Improving the wettability of and reducing the protein adsorption to contact lenses may be beneficial for improving wearer comfort. Herein, we describe a simple "click" chemistry approach to surface functionalize poly(2-hydroxyethyl methacrylate) (pHEMA)-based contact lenses with hyaluronic acid (HA), a carbohydrate naturally contributing to the wettability of the native tear film. A two-step preparation technique consisting of laccase/TEMPO-mediated oxidation followed by covalent grafting of hydrazide-functionalized HA via simple immersion resulted in a model lens surface that is significantly more wettable, more water retentive, and less protein binding than unmodified pHEMA while maintaining the favorable transparency, refractive, and mechanical properties of a native lens. The dipping/coating method we developed to covalently tether the HA wetting agent is simple, readily scalable, and a highly efficient route for contact lens modification.
The exploration of hybrid quantum-classical algorithms and programming models on noisy near-term quantum hardware has begun. As hybrid programs scale towards classical intractability, validation and benchmarking are critical to understanding the utility of the hybrid computational model. In this paper, we demonstrate a newly developed quantum circuit simulator based on tensor network theory that enables intermediate-scale verification and validation of hybrid quantum-classical computing frameworks and programming models. We present our tensor-network quantum virtual machine (TNQVM) simulator which stores a multi-qubit wavefunction in a compressed (factorized) form as a matrix product state, thus enabling single-node simulations of larger qubit registers, as compared to brute-force state-vector simulators. Our simulator is designed to be extensible in both the tensor network form and the classical hardware used to run the simulation (multicore, GPU, distributed). The extensibility of the TNQVM simulator with respect to the simulation hardware type is achieved via a pluggable interface for different numerical backends (e.g., ITensor and ExaTENSOR numerical libraries). We demonstrate the utility of our TNQVM quantum circuit simulator through the verification of randomized quantum circuits and the variational quantum eigensolver algorithm, both expressed within the eXtreme-scale ACCelerator (XACC) programming model.
Stack Overflow (SO) is the most popular online Q&A site for developers to share their expertise in solving programming issues. Given multiple answers to certain questions, developers may take the accepted answer, the answer from a person with high reputation, or the one frequently suggested. However, researchers recently observed that SO contains exploitable security vulnerabilities in the suggested code of popular answers, which found their way into security-sensitive highprofile applications that millions of users install every day. This observation inspires us to explore the following questions: How much can we trust the security implementation suggestions on SO? If suggested answers are vulnerable, can developers rely on the community's dynamics to infer the vulnerability and identify a secure counterpart?To answer these highly important questions, we conducted a comprehensive study on security-related SO posts by contrasting secure and insecure advice with the community-given content evaluation. Thereby, we investigated whether SO's gamification approach on incentivizing users is effective in improving security properties of distributed code examples. Moreover, we traced the distribution of duplicated samples over given answers to test whether the community behavior facilitates or prevents propagation of secure and insecure code suggestions within SO.We compiled 953 different groups of similar security-related code examples and labeled their security, identifying 785 secure answer posts and 644 insecure answer posts. Compared with secure suggestions, insecure ones had higher view counts (36,508 vs. 18,713), received a higher score (14 vs. 5), and had significantly more duplicates (3.8 vs. 3.0) on average. 34% of the posts provided by highly reputable so-called trusted users were insecure.Our findings show that based on the distribution of secure and insecure code on SO, users being laymen in security rely on additional advice and guidance. However, the communitygiven feedback does not allow differentiating secure from insecure choices. The reputation mechanism fails in indicating trustworthy users with respect to security questions, ultimately leaving other users wandering around alone in a software security minefield.Index Terms-Stack Overflow, crowdsourced knowledge, social dynamics, security implementation K e y P a i r G e n e r a t o r kpg = K e y P a i r G e n e r a t o r . g e t I n s t a n c e ( " RSA " ) ; kpg . i n i t i a l i z e ( 1 0 2 4 ) ; K e y P a i r kp = kpg . g e n e r a t e K e y P a i r ( ) ; RSAPublicKey pub = ( RSAPublicKey ) kp . g e t P u b l i c ( ) ; RSAPrivateKey p r i v = ( RSAPrivateKey ) kp . g e t P r i v a t e ( ) ;Hash: In the context of password-based key derivation, digital signatures, and authentication/authorization, developers may explicitly invoke broken hash functions. Listing 4 shows an example using MD5.
A high-sensitivity flow-based immunoassay is reported based on a gold-coated quartz crystal microbalance (QCM) chip functionalized directly in the QCM without requiring covalent conjugation steps. Specifically, the irreversible adsorption of a biotinylated graphene oxide-avidin complex followed by loading of a biotinylated capture antibody is applied to avoid more complex conventional surface modification chemistries and enable chip functionalization and sensing all within the QCM instrument. The resulting immunosensors exhibit significantly lower nonspecific protein adsorption and stronger signal for antigen sensing relative to simple avidin-coated sensors. Reproducible quantification of rabbit IgG concentrations ranging from 0.1 ng/mL to 10 μg/mL (6 orders of magnitude) can be achieved depending on the approach used to quantify the binding with simple mass changes used to detect higher concentrations and a horseradish peroxidase-linked detection antibody that converts its substrate to a measurable precipitate used to detect very low analyte concentrations. Sensor fabrication and assay performance take ∼5 h in total, which is on par with or faster than other techniques. Quantitative sensing is possible in the presence of complex protein mixtures, such as human plasma. Given the broad availability of biotinylated capture antibodies, this method offers both an easy and flexible platform for the quantitative sensing of a variety of biomolecule targets.
Topological phases typically encode topology at the level of the single particle band structure. But a remarkable class of models shows that quantum anomalous Hall effects can be driven exclusively by interactions, while the parent noninteracting band structure is topologically trivial. Unfortunately, these models have so far relied on interactions that do not spatially decay and are therefore unphysical. We study a model of spinless fermions on a decorated honeycomb lattice. Using complementary methods, mean-field theory and exact diagonalization, we find a robust quantum anomalous Hall phase arising from spatially decaying interactions. Our finding indicates that the quantum anomalous Hall effect driven entirely by interactions is a surprisingly robust and realistic phenomenon.arXiv:1705.05829v3 [cond-mat.str-el]
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.