis. The isolation, identification, and quantification of the volatile compounds of four cultivars of blanching celery (Apium graveolens L. var. dulce) and six cultivars of celeriac (Apium graveolens L. var. rapaceum) are described. The qualitative composition of Likens-Nickerson extracts of both cultivars is similar. The concentration of terpenes and phthalides, the key volatile components, found in various cultivars of both celery and celeriac varied over a wide range.


2021 ◽  
Vol 54 (2) ◽  
pp. 1-42
Author(s):  
Abdullah Qasem ◽  
Paria Shirani ◽  
Mourad Debbabi ◽  
Lingyu Wang ◽  
Bernard Lebel ◽  
...  

In the era of the internet of things (IoT), software-enabled inter-connected devices are of paramount importance. The embedded systems are very frequently used in both security and privacy-sensitive applications. However, the underlying software (a.k.a. firmware) very often suffers from a wide range of security vulnerabilities, mainly due to their outdated systems or reusing existing vulnerable libraries; which is evident by the surprising rise in the number of attacks against embedded systems. Therefore, to protect those embedded systems, detecting the presence of vulnerabilities in the large pool of embedded devices and their firmware plays a vital role. To this end, there exist several approaches to identify and trigger potential vulnerabilities within deployed embedded systems firmware. In this survey, we provide a comprehensive review of the state-of-the-art proposals, which detect vulnerabilities in embedded systems and firmware images by employing various analysis techniques, including static analysis, dynamic analysis, symbolic execution, and hybrid approaches. Furthermore, we perform both quantitative and qualitative comparisons among the surveyed approaches. Moreover, we devise taxonomies based on the applications of those approaches, the features used in the literature, and the type of the analysis. Finally, we identify the unresolved challenges and discuss possible future directions in this field of research.


2021 ◽  
Vol 54 (6) ◽  
pp. 1-36
Author(s):  
Shufan Fei ◽  
Zheng Yan ◽  
Wenxiu Ding ◽  
Haomeng Xie

Trusted Execution Environments (TEEs) have been widely used in many security-critical applications. The popularity of TEEs derives from its high security and trustworthiness supported by secure hardware. Intel Software Guard Extensions (SGX) is one of the most representative TEEs that creates an isolated environment on an untrusted operating system, thus providing run-time protection for the execution of security-critical code and data. However, Intel SGX is far from the acme of perfection. It has become a target of various attacks due to its security vulnerabilities. Researchers and practitioners have paid attention to the security vulnerabilities of SGX and investigated optimization solutions in real applications. Unfortunately, existing literature lacks a thorough review of security vulnerabilities of SGX and their countermeasures. In this article, we fill this gap. Specifically, we propose two sets of criteria for estimating security risks of existing attacks and evaluating defense effects brought by attack countermeasures. Furthermore, we propose a taxonomy of SGX security vulnerabilities and shed light on corresponding attack vectors. After that, we review published attacks and existing countermeasures, as well as evaluate them by employing our proposed criteria. At last, on the strength of our survey, we propose some open challenges and future directions in the research of SGX security.


Vaccines ◽  
2021 ◽  
Vol 9 (5) ◽  
pp. 535
Author(s):  
Ban Qi Tay ◽  
Quentin Wright ◽  
Rahul Ladwa ◽  
Christopher Perry ◽  
Graham Leggatt ◽  
...  

The development of cancer vaccines has been intensively pursued over the past 50 years with modest success. However, recent advancements in the fields of genetics, molecular biology, biochemistry, and immunology have renewed interest in these immunotherapies and allowed the development of promising cancer vaccine candidates. Numerous clinical trials testing the response evoked by tumour antigens, differing in origin and nature, have shed light on the desirable target characteristics capable of inducing strong tumour-specific non-toxic responses with increased potential to bring clinical benefit to patients. Novel delivery methods, ranging from a patient’s autologous dendritic cells to liposome nanoparticles, have exponentially increased the abundance and exposure of the antigenic payloads. Furthermore, growing knowledge of the mechanisms by which tumours evade the immune response has led to new approaches to reverse these roadblocks and to re-invigorate previously suppressed anti-tumour surveillance. The use of new drugs in combination with antigen-based therapies is highly targeted and may represent the future of cancer vaccines. In this review, we address the main antigens and delivery methods used to develop cancer vaccines, their clinical outcomes, and the new directions that the vaccine immunotherapy field is taking.


2021 ◽  
Author(s):  
José-Vicente Tomás-Miquel ◽  
Jordi Capó-Vicedo

AbstractScholars have widely recognised the importance of academic relationships between students at the university. While much of the past research has focused on studying their influence on different aspects such as the students’ academic performance or their emotional stability, less is known about their dynamics and the factors that influence the formation and dissolution of linkages between university students in academic networks. In this paper, we try to shed light on this issue by exploring through stochastic actor-oriented models and student-level data the influence that a set of proximity factors may have on formation of these relationships over the entire period in which students are enrolled at the university. Our findings confirm that the establishment of academic relationships is derived, in part, from a wide range of proximity dimensions of a social, personal, geographical, cultural and academic nature. Furthermore, and unlike previous studies, this research also empirically confirms that the specific stage in which the student is at the university determines the influence of these proximity factors on the dynamics of academic relationships. In this regard, beyond cultural and geographic proximities that only influence the first years at the university, students shape their relationships as they progress in their studies from similarities in more strategic aspects such as academic and personal closeness. These results may have significant implications for both academic research and university policies.


2017 ◽  
Vol 54 (3) ◽  
pp. 317-338 ◽  
Author(s):  
Corinne Lefèvre

Relying on the Majalis-i Jahangiri (1608–11) by ʿAbd al-Sattar b. Qasim Lahauri, this essay explores some of the discussions the Mughal Emperor Jahangir (r. 1605–27) conducted with a wide range of scholars, from Brahmans and ʿulama to Jesuit padres and Jewish savants. By far the most numerous, the debates bearing on Islam and involving Muslim intellectuals are especially significant on several accounts. First, because they illuminate how, following in the steps of his father Akbar (r. 1556–605), Jahangir was able to conciliate his messianic claims with a strong engagement with reason and to turn this combination into a formidable instrument for confession and state building. These conversations also provide promising avenues to think afresh the socio-intellectual history of the Mughal ʿulama inasmuch as they capture the challenges and adjustments attendant on imperial patronage, depict the jockeying for influence and positions among intellectuals (particularly between Indo-Muslim and Iranian lettrés), and shed light on relatively little known figures or on unexplored facets of more prominent individuals. In addition, the specific role played by scholars hailing from Iran—and, to a lesser extent, from Central Asia—in the juridical-religious disputes of the Indian court shows how crucial inter-Asian connections and networks were in the fashioning of Mughal ideology but also the ways in which the ongoing flow of émigré ʿulama was disciplined before being incorporated into the empire.


2016 ◽  
Vol 2016 ◽  
pp. 1-11 ◽  
Author(s):  
Asmaa Ez-Zaidi ◽  
Said Rakrak

Wireless sensor networks have been the subject of intense research in recent years. Sensor nodes are used in wide range of applications such as security, military, and environmental monitoring. One of the most interesting applications in wireless sensor networks is target tracking, which mainly consists in detecting and monitoring the motion of mobile targets. In this paper, we present a comprehensive survey of target tracking approaches. We then analyze them according to several metrics. We also discuss some of the challenges that influence the performance of tracking schemes. In the end, we conduct detailed analysis and comparison between these algorithms and we conclude with some future directions.


Sign in / Sign up

Export Citation Format

Share Document