This growing collection consists of scholarly works authored by ASU-affiliated faculty, staff, and community members, and it contains many open access articles. ASU-affiliated authors are encouraged to Share Your Work in KEEP.

Displaying 1 - 10 of 51
Filtering by

Clear all filters

Description

A structurally and compositionally well-defined and spectrally tunable artificial light-harvesting system has been constructed in which multiple organic dyes attached to a three-arm-DNA nanostructure serve as an antenna conjugated to a photosynthetic reaction center isolated from Rhodobacter sphaeroides 2.4.1. The light energy absorbed by the dye molecules is transferred to

A structurally and compositionally well-defined and spectrally tunable artificial light-harvesting system has been constructed in which multiple organic dyes attached to a three-arm-DNA nanostructure serve as an antenna conjugated to a photosynthetic reaction center isolated from Rhodobacter sphaeroides 2.4.1. The light energy absorbed by the dye molecules is transferred to the reaction center, where charge separation takes place. The average number of DNA three-arm junctions per reaction center was tuned from 0.75 to 2.35. This DNA-templated multichromophore system serves as a modular light-harvesting antenna that is capable of being optimized for its spectral properties, energy transfer efficiency, and photostability, allowing one to adjust both the size and spectrum of the resulting structures. This may serve as a useful test bed for developing nanostructured photonic systems.

ContributorsDutta, Palash (Author) / Levenberg, Symon (Author) / Loskutov, Andrey (Author) / Jun, Daniel (Author) / Saer, Rafael (Author) / Beatty, J. Thomas (Author) / Lin, Su (Author) / Liu, Yan (Author) / Woodbury, Neal (Author) / Yan, Hao (Author) / Department of Chemistry and Biochemistry (Contributor)
Created2014-11-26
Description

Stone-tipped weapons were a significant innovation for Middle Pleistocene hominins. Hafted hunting technology represents the development of new cognitive and social learning mechanisms within the genus Homo, and may have provided a foraging advantage over simpler forms of hunting technology, such as a sharpened wooden spear. However, the nature of

Stone-tipped weapons were a significant innovation for Middle Pleistocene hominins. Hafted hunting technology represents the development of new cognitive and social learning mechanisms within the genus Homo, and may have provided a foraging advantage over simpler forms of hunting technology, such as a sharpened wooden spear. However, the nature of this foraging advantage has not been confirmed. Experimental studies and ethnographic reports provide conflicting results regarding the relative importance of the functional, economic, and social roles of hafted hunting technology. The controlled experiment reported here was designed to test the functional hypothesis for stone-tipped weapons using spears and ballistics gelatin. It differs from previous investigations of this type because it includes a quantitative analysis of wound track profiles and focuses specifically on hand-delivered spear technology. Our results do not support the hypothesis that tipped spears penetrate deeper than untipped spears. However, tipped spears create a significantly larger inner wound cavity that widens distally. This inner wound cavity is analogous to the permanent wound cavity in ballistics research, which is considered the key variable affecting the relative ‘stopping power’ or ‘killing power’ of a penetrating weapon. Tipped spears conferred a functional advantage to Middle Pleistocene hominins, potentially affecting the frequency and regularity of hunting success with important implications for human adaptation and life history.

ContributorsWilkins, Jayne (Author) / Schoville, Benjamin (Author) / Brown, Kyle S. (Author) / School of Human Evolution and Social Change (Contributor)
Created2014-08-27
Description

Time-resolved fluorescence spectroscopy was used to explore the pathway and kinetics of energy transfer in photosynthetic membrane vesicles (chromatophores) isolated from Rhodobacter (Rba.) sphaeroides cells harvested 2, 4, 6 or 24 hours after a transition from growth in high to low level illumination. As previously observed, this light intensity transition

Time-resolved fluorescence spectroscopy was used to explore the pathway and kinetics of energy transfer in photosynthetic membrane vesicles (chromatophores) isolated from Rhodobacter (Rba.) sphaeroides cells harvested 2, 4, 6 or 24 hours after a transition from growth in high to low level illumination. As previously observed, this light intensity transition initiates the remodeling of the photosynthetic apparatus and an increase in the number of light harvesting 2 (LH2) complexes relative to light harvesting 1 (LH1) and reaction center (RC) complexes. It has generally been thought that the increase in LH2 complexes served the purpose of increasing the overall energy transmission to the RC. However, fluorescence lifetime measurements and analysis in terms of energy transfer within LH2 and between LH2 and LH1 indicate that, during the remodeling time period measured, only a portion of the additional LH2 generated are well connected to LH1 and the reaction center. The majority of the additional LH2 fluorescence decays with a lifetime comparable to that of free, unconnected LH2 complexes. The presence of large LH2-only domains has been observed by atomic force microscopy in Rba. sphaeroides chromatophores (Bahatyrova et al., Nature, 2004, 430, 1058), providing structural support for the existence of pools of partially connected LH2 complexes. These LH2-only domains represent the light-responsive antenna complement formed after a switch in growth conditions from high to low illumination, while the remaining LH2 complexes occupy membrane regions containing mixtures of LH2 and LH1–RC core complexes. The current study utilized a multi-parameter approach to explore the fluorescence spectroscopic properties related to the remodeling process, shedding light on the structure-function relationship of the photosynthetic assembles. Possible reasons for the accumulation of these largely disconnected LH2-only pools are discussed.

ContributorsDriscoll, Brent (Author) / Lunceford, Chad (Author) / Lin, Su (Author) / Woronowicz, K. (Author) / Niederman, R. A. (Author) / Woodbury, Neal (Author) / College of Liberal Arts and Sciences (Contributor)
Created2014-08-28
Description

A relatively unexplored issue in cybersecurity science and engineering is whether there exist intrinsic patterns of cyberattacks. Conventional wisdom favors absence of such patterns due to the overwhelming complexity of the modern cyberspace. Surprisingly, through a detailed analysis of an extensive data set that records the time-dependent frequencies of attacks

A relatively unexplored issue in cybersecurity science and engineering is whether there exist intrinsic patterns of cyberattacks. Conventional wisdom favors absence of such patterns due to the overwhelming complexity of the modern cyberspace. Surprisingly, through a detailed analysis of an extensive data set that records the time-dependent frequencies of attacks over a relatively wide range of consecutive IP addresses, we successfully uncover intrinsic spatiotemporal patterns underlying cyberattacks, where the term “spatio” refers to the IP address space. In particular, we focus on analyzing macroscopic properties of the attack traffic flows and identify two main patterns with distinct spatiotemporal characteristics: deterministic and stochastic. Strikingly, there are very few sets of major attackers committing almost all the attacks, since their attack “fingerprints” and target selection scheme can be unequivocally identified according to the very limited number of unique spatiotemporal characteristics, each of which only exists on a consecutive IP region and differs significantly from the others. We utilize a number of quantitative measures, including the flux-fluctuation law, the Markov state transition probability matrix, and predictability measures, to characterize the attack patterns in a comprehensive manner. A general finding is that the attack patterns possess high degrees of predictability, potentially paving the way to anticipating and, consequently, mitigating or even preventing large-scale cyberattacks using macroscopic approaches.

ContributorsChen, Yu-Zhong (Author) / Huang, Zi-Gang (Author) / Xu, Shouhuai (Author) / Lai, Ying-Cheng (Author) / Ira A. Fulton Schools of Engineering (Contributor)
Created2015-05-20
Description

Supply-demand processes take place on a large variety of real-world networked systems ranging from power grids and the internet to social networking and urban systems. In a modern infrastructure, supply-demand systems are constantly expanding, leading to constant increase in load requirement for resources and consequently, to problems such as low

Supply-demand processes take place on a large variety of real-world networked systems ranging from power grids and the internet to social networking and urban systems. In a modern infrastructure, supply-demand systems are constantly expanding, leading to constant increase in load requirement for resources and consequently, to problems such as low efficiency, resource scarcity, and partial system failures. Under certain conditions global catastrophe on the scale of the whole system can occur through the dynamical process of cascading failures. We investigate optimization and resilience of time-varying supply-demand systems by constructing network models of such systems, where resources are transported from the supplier sites to users through various links. Here by optimization we mean minimization of the maximum load on links, and system resilience can be characterized using the cascading failure size of users who fail to connect with suppliers.

We consider two representative classes of supply schemes: load driven supply and fix fraction supply. Our findings are: (1) optimized systems are more robust since relatively smaller cascading failures occur when triggered by external perturbation to the links; (2) a large fraction of links can be free of load if resources are directed to transport through the shortest paths; (3) redundant links in the performance of the system can help to reroute the traffic but may undesirably transmit and enlarge the failure size of the system; (4) the patterns of cascading failures depend strongly upon the capacity of links; (5) the specific location of the trigger determines the specific route of cascading failure, but has little effect on the final cascading size; (6) system expansion typically reduces the efficiency; and (7) when the locations of the suppliers are optimized over a long expanding period, fewer suppliers are required. These results hold for heterogeneous networks in general, providing insights into designing optimal and resilient complex supply-demand systems that expand constantly in time.

ContributorsZhang, Si-Ping (Author) / Huang, Zi-Gang (Author) / Dong, Jia-Qi (Author) / Eisenberg, Daniel (Author) / Seager, Thomas (Author) / Lai, Ying-Cheng (Author) / Ira A. Fulton Schools of Engineering (Contributor)
Created2015-06-23
128811-Thumbnail Image.png
Description

The Middle Stone Age (MSA) is associated with early evidence for symbolic material culture and complex technological innovations. However, one of the most visible aspects of MSA technologies are unretouched triangular stone points that appear in the archaeological record as early as 500,000 years ago in Africa and persist throughout

The Middle Stone Age (MSA) is associated with early evidence for symbolic material culture and complex technological innovations. However, one of the most visible aspects of MSA technologies are unretouched triangular stone points that appear in the archaeological record as early as 500,000 years ago in Africa and persist throughout the MSA. How these tools were being used and discarded across a changing Pleistocene landscape can provide insight into how MSA populations prioritized technological and foraging decisions. Creating inferential links between experimental and archaeological tool use helps to establish prehistoric tool function, but is complicated by the overlaying of post-depositional damage onto behaviorally worn tools. Taphonomic damage patterning can provide insight into site formation history, but may preclude behavioral interpretations of tool function. Here, multiple experimental processes that form edge damage on unretouched lithic points from taphonomic and behavioral processes are presented. These provide experimental distributions of wear on tool edges from known processes that are then quantitatively compared to the archaeological patterning of stone point edge damage from three MSA lithic assemblages—Kathu Pan 1, Pinnacle Point Cave 13B, and Die Kelders Cave 1. By using a model-fitting approach, the results presented here provide evidence for variable MSA behavioral strategies of stone point utilization on the landscape consistent with armature tips at KP1, and cutting tools at PP13B and DK1, as well as damage contributions from post-depositional sources across assemblages. This study provides a method with which landscape-scale questions of early modern human tool-use and site-use can be addressed.

ContributorsSchoville, Benjamin J. (Author) / Brown, Kyle S. (Author) / Harris, Jacob (Author) / Wilkins, Jayne (Author) / School of Human Evolution and Social Change (Contributor)
Created2016-10-13
128259-Thumbnail Image.png
Description

We formulate an in silico model of pathogen avoidance mechanism and investigate its impact on defensive behavioural measures (e.g., spontaneous social exclusions and distancing, crowd avoidance and voluntary vaccination adaptation). In particular, we use SIR(B)S (e.g., susceptible-infected-recovered with additional behavioural component) model to investigate the impact of homo-psychologicus aspects of

We formulate an in silico model of pathogen avoidance mechanism and investigate its impact on defensive behavioural measures (e.g., spontaneous social exclusions and distancing, crowd avoidance and voluntary vaccination adaptation). In particular, we use SIR(B)S (e.g., susceptible-infected-recovered with additional behavioural component) model to investigate the impact of homo-psychologicus aspects of epidemics. We focus on reactionary behavioural changes, which apply to both social distancing and voluntary vaccination participations. Our analyses reveal complex relationships between spontaneous and uncoordinated behavioural changes, the emergence of its contagion properties, and mitigation of infectious diseases. We find that the presence of effective behavioural changes can impede the persistence of disease. Furthermore, it was found that under perfect effective behavioural change, there are three regions in the response factor (e.g., imitation and/or reactionary) and behavioural scale factor (e.g., global/local) factors ρ–α behavioural space. Mainly, (1) disease is always endemic even in the presence of behavioural change, (2) behavioural-prevalence plasticity is observed and disease can sometimes be eradication, and (3) elimination of endemic disease under permanence of permanent behavioural change is achieved. These results suggest that preventive behavioural changes (e.g., non-pharmaceutical prophylactic measures, social distancing and exclusion, crowd avoidance) are influenced by individual differences in perception of risks and are a salient feature of epidemics. Additionally, these findings indicates that care needs to be taken when considering the effect of adaptive behavioural change in predicting the course of epidemics, and as well as the interpretation and development of the public health measures that account for spontaneous behavioural changes.

Created2015-10-14
127875-Thumbnail Image.png
Description

Neuropharmacological effects of psychedelics have profound cognitive, emotional, and social effects that inspired the development of cultures and religions worldwide. Findings that psychedelics objectively and reliably produce mystical experiences press the question of the neuropharmacological mechanisms by which these highly significant experiences are produced by exogenous neurotransmitter analogs. Humans have

Neuropharmacological effects of psychedelics have profound cognitive, emotional, and social effects that inspired the development of cultures and religions worldwide. Findings that psychedelics objectively and reliably produce mystical experiences press the question of the neuropharmacological mechanisms by which these highly significant experiences are produced by exogenous neurotransmitter analogs. Humans have a long evolutionary relationship with psychedelics, a consequence of psychedelics' selective effects for human cognitive abilities, exemplified in the information rich visionary experiences. Objective evidence that psychedelics produce classic mystical experiences, coupled with the finding that hallucinatory experiences can be induced by many non-drug mechanisms, illustrates the need for a common model of visionary effects. Several models implicate disturbances of normal regulatory processes in the brain as the underlying mechanisms responsible for the similarities of visionary experiences produced by psychedelic and other methods for altering consciousness. Similarities in psychedelic-induced visionary experiences and those produced by practices such as meditation and hypnosis and pathological conditions such as epilepsy indicate the need for a general model explaining visionary experiences. Common mechanisms underlying diverse alterations of consciousness involve the disruption of normal functions of the prefrontal cortex and default mode network (DMN). This interruption of ordinary control mechanisms allows for the release of thalamic and other lower brain discharges that stimulate a visual information representation system and release the effects of innate cognitive functions and operators. Converging forms of evidence support the hypothesis that the source of psychedelic experiences involves the emergence of these innate cognitive processes of lower brain systems, with visionary experiences resulting from the activation of innate processes based in the mirror neuron system (MNS).

Created2017-09-28
127848-Thumbnail Image.png
Description

There are an increasing variety of applications in which peptides are both synthesized and used attached to solid surfaces. This has created a need for high throughput sequence analysis directly on surfaces. However, common sequencing approaches that can be adapted to surface bound peptides lack the throughput often needed in

There are an increasing variety of applications in which peptides are both synthesized and used attached to solid surfaces. This has created a need for high throughput sequence analysis directly on surfaces. However, common sequencing approaches that can be adapted to surface bound peptides lack the throughput often needed in library-based applications. Here we describe a simple approach for sequence analysis directly on solid surfaces that is both high speed and high throughput, utilizing equipment available in most protein analysis facilities. In this approach, surface bound peptides, selectively labeled at their N-termini with a positive charge-bearing group, are subjected to controlled degradation in ammonia gas, resulting in a set of fragments differing by a single amino acid that remain spatially confined on the surface they were bound to. These fragments can then be analyzed by MALDI mass spectrometry, and the peptide sequences read directly from the resulting spectra.

ContributorsZhao, Zhan-Gong (Author) / Cordovez, Lalaine Anne (Author) / Johnston, Stephen (Author) / Woodbury, Neal (Author) / Biodesign Institute (Contributor)
Created2017-12-19
128864-Thumbnail Image.png
Description

The Whistler Squat Quarry (TMM 41372) of the lower Devil’s Graveyard Formation in Trans-Pecos Texas is a middle Eocene fossil locality attributed to Uintan biochronological zone Ui1b. Specimens from the Whistler Squat Quarry were collected immediately above a volcanic tuff with prior K/Ar ages ranging from ∼47–50 Ma and below

The Whistler Squat Quarry (TMM 41372) of the lower Devil’s Graveyard Formation in Trans-Pecos Texas is a middle Eocene fossil locality attributed to Uintan biochronological zone Ui1b. Specimens from the Whistler Squat Quarry were collected immediately above a volcanic tuff with prior K/Ar ages ranging from ∼47–50 Ma and below a tuff previously dated to ∼44 Ma. New [superscript 40]Ar/[superscript 39]Ar analyses of both of the original tuff samples provide statistically indistinguishable ages of 44.88±0.04 Ma for the lower tuff and 45.04±0.10 Ma for the upper tuff. These dates are compatible with magnetically reversed sediments at the site attributable to C20r (43.505–45.942 Ma) and a stratigraphic position above a basalt dated to 46.80 Ma. Our reanalysis of mammalian specimens from the Whistler Squat Quarry and a stratigraphically equivalent locality significantly revises their faunal lists, confirms the early Uintan designation for the sites, and highlights several biogeographic and biochronological differences when compared to stratotypes in the Bridger and Uinta Formations. Previous suggestions of regional endemism in the early Uintan are supported by the recognition of six endemic taxa (26% of mammalian taxa) from the Whistler Squat Quarry alone, including three new taxa. The revised faunal list for the Whistler Squat Quarry also extends the biostratigraphic ranges of nine non-endemic mammalian taxa to Ui1b.

Created2014-07-02