Realizing hybrids of low-dimensional Kondo lattices and superconducting substrates leads to fascinating platforms for studying the exciting physics of strongly correlated electron systems with induced superconducting pairing. Here, we report a scanning tunneling microscopy and spectroscopy study of a new type of two-dimensional (2D) La-Ce alloy grown epitaxially on a superconducting Re(0001) substrate. We observe the characteristic spectroscopic signature of a hybridization gap evidencing the coherent spin screening in the 2D Kondo lattice realized by the ultrathin La-Ce alloy film on normal conducting Re(0001).
View Article and Find Full Text PDFFour mutants varying the length of the G and SH genes, including a G-truncated mutant (ΔG) and three G/SH-truncated mutants (ΔSH/G-1, ΔSH/G-2, and ΔSH/G-3), were generated via serially passaging the avian metapneumovirus strain SNU21004 into the cell lines Vero E6 and DF-1 and into embryonated chicken eggs. The mutant ΔG particles resembled parental virus particles except for the variance in the density of their surface projections. G and G/SH truncation significantly affected the viral replication in chickens' tracheal ring culture and in infected chickens but not in the Vero E6 cells.
View Article and Find Full Text PDFAntibiotics (Basel)
December 2023
Avian pathogenic (APEC) causes severe economic losses in the poultry industry, and O78 serogroup APEC strains are prevalent in chickens. In this study, we aimed to understand the evolutionary pathways and relationships between O78 APEC and other strains. To trace these evolutionary pathways, we classified 3101 strains into 306 subgenotypes according to the numbers and types of single nucleotide polymorphisms (RST0 to RST63-1) relative to the consensus sequence (RST0) of the RNA polymerase beta subunit gene and performed network analysis.
View Article and Find Full Text PDFIntroduction: Anterior cruciate ligament reconstruction (ACLR) is characterized by persistent involved limb functional deficits that persist for years despite rehabilitation. Previous research provides evidence of both peripheral and central nervous system adaptations following ACLR. However, no study has compared functional organization of the brain for involved limb motor control relative to the uninvolved limb and healthy controls.
View Article and Find Full Text PDFAccurately forecasting electrical signals from three-phase Direct Torque Control (DTC) induction motors is crucial for achieving optimal motor performance and effective condition monitoring. However, the intricate nature of multiple DTC induction motors and the variability in operational conditions present significant challenges for conventional prediction methodologies. To address these obstacles, we propose an innovative solution that leverages the Fast Fourier Transform (FFT) to preprocess simulation data from electrical motors.
View Article and Find Full Text PDFBackground: To date, various genotypes of infectious bronchitis virus (IBV) have co-circulated and in Korea, GI-15 and GI-19 lineages were prevailing. The spike protein, particularly S1 subunit, is responsible for receptor binding, contains hypervariable regions and is also responsible for the emerging of novel variants.
Objective: This study aims to investigate the putative major amino acid substitutions for the variants in GI-19.
Context: Current lower-extremity return to sport testing primarily considers the physical status of an athlete; however, sport participation requires continuous cognitive dual-task engagement. Therefore, the purpose was to develop and evaluate the reliability of a visual-cognitive reactive (VCR) triple hop test that simulates the typical sport demand of combined online visual-cognitive processing and neuromuscular control to improve return to sport testing after lower-extremity injury.
Design: Test-retest reliability.
Sports-related concussions (SRCs) are associated with neuromuscular control deficits in athletes following return to play. However, the connection between SRC and potentially disrupted neural regulation of lower extremity motor control has not been investigated. The purpose of this study was to investigate brain activity and connectivity during a functional magnetic resonance imaging (fMRI) lower extremity motor control task (bilateral leg press) in female adolescent athletes with a history of SRC.
View Article and Find Full Text PDFMemory isolation is an essential technology for safeguarding the resources of lightweight embedded systems. This technique isolates system resources by constraining the scope of the processor's accessible memory into distinct units known as domains. Despite the security offered by this approach, the Memory Protection Unit (MPU), the most common memory isolation method provided in most lightweight systems, incurs overheads during domain switching due to the privilege level intervention.
View Article and Find Full Text PDFBackground: Injury and reconstruction of anterior cruciate ligament (ACL) result in central nervous system alteration to control the muscles around the knee joint. Most individuals with ACL reconstruction (ACLR) experience kinesiophobia which can prevent them from returning to activity and is associated with negative outcomes after ACLR. However, it is unknown if kinesiophobia alters brain activity after ACL injury.
View Article and Find Full Text PDFWith the limited Internet bandwidth in a given area, unlimited data plans can create congestion because there is no retribution for transmitting many packets. The real-time pricing mechanism can inform users of their Internet consumption to limit congestion during peak hours. However, implementing real-time pricing is opex-heavy from the network provider side and requires high-integrity operations to gain consumer trust.
View Article and Find Full Text PDFObjectives: To develop and evaluate the reliability of a new visual-cognitive medial side hop (VCMH) test that challenges physical and cognitive performance to potentially improve return to sport testing.
Design: Test-retest experimental design.
Setting: Laboratory.
In recent years, many methods for intrusion detection systems (IDS) have been designed and developed in the research community, which have achieved a perfect detection rate using IDS datasets. Deep neural networks (DNNs) are representative examples applied widely in IDS. However, DNN models are becoming increasingly complex in model architectures with high resource computing in hardware requirements.
View Article and Find Full Text PDFCommodity processor architectures are releasing various instruction set extensions to support security solutions for the efficient mitigation of memory vulnerabilities. Among them, tagged memory extension (TME), such as ARM MTE and SPARC ADI, can prevent unauthorized memory access by utilizing tagged memory. However, our analysis found that TME has performance and security issues in practical use.
View Article and Find Full Text PDFDeep neural networks (DNNs), especially those used in computer vision, are highly vulnerable to adversarial attacks, such as adversarial perturbations and adversarial patches. Adversarial patches, often considered more appropriate for a real-world attack, are attached to the target object or its surroundings to deceive the target system. However, most previous research employed adversarial patches that are conspicuous to human vision, making them easy to identify and counter.
View Article and Find Full Text PDFIn this paper, we present a high-speed, unified elliptic curve cryptography (ECC) processor for arbitrary Weierstrass curves over GF(p), which to the best of our knowledge, outperforms other similar works in terms of execution time. Our approach employs the combination of the schoolbook long and Karatsuba multiplication algorithm for the elliptic curve point multiplication (ECPM) to achieve better parallelization while retaining low complexity. In the hardware implementation, the substantial gain in speed is also contributed by our -bit pipelined Montgomery Modular Multiplier (pMMM), which is constructed from our -bit pipelined multiplier-accumulators that utilizes digital signal processor (DSP) primitives as digit multipliers.
View Article and Find Full Text PDFAdversarial attack techniques in deep learning have been studied extensively due to its stealthiness to human eyes and potentially dangerous consequences when applied to real-life applications. However, current attack methods in black-box settings mainly employ a large number of queries for crafting their adversarial examples, hence making them very likely to be detected and responded by the target system (e.g.
View Article and Find Full Text PDFNon-Intrusive Load Monitoring (NILM) allows load identification of appliances through a single sensor. By using NILM, users can monitor their electricity consumption, which is beneficial for energy efficiency or energy saving. In advance NILM systems, identification of appliances on/off events should be processed instantly.
View Article and Find Full Text PDFQuantum mechanical systems with long-range interactions between quasiparticles provide a promising platform for coherent quantum information technology. Superconductors are a natural choice for solid-state based quantum devices, while magnetic impurities inside superconductors give rise to quasiparticle excitations of broken Cooper pairs that provide characteristic information about the host superconductor. Here, we reveal that magnetic impurities embedded below a superconducting La(0001) surface interact via quasiparticles extending to very large distances, up to several tens of nanometers.
View Article and Find Full Text PDFTopological superconductors are predicted to harbor exotic boundary states-Majorana zero-energy modes-whose non-Abelian braiding statistics present a new paradigm for the realization of topological quantum computing. Using low-temperature scanning tunneling spectroscopy, here, we report on the direct real-space visualization of chiral Majorana edge states in a monolayer topological superconductor, a prototypical magnet-superconductor hybrid system composed of nanoscale Fe islands of monoatomic height on a Re(0001)-O(2 × 1) surface. In particular, we demonstrate that interface engineering by an atomically thin oxide layer is crucial for driving the hybrid system into a topologically nontrivial state as confirmed by theoretical calculations of the topological invariant, the Chern number.
View Article and Find Full Text PDFComput Intell Neurosci
April 2018
[This corrects the article DOI: 10.1155/2017/4216281.].
View Article and Find Full Text PDFRealizing Majorana bound states (MBS) in condensed matter systems is a key challenge on the way toward topological quantum computing. As a promising platform, one-dimensional magnetic chains on conventional superconductors were theoretically predicted to host MBS at the chain ends. We demonstrate a novel approach to design of model-type atomic-scale systems for studying MBS using single-atom manipulation techniques.
View Article and Find Full Text PDF