155 resultados para SODIUM-SULFONATE GROUPS


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Nedd4-2, a HECT (homologous with E6-associated protein C-terminus)-type ubiquitin protein ligase, has been implicated in regulating several ion channels, including Navs (voltage-gated sodium channels). In Xenopus oocytes Nedd4-2 strongly inhibits the activity of multiple Navs. However, the conditions under which Nedd4-2 mediates native Nav regulation remain uncharacterized. Using Nedd4-2-deficient mice, we demonstrate in the present study that in foetal cortical neurons Nedd4-2 regulates Navs specifically in response to elevated intracellular Na(+), but does not affect steady-state Nav activity. In dorsal root ganglia neurons from the same mice, however, Nedd4-2 does not control Nav activities. The results of the present study provide the first physiological evidence for an essential function of Nedd4-2 in regulating Navs in the central nervous system.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The μO-conotoxins are an intriguing class of conotoxins targeting various voltage-dependent sodium channels and molluscan calcium channels. In the current study, we have shown MrVIA and MrVIB to be the first known peptidic inhibitors of the transient tetrodotoxin-resistant (TTX-R) Na+ current in rat dorsal root ganglion neurons, in addition to inhibiting tetrodotoxin-sensitive Na+ currents. Human TTX-R sodium channels are a therapeutic target for indications such as pain, highlighting the importance of the μO-conotoxins as potential leads for drug development. Furthermore, we have used NMR spectroscopy to provide the first structural information on this class of conotoxins. MrVIA and MrVIB are hydrophobic peptides that aggregate in aqueous solution but were solubilized in 50% acetonitrile/water. The three-dimensional structure of MrVIB consists of a small β-sheet and a cystine knot arrangement of the three-disulfide bonds. It contains four backbone “loops” between successive cysteine residues that are exposed to the solvent to varying degrees. The largest of these, loop 2, is the most disordered part of the molecule, most likely due to flexibility in solution. This disorder is the most striking difference between the structures of MrVIB and the known δ- and ω-conotoxins, which along with the μO-conotoxins are members of the O superfamily. Loop 2 of ω-conotoxins has previously been shown to contain residues critical for binding to voltage-gated calcium channels, and it is interesting to speculate that the flexibility observed in MrVIB may accommodate binding to both sodium and molluscan calcium channels.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We describe a short signature scheme that is strongly existentially unforgeable under an adaptive chosen message attack in the standard security model. Our construction works in groups equipped with an efficient bilinear map, or, more generally, an algorithm for the Decision Diffie-Hellman problem. The security of our scheme depends on a new intractability assumption we call Strong Diffie-Hellman (SDH), by analogy to the Strong RSA assumption with which it shares many properties. Signature generation in our system is fast and the resulting signatures are as short as DSA signatures for comparable security. We give a tight reduction proving that our scheme is secure in any group in which the SDH assumption holds, without relying on the random oracle model.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We study the natural problem of secure n-party computation (in the computationally unbounded attack model) of circuits over an arbitrary finite non-Abelian group (G,⋅), which we call G-circuits. Besides its intrinsic interest, this problem is also motivating by a completeness result of Barrington, stating that such protocols can be applied for general secure computation of arbitrary functions. For flexibility, we are interested in protocols which only require black-box access to the group G (i.e. the only computations performed by players in the protocol are a group operation, a group inverse, or sampling a uniformly random group element). Our investigations focus on the passive adversarial model, where up to t of the n participating parties are corrupted.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Most previous work on unconditionally secure multiparty computation has focused on computing over a finite field (or ring). Multiparty computation over other algebraic structures has not received much attention, but is an interesting topic whose study may provide new and improved tools for certain applications. At CRYPTO 2007, Desmedt et al introduced a construction for a passive-secure multiparty multiplication protocol for black-box groups, reducing it to a certain graph coloring problem, leaving as an open problem to achieve security against active attacks. We present the first n-party protocol for unconditionally secure multiparty computation over a black-box group which is secure under an active attack model, tolerating any adversary structure Δ satisfying the Q 3 property (in which no union of three subsets from Δ covers the whole player set), which is known to be necessary for achieving security in the active setting. Our protocol uses Maurer’s Verifiable Secret Sharing (VSS) but preserves the essential simplicity of the graph-based approach of Desmedt et al, which avoids each shareholder having to rerun the full VSS protocol after each local computation. A corollary of our result is a new active-secure protocol for general multiparty computation of an arbitrary Boolean circuit.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Na-dodecylbenzenesulfate (SDBS), a natural anionic surfactant, has been successfully intercalated into a Ca based LDH host structure during tricalcium aluminate hydration in the presence of SDBS aqueous solution (CaAl-SDBS-LDH). The resulting product was characterized by powder X-ray diffraction (XRD), mid-infrared (MIR) spectroscopy combined with near-infrared (NIR) spectroscopy technique, thermal analysis (TG–DTA) and scan electron microscopy (SEM). The XRD results revealed that the interlayer distance of resultant product was expanded to 30.46 Å. MIR combined with NIR spectra offered an effective method to illustrate this intercalation. The NIR spectra (6000–5500 cm−1) displayed prominent bands to expound SDBS intercalated into hydration product of C3A. And the bands around 8300 cm−1 were assigned to the second overtone of the first fundamental of CH stretching vibrations of SDBS. In addition, thermal analysis showed that the dehydration and dehydroxylation took place at ca. 220 °C and 348 °C, respectively. The SEM results appeared approximately hexagonal platy crystallites morphology for CaAl-SDBS-LDH, with particle size smaller and thinner.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the title p-toluenesulfonate salt of the drug dapsone, C12H13N2O2S+ C7H7O3S-, the dihedral angle between the two aromatic rings of the dapsone monocation is 70.19(17)deg. and those between these rings and that of the p-toluenesulfonate anion are 72.34(17) and 46.43(17)deg. All amine and aminium H-atoms are involved in intermolecular N-H...O hydrogen-bonding associations with sulfonyl O-atom acceptors as well as one of the sulfone O-atoms, giving a three-dimensional structure.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We report on the use of the hydrogen bond acceptor properties of some phosphorus-containing functional groups for the assembly of a series of [2]rotaxanes. Phosphinamides, and the homologous thio– and selenophosphinamides, act as hydrogen bond acceptors that, in conjunction with an appropriately positioned amide group on the thread, direct the assembly of amide-based macrocycles around the axle to form rotaxanes in up to 60% yields. Employing solely phosphorus-based functional groups as the hydrogen bond accepting groups on the thread, a bis(phosphinamide) template and a phosphine oxide-phosphinamide template afforded the corresponding rotaxanes in 18 and 15 % yields, respectively. X-Ray crystallography of the rotaxanes shows the presence of up to four intercomponent hydrogen bonds between the amide groups of the macrocycle and various hydrogen bond accepting groups on the thread, including rare examples of amide-to-phosphonamide, -thiophosphinamide and -selenophosphinamide groups. With a phosphine oxide-phosphinamide thread, the solid state structure of the rotaxane is remarkable, featuring no direct intercomponent hydrogen bonds but rather a hydrogen bond network involving water molecules that bridge the H-bonding groups of the macrocycle and thread through bifurcated hydrogen bonds. The incorporation of phosphorus-based functional groups into rotaxanes may prove useful for the development of molecular shuttles in which the macrocycle can be used to hinder or expose binding ligating sites for metal-based catalysts.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background: An arteriovenous loop (AVL) enclosed in a polycarbonate chamber in vivo, produces a fibrin exudate which acts as a provisional matrix for the development of a tissue engineered microcirculatory network. Objectives: By administering enoxaparin sodium - an inhibitor of fibrin polymerization, the significance of fibrin scaffold formation on AVL construct size (including the AVL, fibrin scaffold, and new tissue growth into the fibrin), growth, and vascularization were assessed and compared to controls. Methods: In Sprague Dawley rats, an AVL was created on femoral vessels and inserted into a polycarbonate chamber in the groin in 3 control groups (Series I) and 3 experimental groups (Series II). Two hours before surgery and 6 hours post-surgery, saline (Series I) or enoxaparin sodium (0.6 mg/kg, Series II) was administered intra-peritoneally. Thereafter, the rats were injected daily with saline (Series I) or enoxaparin sodium (1.5 mg/kg, Series II) until construct retrieval at 3, 10, or 21 days. The retrieved constructs underwent weight and volume measurements, and morphologic/morphometric analysis of new tissue components. Results: Enoxaparin sodium treatment resulted in the development of smaller AVL constructs at 3, 10, and 21 days. Construct weight and volume were significantly reduced at 10 days (control weight 0.337 ± 0.016 g [Mean ± SEM] vs treated 0.228 ± 0.048, [P < .001]: control volume 0.317 ± 0.015 mL vs treated 0.184 ± 0.039 mL [P < .01]) and 21 days (control weight 0.306 ± 0.053 g vs treated 0.198 ± 0.043 g [P < .01]: control volume 0.285 ± 0.047 mL vs treated 0.148 ± 0.041 mL, [P < .01]). Angiogenesis was delayed in the enoxaparin sodium-treated constructs with the absolute vascular volume significantly decreased at 10 days (control vascular volume 0.029 ± 0.03 mL vs treated 0.012 ± 0.002 mL [P < .05]). Conclusion: In this in vivo tissue engineering model, endogenous, extra-vascularly deposited fibrin volume determines construct size and vascular growth in the first 3 weeks and is, therefore, critical to full construct development.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study examined the formation and operation of women's microfinance self-help groups in southern India and investigated whether or not the poorest of the poor women were accepted as members of those groups. The study found that caste was used as a selection criterion. Many eligible women excluded themselves from joining the self-help group due to their own lack of education, age, poor health, poverty and lack of trust in the system. The research revealed that self-help groups enhanced women's income and education, improved village infrastructure, and reduced household conflict. Factors that might prevent inclusion of the poorest of the poor in future microfinance programs were identified.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We consider the following problem: a user stores encrypted documents on an untrusted server, and wishes to retrieve all documents containing some keywords without any loss of data confidentiality. Conjunctive keyword searches on encrypted data have been studied by numerous researchers over the past few years, and all existing schemes use keyword fields as compulsory information. This however is impractical for many applications. In this paper, we propose a scheme of keyword field-free conjunctive keyword searches on encrypted data, which affirmatively answers an open problem asked by Golle et al. at ACNS 2004. Furthermore, the proposed scheme is extended to the dynamic group setting. Security analysis of our constructions is given in the paper.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We study the natural problem of secure n-party computation (in the passive, computationally unbounded attack model) of the n-product function f G (x 1,...,x n ) = x 1 ·x 2 ⋯ x n in an arbitrary finite group (G,·), where the input of party P i is x i  ∈ G for i = 1,...,n. For flexibility, we are interested in protocols for f G which require only black-box access to the group G (i.e. the only computations performed by players in the protocol are a group operation, a group inverse, or sampling a uniformly random group element). Our results are as follows. First, on the negative side, we show that if (G,·) is non-abelian and n ≥ 4, then no ⌈n/2⌉-private protocol for computing f G exists. Second, on the positive side, we initiate an approach for construction of black-box protocols for f G based on k-of-k threshold secret sharing schemes, which are efficiently implementable over any black-box group G. We reduce the problem of constructing such protocols to a combinatorial colouring problem in planar graphs. We then give two constructions for such graph colourings. Our first colouring construction gives a protocol with optimal collusion resistance t < n/2, but has exponential communication complexity O(n*2t+1^2/t) group elements (this construction easily extends to general adversary structures). Our second probabilistic colouring construction gives a protocol with (close to optimal) collusion resistance t < n/μ for a graph-related constant μ ≤ 2.948, and has efficient communication complexity O(n*t^2) group elements. Furthermore, we believe that our results can be improved by further study of the associated combinatorial problems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We propose a reliable and ubiquitous group key distribution scheme that is suitable for ad hoc networks. The scheme has self-initialisation and self-securing features. The former feature allows a cooperation of an arbitrary number of nodes to initialise the system, and it also allows node admission to be performed in a decentralised fashion. The latter feature allows a group member to determine the group key remotely while maintaining the system security. We also consider a decentralised solution of establishing secure point-to-point communication. The solution allows a new node to establish a secure channel with every existing node if it has pre-existing secure channels with a threshold number of the existing nodes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Collisions between different types of road users at intersections form a substantial component of the road toll. This paper presents an analysis of driver, cyclist, motorcyclist and pedestrian behaviour at intersections that involved the application of an integrated suite of ergonomics methods, the Event Analysis of Systemic Teamwork (EAST) framework, to on-road study data. EAST was used to analyse behaviour at three intersections using data derived from an on-road study of driver, cyclist, motorcyclist and pedestrian behaviour. The analysis shows the differences in behaviour and cognition across the different road user groups and pinpoints instances where this may be creating conflicts between different road users. The role of intersection design in creating these differences in behaviour and resulting conflicts is discussed. It is concluded that currently intersections are not designed in a way that supports behaviour across the four forms of road user studied. Interventions designed to improve intersection safety are discussed.