140 resultados para ESTROGEN PROTECTS
Resumo:
PURPOSE:
To quantify the risk for age-related cortical cataract and posterior subcapsular cataract (PSC) associated with having an affected sibling after adjusting for known environmental and personal risk factors.
DESIGN:
Sibling cohort study.
PARTICIPANTS:
Participants in the ongoing Salisbury Eye Evaluation (SEE) study (n = 321; mean age, 78.1+/-4.2 years) and their locally resident siblings (n = 453; mean age, 72.6+/-7.4 years) were recruited at the time of Rounds 3 and 4 of the SEE study. INTERVENTION/TESTING METHODS: Retroillumination photographs of the lens were graded for the presence of cortical cataract and PSC with the Wilmer grading system. The residual correlation between siblings' cataract grades was estimated after adjustment for a number of factors (age; gender; race; lifetime exposure to ultraviolet-B light; cigarette, alcohol, estrogen, and steroid use; serum antioxidants; history of diabetes; blood pressure; and body mass index) suspected to be associated with the presence of cataract.
RESULTS:
The average sibship size was 2.7 per family. Multivariate analysis revealed the magnitude of heritability (h(2)) for cortical cataract to be 24% (95% CI, 6%-42%), whereas that for PSC was not statistically significant (h(2) 4%; 95% CI, 0%-11%) after adjustment for the covariates. The model revealed that increasing age, female gender, a history of diabetes, and black race increased the odds of cortical cataract, whereas higher levels of provitamin A were protective. A history of diabetes and steroid use increased the odds for PSC.
CONCLUSIONS:
This study is consistent with a significant genetic effect for age-related cortical cataract but not PSC.
Resumo:
This study introduces an inexact, but ultra-low power, computing architecture devoted to the embedded analysis of bio-signals. The platform operates at extremely low voltage supply levels to minimise energy consumption. In this scenario, the reliability of static RAM (SRAM) memories cannot be guaranteed when using conventional 6-transistor implementations. While error correction codes and dedicated SRAM implementations can ensure correct operations in this near-threshold regime, they incur in significant area and energy overheads, and should therefore be employed judiciously. Herein, the authors propose a novel scheme to design inexact computing architectures that selectively protects memory regions based on their significance, i.e. their impact on the end-to-end quality of service, as dictated by the bio-signal application characteristics. The authors illustrate their scheme on an industrial benchmark application performing the power spectrum analysis of electrocardiograms. Experimental evidence showcases that a significance-based memory protection approach leads to a small degradation in the output quality with respect to an exact implementation, while resulting in substantial energy gains, both in the memory and the processing subsystem.
Resumo:
Burkholderia cenocepacia is an opportunistic pathogen of the cystic fibrosis lung that elicits a strong inflammatory response. B. cenocepacia employs a type VI secretion system (T6SS) to survive in macrophages by disarming Rho-type GTPases, causing actin cytoskeletal defects. Here, we identified TecA, a non-VgrG T6SS effector responsible for actin disruption. TecA and other bacterial homologs bear a cysteine protease-like catalytic triad, which inactivates Rho GTPases by deamidating a conserved asparagine in the GTPase switch-I region. RhoA deamidation induces caspase-1 inflammasome activation, which is mediated by the familial Mediterranean fever disease protein Pyrin. In mouse infection, the deamidase activity of TecA is necessary and sufficient for B. cenocepacia-triggered lung inflammation and also protects mice from lethal B. cenocepacia infection. Therefore, Burkholderia TecA is a T6SS effector that modifies a eukaryotic target through an asparagine deamidase activity, which in turn elicits host cell death and inflammation through activation of the Pyrin inflammasome.
Resumo:
This chapter focuses on the growing tendency of international human rights law to require states to protect the rights of non-nationals who are in the state unlawfully and of nationals and non-nationals who are outside the state, especially when any of these people are involved in terrorist or counter-terrorist activity. It reviews these additional obligations within a European context, focusing on EU law and the law of the European Convention on Human Rights and drawing on the case law of UK courts. Part 1 considers when a European state must grant asylum to alleged terrorists on the basis that otherwise they would suffer human rights abuses in the state from which they are fleeing. Part 2 examines whether, outside of asylum claims, a European state must not deport or extradite an alleged terrorist because he or she might suffer an abuse of human rights in the receiving state. Part 3 looks at whether a European state whose security forces are engaged in counter-terrorism activities abroad is obliged to protect the human rights of the individuals serving in those forces and/or the human rights of the alleged terrorists they are confronting. While welcoming the extension of state responsibility, the chapter notes that it is occurring in a way which introduces three aspects of relativity into the protection of human rights. First, European law protects only some human rights extra-territorially. Second, it protects those rights only when there is ‘a real risk’ of their being violated. Third, sometimes it protects those rights only when there is a real risk of their being violated ‘flagrantly’.
Resumo:
This paper presents a new encryption scheme implemented at the physical layer of wireless networks employing orthogonal frequency-division multiplexing (OFDM). The new scheme obfuscates the subcarriers by randomly reserving several subcarriers for dummy data and resequences the training symbol by a new secure sequence. Subcarrier obfuscation renders the OFDM transmission more secure and random, while training symbol resequencing protects the entire physical layer packet, but does not affect the normal functions of synchronization and channel estimation of legitimate users while preventing eavesdroppers from performing these functions. The security analysis shows the system is robust to various attacks by analyzing the search space using an exhaustive key search. Our scheme is shown to have a better performance in terms of search space, key rate and complexity in comparison with other OFDM physical layer encryption schemes. The scheme offers options for users to customize the security level and key rate according to the hardware resource. Its low complexity nature also makes the scheme suitable for resource limited devices. Details of practical design considerations are highlighted by applying the approach to an IEEE 802.11 OFDM system case study.