68 resultados para BLOCK-COPOLYMER MICELLE


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Hypertrophic scars are formed by collagen overproduction in wounded areas and often occur in victims of severe burns. There are several methods for hypertrophic scar remediation and silicone gel therapy is one of the more successful methods. Research by others has shown that the activity of these gels may be due to migration of amphiphilic silicone oligomers from the gel and into the dermis, down-regulating production of collagen by fibroblasts. Normal silicone oil (PDMS) does not produce the same effect on fibroblasts. The main purpose of this project is the introduction of a particular amphiphilic silicone rake copolymer into an appropriate network which can absorb and release the silicone copolymer on the scarred area. Hydrogels are polymeric crosslinked networks which can swell in water or a drug solution, and gradually release the drug when applied to the skin. The application of gel enhances the effectiveness of the therapy, reduces the period of treatment and can be comfortable for patients to use. Polyethylene glycol (PEG) based networks have been applied in this research, because the amphiphilic silicone rake copolymer to be used as a therapy has polyethylene oxide (PEO) as a side chain. These PEO side chains have very similar chemical structure to a PEG gel chain so enhancing both the compatibility and the diffusion of the amphiphilic silicone rake copolymer into and out of the gel. Synthesis of PEG-based networks has been performed by two methods: in situ silsesquioxane formation as crosslink with a sol-gel reaction under different conditions and UV curing. PEG networks have low mechanical properties which is a fundamental limitation of the polymer backbone. For mechanical properties enhancement, composite networks were synthesized using nano-silica with different surface modification. The chemical structure of in situ silsesquioxane in the dry network has been examined by Solid State NMR, Differential Scanning Calorimetry (DSC) and swelling measurements in water. Mechanical properties of dry networks were tested by Dynamic Mechanical Thermal Analysis (DMTA) to determine modulus and interfacial interaction between silica and the network. In this way a family of self-reinforced networks has been produced that have been shown to absorb and deliver the active amphiphilic silicone- PEO rake copolymer.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Phospholipid (PL) molecules form the main structure of the membrane that prevents the direct contact of opposing articular cartilage layers. In this paper we conceptualise articular cartilage as a giant reverse micelle (GRM) in which the highly hydrated three-dimensional network of phospholipids is electrically charged and able to resist compressive forces during joint movement, and hence loading. Using this hypothetical base, we describe a hydrophilic-hydrophilic (HL-HL) biopair model of joint lubrication by contacting cartilages, whose mechanism is reliant on lamellar cushioning. To demonstrate the viability of our concept, the electrokinetic properties of the membranous layer on the articular surface were determined by measuring via microelectrophoresis, the adsorption of ions H, OH, Na and Cl on phospholipid membrane of liposomes, leading to the calculation of the effective surface charge density. The surface charge density was found to be -0.08 ± 0.002 cm-2 (mean ± S.D.) for phospholipid membranes, in 0.155 M NaCl solution and physiological pH. This value was approximately five times less than that measured in 0.01 M NaCl. The addition of synovial fluid (SF) to the 0.155 M NaCl solution reduced the surface charge density by 30% which was attributed to the binding of synovial fluid macromolecules to the phospholipid membrane. Our experiments show that particles charge and interact strongly with the polar core of RM. We demonstrate that particles can have strong electrostatic interactions when ions and macromolecules are solubilized by reverse micelle (RM). Since ions are solubilized by reverse micelle, the surface entropy influences the change in the charge density of the phospholipid membrane on cartilage surfaces. Reverse micelles stabilize ions maintaining equilibrium, their surface charges contribute to the stability of particles, while providing additional screening for electrostatic processes. © 2008 Elsevier Ireland Ltd. All rights reserved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background subtraction is a fundamental low-level processing task in numerous computer vision applications. The vast majority of algorithms process images on a pixel-by-pixel basis, where an independent decision is made for each pixel. A general limitation of such processing is that rich contextual information is not taken into account. We propose a block-based method capable of dealing with noise, illumination variations, and dynamic backgrounds, while still obtaining smooth contours of foreground objects. Specifically, image sequences are analyzed on an overlapping block-by-block basis. A low-dimensional texture descriptor obtained from each block is passed through an adaptive classifier cascade, where each stage handles a distinct problem. A probabilistic foreground mask generation approach then exploits block overlaps to integrate interim block-level decisions into final pixel-level foreground segmentation. Unlike many pixel-based methods, ad-hoc postprocessing of foreground masks is not required. Experiments on the difficult Wallflower and I2R datasets show that the proposed approach obtains on average better results (both qualitatively and quantitatively) than several prominent methods. We furthermore propose the use of tracking performance as an unbiased approach for assessing the practical usefulness of foreground segmentation methods, and show that the proposed approach leads to considerable improvements in tracking accuracy on the CAVIAR dataset.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, we present three counterfeiting attacks on the block-wise dependent fragile watermarking schemes. We consider vulnerabilities such as the exploitation of a weak correlation among block-wise dependent watermarks to modify valid watermarked %(medical or other digital) images, where they could still be verified as authentic, though they are actually not. Experimental results successfully demonstrate the practicability and consequences of the proposed attacks for some relevant schemes. The development of the proposed attack models can be used as a means to systematically examine the security levels of similar watermarking schemes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Focal segmental glomerulosclerosis (FSGS) is the consequence of a disease process that attacks the kidney's filtering system, causing serious scarring. More than half of FSGS patients develop chronic kidney failure within 10 years, ultimately requiring dialysis or renal transplantation. There are currently several genes known to cause the hereditary forms of FSGS (ACTN4, TRPC6, CD2AP, INF2, MYO1E and NPHS2). This study involves a large, unique, multigenerational Australian pedigree in which FSGS co-segregates with progressive heart block with apparent X-linked recessive inheritance. Through a classical combined approach of linkage and haplotype analysis, we identified a 21.19 cM interval implicated on the X chromosome. We then used a whole exome sequencing approach to identify two mutated genes, NXF5 and ALG13, which are located within this linkage interval. The two mutations NXF5-R113W and ALG13-T141L segregated perfectly with the disease phenotype in the pedigree and were not found in a large healthy control cohort. Analysis using bioinformatics tools predicted the R113W mutation in the NXF5 gene to be deleterious and cellular studies support a role in the stability and localization of the protein suggesting a causative role of this mutation in these co-morbid disorders. Further studies are now required to determine the functional consequence of these novel mutations to development of FSGS and heart block in this pedigree and to determine whether these mutations have implications for more common forms of these diseases in the general population.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A fundamental part of many authentication protocols which authenticate a party to a human involves the human recognizing or otherwise processing a message received from the party. Examples include typical implementations of Verified by Visa in which a message, previously stored by the human at a bank, is sent by the bank to the human to authenticate the bank to the human; or the expectation that humans will recognize or verify an extended validation certificate in a HTTPS context. This paper presents general definitions and building blocks for the modelling and analysis of human recognition in authentication protocols, allowing the creation of proofs for protocols which include humans. We cover both generalized trawling and human-specific targeted attacks. As examples of the range of uses of our construction, we use the model presented in this paper to prove the security of a mutual authentication login protocol and a human-assisted device pairing protocol.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Earthwork planning has been considered in this article and a generic block partitioning and modelling approach has been devised to provide strategic plans of various levels of detail. Conceptually this approach is more accurate and comprehensive than others, for instance those that are section based. In response to environmental concerns the metric for decision making was fuel consumption and emissions. Haulage distance and gradient are also included as they are important components of these metrics. Advantageously the fuel consumption metric is generic and captures the physical difficulties of travelling over inclines of different gradients, that is consistent across all hauling vehicles. For validation, the proposed models and techniques have been applied to a real world road project. The numerical investigations have demonstrated that the models can be solved with relatively little CPU time. The proposed block models also result in solutions of superior quality, i.e. they have reduced fuel consumption and cost. Furthermore the plans differ considerably from those based solely upon a distance based metric thus demonstrating a need for industry to reflect upon their current practices.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper we investigate the differential properties of block ciphers in hash function modes of operation. First we show the impact of differential trails for block ciphers on collision attacks for various hash function constructions based on block ciphers. Further, we prove the lower bound for finding a pair that follows some truncated differential in case of a random permutation. Then we present open-key differential distinguishers for some well known round-reduced block ciphers.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Several recently proposed ciphers, for example Rijndael and Serpent, are built with layers of small S-boxes interconnected by linear key-dependent layers. Their security relies on the fact, that the classical methods of cryptanalysis (e.g. linear or differential attacks) are based on probabilistic characteristics, which makes their security grow exponentially with the number of rounds N r r. In this paper we study the security of such ciphers under an additional hypothesis: the S-box can be described by an overdefined system of algebraic equations (true with probability 1). We show that this is true for both Serpent (due to a small size of S-boxes) and Rijndael (due to unexpected algebraic properties). We study general methods known for solving overdefined systems of equations, such as XL from Eurocrypt’00, and show their inefficiency. Then we introduce a new method called XSL that uses the sparsity of the equations and their specific structure. The XSL attack uses only relations true with probability 1, and thus the security does not have to grow exponentially in the number of rounds. XSL has a parameter P, and from our estimations is seems that P should be a constant or grow very slowly with the number of rounds. The XSL attack would then be polynomial (or subexponential) in N r> , with a huge constant that is double-exponential in the size of the S-box. The exact complexity of such attacks is not known due to the redundant equations. Though the presented version of the XSL attack always gives always more than the exhaustive search for Rijndael, it seems to (marginally) break 256-bit Serpent. We suggest a new criterion for design of S-boxes in block ciphers: they should not be describable by a system of polynomial equations that is too small or too overdefined.