954 resultados para Proactive-interference
Resumo:
In order to investigate signal transduction and activation of transcription 3 (STAT3) signaling on angiogenesis in colorectal carcinoma (CRC) after inhibiting STAT3 expression, we constructed the HT-29-shSTAT3 cell line by lentivirus-mediated RNAi. Cell growth was assessed with MTT and the cell cycle distribution by flow cytometry. CRC nude mouse models were established and tumor growth was monitored periodically. On day 30, all mice were killed and tumor tissues were removed. Microvessel density (MVD) was determined according to CD34-positive staining. The expression of vascular endothelial growth factor A (VEGFA), matrix metalloproteinase-2 (MMP2) and basic fibroblast growth factor (FGF2) was monitored by quantitative real-time PCR and Western blot analysis. Knockdown of STAT3 expression significantly inhibited cell growth in HT-29 cells, with a significantly higher proportion of cells at G0/G1 (P < 0.01). Consistently, in vivo data also demonstrated that tumor growth was significantly inhibited in mice injected with HT-29-shSTAT3 cells. MVD was 9.80 ± 3.02 in the HT-29-shSTAT3 group, significantly less than that of the control group (P < 0.01). mRNA and protein levels of VEGFA and MMP2 in the HT-29-shSTAT3 group were significantly lower than in the control group (P < 0.05), but no significant difference was observed in the mRNA or protein level of FGF2 (P > 0.05). Taken together, these results demonstrate that STAT3 signaling is important to the growth of CRC and promotes angiogenesis by regulating VEGFA and MMP2 expression.
Resumo:
Protein phosphatase magnesium/manganese-dependent 1D (PPM1D) is a p53-induced phosphatase that functions as a negative regulator of stress response pathways and has oncogenic properties. However, the functional role ofPPM1D in bladder cancer (BC) remains largely unknown. In the present study, lentivirus vectors carrying small hairpin RNA (shRNA) targeting PPM1D were used to explore the effects ofPPM1D knockdown on BC cell proliferation and tumorigenesis. shRNA-mediated knockdown of PPM1D significantly inhibited cell growth and colony forming ability in the BC cell lines 5637 and T24. Flow cytometric analysis showed that PPM1D silencing increased the proportion of cells in the G0/G1 phase. Downregulation of PPM1Dalso inhibited 5637 cell tumorigenicity in nude mice. The results of the present study suggest that PPM1D plays a potentially important role in BC tumorigenicity, and lentivirus-mediated delivery of shRNA againstPPM1D might be a promising therapeutic strategy for the treatment of BC.
Resumo:
Origanum vulgare L. (oregano), Lamiaceae, essential oil has a variety of biological properties and its antimicrobial activity has received a renewed interest for use in food conservation. The aim of this study was to evaluate the interference of heating on the antimicrobial activity and chemical composition of O. vulgare essential oil. The antimicrobial activity of the essential oil kept at room temperature and exposed to different heating temperatures (60, 80, 100 and 120 °C during 1 hour) was evaluated by observing antimicrobial effectiveness at absolute concentration and determining MIC values by the solid medium diffusion procedure. The essential oil chemical composition analysis was performed by GC-MS. O. vulgare essential oil showed interesting antimicrobial activity on all assayed microbial strains (Candida albicans, C.krusei, C. tropicalis, Bacillus cereus, Escherichia coli, Staphylococcus aureus, Yersinia enterocolitica, Salmonella enterica, Serratia marcencens), noted by large growth inhibition zones (30-42 mm). Heating treatment showed no significant interference (p < 0.05) on the essential oil antimicrobial activity, noted by the development of microbial growth inhibition zones with similar or close diameters when evaluating the essential oil kept at room temperature and after exposure to different thermal treatments. MIC values oscillated between 10and 40 µL.mL-1 (20µL.mL-1 for most strains). However, no significant difference (p < 0.05) was noted among the MIC values found for the essential oil aliquots exposed to different temperatures. Moreover, heating did not significantly (p < 0.05) affect the chemical composition of O. vulgare essential oil. Monoterpenes, terpenic compounds and sesquiterpenes were found in the essential oil, with carvacrol (68.06-70.27%) and p-cymene (12.85-15.81%) being the compounds found in the highest amounts. These results showed the thermal stability and intense antimicrobial properties of O. vulgare essential oil and support its possible concomitant use with heating temperatures in order to reach microbial safety in foods.
Resumo:
Age-related differences in information processing have often been explained through deficits in older adults' ability to ignore irrelevant stimuli and suppress inappropriate responses through inhibitory control processes. Functional imaging work on young adults by Nelson and colleagues (2003) has indicated that inferior frontal and anterior cingulate cortex playa key role in resolving interference effects during a delay-to-match memory task. Specifically, inferior frontal cortex appeared to be recruited under conditions of context interference while the anterior cingulate was associated with interference resolution at the stage of response selection. Related work has shown that specific neural activities related to interference resolution are not preserved in older adults, supporting the notion of age-related declines in inhibitory control (Jonides et aI., 2000, West et aI., 2004b). In this study the time course and nature of these inhibition-related processes were investigated in young and old adults using high-density ERPs collected during a modified Sternberg task. Participants were presented with four target letters followed by a probe that either did or did not match one of the target letters held in working memory. Inhibitory processes were evoked by manipulating the nature of cognitive conflict in a particular trial. Conflict in working memory was elicited through the presentation of a probe letter in immediately previous target sets. Response-based conflict was produced by presenting a negative probe that had just been viewed as a positive probe on the previous trial. Younger adults displayed a larger orienting response (P3a and P3b) to positive probes relative to a non-target baseline. Older adults produced the orienting P3a and 3 P3b waveforms but their responses did not differentiate between target and non-target stimuli. This age-related change in response to targetness is discussed in terms of "early selection/late correction" models of cognitive ageing. Younger adults also showed a sensitivity in their N450 response to different levels of interference. Source analysis of the N450 responses to the conflict trials of younger adults indicated an initial dipole in inferior frontal cortex and a subsequent dipole in anterior cingulate cortex, suggesting that inferior prefrontal regions may recruit the anterior cingulate to exert cognitive control functions. Individual older adults did show some evidence of an N450 response to conflict; however, this response was attenuated by a co-occurring positive deflection in the N450 time window. It is suggested that this positivity may reflect a form of compensatory activity in older adults to adapt to their decline in inhibitory control.
Resumo:
Previous research has demonstrated superior learning by participants presented with augmented task information retroactively versus proactively (Patterson & Lee, 2008; 2010). Theoretical explanations of these findings are related to the cognitive effort invested by participants during motor skill acquisition. The present study extended previous research by utilizing the physiological index, power spectral analysis of heart rate variability, previously shown to be sensitive to the degree of cognitive effort invested during the performance of a motor task (e.g., increase cognitive effort results in increased LF/HF ratio). Participants were required to learn 18 different key-pressing sequences. As expected, the proactive condition demonstrated superior RS during acquisition, with the retroactive condition demonstrating superior RS during retention. Measures of LF/HF ratio indicated the retroactive participants were investing significantly less cognitive effort in the retention period compared to the proactive participants (p< .05) as a function of learning.
Resumo:
Rapport d'analyse d'intervention présenté à la Faculté des arts et sciences en vue de l'obtention du grade de Maîtrise ès sciences (M. Sc.) en psychoéducation
Resumo:
Le but de cette étude est d’examiner les liens prédictifs entre les comportements d’agressivité proactive à l’enfance et la délinquance à l’adolescence, ainsi que le rôle potentiellement modérateur des normes prosociales du groupe-classe et du rejet par le groupe de pairs. Spécifiquement, les liens suivants seront examinés : 1) le lien principal positif entre l’agressivité proactive à l’enfance et la délinquance à l’adolescence, 2) l’effet modérateur (i.e., protecteur) des normes prosociales au sein du groupe-classe sur le lien entre l’agressivité proactive et la délinquance et 3) l’effet modérateur de second niveau du rejet par les pairs eu égard à l’effet modérateur de premier niveau des normes prosociales du groupe-classe. Deux modèles théoriques seront utilisés afin d’appuyer le choix des hypothèses et offrir un cadre conceptuel en vue de l’interprétation des résultats: Le modèle du groupe de référence et le modèle de la similarité personne-groupe. Les données proviennent d’un échantillon composé de 327 enfants ayant été évalués à 6 reprises, de l’âge de 10 ans (4e année primaire) à 15 ans (3e secondaire). La délinquance fut mesurée à l’aide de données auto-rapportées par les participants. Les normes prosociales du groupe-classe furent basées sur les évaluations moyennes faites par les enseignants des comportements prosociaux des élèves de leur classe. Le rejet par les pairs fut mesuré à l’aide d’évaluations sociométriques au sein des groupes-classes. Des modèles de régression linéaire hiérarchique ont été utilisés. Les résultats montrent un lien positif entre l’agressivité proactive à l’enfance et la délinquance à l’adolescence. Malgré l’obtention d’un coefficient d’interaction marginal, les résultats indiquent que les normes prosociales modèrent, mais à la hausse, le lien entre l’agressivité et la délinquance. L’effet modérateur du rejet par les pairs n’apparaît pas comme étant significatif. Ces résultats seront discutés afin de mieux comprendre le lien entre l’agressivité et les éléments du contexte social dans lequel l’enfant évolue, ainsi que leur implication au niveau de la prévention des problèmes d’agressivité et de la délinquance en milieu scolaire.
Resumo:
Thèse numérisée par la Division de la gestion de documents et des archives de l'Université de Montréal
Resumo:
This article may not exactly replicate the final version published in the journal. It is not the copy of record. / Cet article ne constitue pas la version officielle, et peut différer de la version publiée dans la revue.
Resumo:
In today's complicated computing environment, managing data has become the primary concern of all industries. Information security is the greatest challenge and it has become essential to secure the enterprise system resources like the databases and the operating systems from the attacks of the unknown outsiders. Our approach plays a major role in detecting and managing vulnerabilities in complex computing systems. It allows enterprises to assess two primary tiers through a single interface as a vulnerability scanner tool which provides a secure system which is also compatible with the security compliance of the industry. It provides an overall view of the vulnerabilities in the database, by automatically scanning them with minimum overhead. It gives a detailed view of the risks involved and their corresponding ratings. Based on these priorities, an appropriate mitigation process can be implemented to ensure a secured system. The results show that our approach could effectively optimize the time and cost involved when compared to the existing systems
Resumo:
This paper describes the successful implementation of a prototype software application that independently and proactively detects whether a mobile phone is lost or misused. When the mobile phone is detected as being lost or misused, the application takes steps to mitigate the impact of loss and to gather evidence. The goal is to aid in the recovery of the mobile phone. The prototype works regardless of the cellular infrastructure the mobile phone is operating in and makes minimum demands on the owner of the mobile phone. The prototype was developed on Nokia 6600 mobile phones that run Symbian Operating System 7.0s. Development was done using Nokia’s Series 60 Developer’s Platform 2.0.
Resumo:
One of the most effective techniques offering QoS routing is minimum interference routing. However, it is complex in terms of computation time and is not oriented toward improving the network protection level. In order to include better levels of protection, new minimum interference routing algorithms are necessary. Minimizing the failure recovery time is also a complex process involving different failure recovery phases. Some of these phases depend completely on correct routing selection, such as minimizing the failure notification time. The level of protection also involves other aspects, such as the amount of resources used. In this case shared backup techniques should be considered. Therefore, minimum interference techniques should also be modified in order to include sharing resources for protection in their objectives. These aspects are reviewed and analyzed in this article, and a new proposal combining minimum interference with fast protection using shared segment backups is introduced. Results show that our proposed method improves both minimization of the request rejection ratio and the percentage of bandwidth allocated to backup paths in networks with low and medium protection requirements
Resumo:
Es una guía práctica de referencia para profesores que imparten el idioma inglés británico como lengua extranjera. Compara las características relevantes de la lengua materna de los estudiantes con la lengua inglesa, para ayudar a los profesores a predecir y entender los problemas que les surgen en el aprendizaje. Escrito por profesores con experiencia, describe y explica los principales errores de pronunciación, gramática, vocabulario y otros, que cometen estos estudiantes que hablan alguna de las lenguas aquí estudiadas y que pertenecen a casi todos los continentes.
Resumo:
This paper focuses on active networks applications and in particular on the possible interactions among these applications. Active networking is a very promising research field which has been developed recently, and which poses several interesting challenges to network designers. A number of proposals for e±cient active network architectures are already to be found in the literature. However, how two or more active network applications may interact has not being investigated so far. In this work, we consider a number of applications that have been designed to exploit the main features of active networks and we discuss what are the main benefits that these applications may derive from them. Then, we introduce some forms of interaction including interference and communications among applications, and identify the components of an active network architecture that are needed to support these forms of interaction. We conclude by presenting a brief example of an active network application exploiting the concept of interaction.