981 resultados para Significant mechanism


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Purpose: To investigate the anticonvulsant and sedative effects of Fufang Changniu Pills (FCP) and its probable mechanism of action in mice. Methods: The water decoction of FCP was prepared and the main constituents were determined by high performance liquid chromatography (HPLC). The anticonvulsant activities of FCP were evaluated by maximal electroshock (MES) and pentylenetetrazole (PTZ)-induced seizures in mice. Pentobarbital sodium-induced sleeping time and locomotor activity measurements were performed to evaluate the sedative effects of FCP in mice. Finally, PTZ-induced chronic seizures were established, and expressions of gamma-aminobutyric acid A receptor (GABA-A) and glutamic acid decarboxylase 65 (GAD65) in the brains of the mice were assayed by western blot in order to explore the probable mechanisms of action of the drug. Results: Gallic acid, liquiritin, cinnamyl alcohol, cinnamic acid and glycyrrhizic acid were detected in FCP decoction. FCP (50, 100 and 200 mg/kg) showed significant anticonvulsant and sedative effects on epileptic mice induced by MES (p < 0.05) and PTZ (p < 0.05). Moreover, pentobarbital sodium-induced sleeping time and locomotor activity tests showed that FCP possesses sedative effect (p < 0.05). Western blot data indicate that FCP significantly up-regulated GABA-A and GAD 65 in the brains of chronic epileptic rats (p < 0.05). Conclusion: FCP has significant anticonvulsant and sedative effects, and the mechanism of its action may be related to the up-regulation of GABA-A and GAD 65 in mice brain.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The inactivation of the mgrB gene, which encodes a negative-feedback regulator of the PhoPQ signaling system, was recently shown to be a common mutational mechanism responsible for acquired polymyxin resistance among carbapenemase-producing Klebsiella pneumoniae strains from clinical sources. In this work, we show that mgrB mutants can easily be selected in vitro from different K. pneumoniae lineages, and mgrB inactivation is not associated with a significant biological cost.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The representation of alkene degradation in version 3 of the Master Chemical Mechanism (MCM v3) has been evaluated, using environmental chamber data on the photo-oxidation of ethene, propene, 1-butene and 1-hexene in the presence of NOx, from up to five chambers at the Statewide Air Pollution Research Center (SAPRC) at the University of California. As part of this evaluation, it was necessary to include a representation of the reactions of the alkenes with O(3P), which are significant under chamber conditions but generally insignificant under atmospheric conditions. The simulations for the ethene and propene systems, in particular, were found to be sensitive to the branching ratios assigned to molecular and free radical forming pathways of the O(3P) reactions, with the extent of radical formation required for proper fitting of the model to the chamber data being substantially lower than the reported consensus. With this constraint, the MCM v3 mechanisms for ethene and propene generally performed well. The sensitivity of the simulations to the parameters applied to a series of other radical sources and sink reactions (radical formation from the alkene ozonolysis reactions and product carbonyl photolysis; radical removal from the reaction of OH with NO2 and β-hydroxynitrate formation) were also considered, and the implications of these results are discussed. Evaluation of the MCM v3 1-butene and 1-hexene degradation mechanisms, using a more limited dataset from only one chamber, was found to be inconclusive. The results of sensitivity studies demonstrate that it is impossible to reconcile the simulated and observed formation of ozone in these systems for ranges of parameter values which can currently be justified on the basis of the literature. As a result of this work, gaps and uncertainties in the kinetic, mechanistic and chamber database are identified and discussed, in relation to both tropospheric chemistry and chemistry important under chamber conditions which may compromise the evaluation procedure, and recommendations are made for future experimental studies. Throughout the study, the performance of the MCM v3 chemistry was also simultaneously compared with that of the corresponding chemistry in the SAPRC-99 mechanism, which was developed and optimized in conjunction with the chamber datasets.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Disruptions to circadian rhythm in mice and humans have been associated with an increased risk of obesity and metabolic syndrome. The gut microbiota is known to be essential for the maintenance of circadian rhythm in the host suggesting a role for microbe-host interactions in the regulation of the peripheral circadian clock. Previous work suggested a role for gut bacterial bile salt hydrolase (BSH) activity in the regulation of host circadian gene expression. Here we demonstrate that unconjugated bile acids, known to be generated through the BSH activity of the gut microbiota, are potentially chronobiological regulators of host circadian gene expression. We utilised a synchronised Caco-2 epithelial colorectal cell model and demonstrated that unconjugated bile acids, but not the equivalent tauro-conjugated bile salts, enhance the expression levels of genes involved in circadian rhythm. In addition oral administration of mice with unconjugated bile acids significantly altered expression levels of circadian clock genes in the ileum and colon as well as the liver with significant changes to expression of hepatic regulators of circadian rhythm (including Dbp) and associated genes (Per2, Per3 and Cry2). The data demonstrate a potential mechanism for microbe-host crosstalk that significantly impacts upon host circadian gene expression. Disruptions to circadian rhythm in mice and humans have been associated with an increased risk of obesity and metabolic syndrome. The gut microbiota is known to be essential for the maintenance of circadian rhythm in the host suggesting a role for microbe-host interactions in the regulation of the peripheral circadian clock. Previous work suggested a role for gut bacterial bile salt hydrolase (BSH) activity in the regulation of host circadian gene expression. Here we demonstrate that unconjugated bile acids, known to be generated through the BSH activity of the gut microbiota, are potentially chronobiological regulators of host circadian gene expression. We utilised a synchronised Caco-2 epithelial colorectal cell model and demonstrated that unconjugated bile acids, but not the equivalent tauro-conjugated bile salts, enhance the expression levels of genes involved in circadian rhythm. In addition oral administration of mice with unconjugated bile acids significantly altered expression levels of circadian clock genes in the ileum and colon as well as the liver with significant changes to expression of hepatic regulators of circadian rhythm (including Dbp) and associated genes (Per2, Per3 and Cry2). The data demonstrate a potential mechanism for microbe-host crosstalk that significantly impacts upon host circadian gene expression.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Elevated expression of tumour necrosis factora (TNF-a) is associated with adverse pregnancy outcome. This study has examined the expression of TNF-a and its receptors (TNF-Rs) by mouse blastocysts and blastocyst outgrowths from day 4 to 9.5 of pregnancy and investigated the effects of elevated TNF-a on the inner cell mass (ICM) and trophoblast cells of blastocyst outgrowths. RTPCR demonstrated TNF-a mRNA expression from day 7.5 to 9.5, TNF-R1 from day 6.5 to 9.5 and TNF-R2 from day 5.5 to 7.5 of pregnancy, and in situ hybridisation revealed the trophoblast giant cells (TGCs) of the early placenta as the site of TNF-a expression. Day 4 blastocysts were cultured in a physiologically high concentration of TNF-a (100 ng/ml) for 72 h to the outgrowth stage and then compared to blastocysts cultured in media alone. TNF-a-treated blastocyst outgrowths exhibited a significant reduction in ICM cells (mean € SD 23.90€10.42 vs 9.37€7.45, t-test, P<0.0001) with no significant change in the numbers of trophoblast cells (19.97€8.14 vs 21.73€7.79, t-test, P=0.39). Within the trophoblast cell population, the TNF-a-treated outgrowths exhibited a significant increase in multinucleated cells (14.10€5.53 vs 6.37€5.80, t-test, P<0.0001) and a corresponding significant decrease in mononucleated cells (5.87€3.60 vs 15.37€5.87, t-test, P<0.0001). In summary, this study describes the expression of TNF-a and its receptors during the peri-implantation period in the mouse. It also reports that elevated TNF-a restricts ICM proliferation in the blastocyst and changes the ratio of mononucleated to multinucleated trophoblast cells. These findings suggest a mechanism by which increased

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Banana bunchy top is regarded as the most important viral disease of banana, causing significant yield losses worldwide. The disease is caused by Banana bunchy top virus (BBTV), which is a circular ssDNA virus belonging to the genus Babuvirus in the family Nanoviridae. There are currently few effective control strategies for this and other ssDNA viruses. “In Plant Activation” (InPAct) is a novel technology being developed at QUT for ssDNA virus-activated suicide gene expression. The technology exploits the rolling circle replication mechanism of ssDNA viruses and is based on a unique “split” gene design such that suicide gene expression is only activated in the presence of the viral Rep. This PhD project aimed to develop a BBTV-based InPAct system as a suicide gene strategy to control BBTV. The BBTV-based InPAct vector design requires a BBTV intergenic region (IR) to be embedded within an intron in the gene expression cassette. To ensure that the BBTV IR would not interfere with intron splicing, a TEST vector was initially generated that contained the entire BBTV IR embedded within an intron in a β-glucuronidase (GUS) expression vector. Transient GUS assays in banana embryogenic cell suspensions indicated that cryptic intron splice sites were present within the IR. Transcript analysis revealed two cryptic intron splice sites in the Domain III sequence of the CR-M within the IR. Removal of the CR-M from the TEST vector resulted in an enhancement of GUS expression suggesting that the cryptic intron splice sites had been removed. An InPAct GUS vector was subsequently generated that contained the modified BBTV IR, with the CR-M (minus Domain III) repositioned within the InPAct cassette. Using transient histochemical and fluorometric GUS assays in banana embryogenic cells, the InPAct GUS vector was shown to be activated in the presence of the BBTV Rep. However, the presence of both BBTV Rep and Clink was shown to have a deleterious effect on GUS expression suggesting that these proteins were cytotoxic at the levels expressed. Analysis of replication of the InPAct vectors by Southern hybridisation revealed low levels of InPAct cassette-based episomal DNA released from the vector through the nicking/ligation activity of BBTV Rep. However, Rep-mediated episomal replicons, indicative of rolling circle replication of the released circularised cassettes, were not observed. The inability of the InPAct cassette to be replicated was further investigated. To examine whether the absence of Domain III of the CR-M was responsible, a suite of modified BBTV-based InPAct GUS vectors was constructed that contained the CR-M with the inclusion of Domain III, the CR-M with the inclusion of Domain III and additional upstream IR sequence, or no CR-M. Analysis of replication by Southern hybridisation revealed that neither the presence of Domain III, nor the entire CR-M, had an effect on replication levels. Since the InPAct cassette was significantly larger than the native BBTV genomic components (approximately 1 kb), the effect of InPAct cassette size on replication was also investigated. A suite of size variant BBTV-based vectors was constructed that increased the size of a replication competent cassette to 1.1 kbp through to 2.1 kbp.. Analysis of replication by Southern hybridisation revealed that an increase in vector size above approximately 1.5 - 1.7 kbp resulted in a decrease in replication. Following the demonstration of Rep-mediated release, circularisation and expression from the InPAct GUS vector, an InPAct vector was generated in which the uidA reporter gene was replaced with the ribonuclease-encoding suicide gene, barnase. Initially, a TEST vector was generated to assess the cytotoxicity of Barnase on banana cells. Although transient assays revealed a Barnase-induced cytotoxic effect in banana cells, the expression levels were sub-optimal. An InPAct BARNASE vector was generated and tested for BBTV Rep-activated Barnase expression using transient assays in banana embryogenic cells. High levels of background expression from the InPAct BARNASE vector made it difficult to accurately assess Rep-activated Barnase expression. Analysis of replication by Southern hybridisation revealed low levels of InPAct cassette-based episomal DNA released from the vector but no Rep-mediated episomal replicons indicative of rolling circle replication of the released circularised cassettes were again observed. Despite the inability of the InPAct vectors to replicate to enable high level gene expression, the InPAct BARNASE vector was assessed in planta for BBTV Rep-mediated activation of Barnase expression. Eleven lines of transgenic InPAct BARNASE banana plants were generated by Agrobacterium-mediated transformation and were challenged with viruliferous Pentalonia nigronervosa. At least one clonal plant in each line developed bunchy top symptoms and infection was confirmed by PCR. No localised lesions were observed on any plants, nor was there any localised GUS expression in the one InPAct GUS line challenged with viruliferous aphids. The results presented in this thesis are the first study towards the development of a BBTV-based InPAct system as a Rep-activatable suicide gene expression system to control BBTV. Although further optimisation of the vectors is necessary, the preliminary results suggest that this approach has the potential to be an effective control strategy for BBTV. The use of iterons within the InPAct vectors that are recognised by Reps from different ssDNA plant viruses may provide a broad-spectrum resistance strategy against multiple ssDNA plant viruses. Further, this technology holds great promise as a platform technology for the molecular farming of high-value proteins in vitro or in vivo through expression of the ssDNA virus Rep protein.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Fusionless scoliosis surgery is an emerging treatment for idiopathic scoliosis as it offers theoretical advantages over current forms of treatment. Anterior vertebral stapling using a nitinol staple is one such treatment. Despite increasing interest in this technique, little is known about the effects on the spine following insertion, or the mechanism of action of the staple. The aims of this study were threefold; (1) to measure changes in the bending stiffness of a single motion segment following staple insertion, (2) to describe the forces that occur within the staple during spinal movement, and (3) to describe the anatomical changes that occur following staple insertion. Results suggest that staple insertion consistently decreased stiffness in all directions of motion. An explanation for the finding may be found in the outcomes of the strain gauge testing and micro-CT scan. The strain gauge testing showed that once inserted, the staple tips applied a baseline compressive force to the surrounding trabecular bone and vertebral end-plate. This finding would be consistent with the current belief that the clinical effect of the staples is via unilateral compression of the physis. Interestingly however, as each specimen progressed through the five cycles of each test, the baseline load on the staple tips gradually decreased, implying that the force at the staple tip-bone interface was decreasing. We believe that this was likely occurring as a result of structural damage to the trabecular bone and vertebral end-plate by the staple effectively causing ‘loosening’ of the staple. This hypothesis is further supported by the findings of the micro-CT scan. The pictures depict significant trabecular bone and physeal injury around the staple blades. These results suggest that the current hypothesis that stapling modulates growth through physeal compression may be incorrect, but rather the effect occurs through mechanical disruption of the vertebral growth plate.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Ordinary desktop computers continue to obtain ever more resources – in-creased processing power, memory, network speed and bandwidth – yet these resources spend much of their time underutilised. Cycle stealing frameworks harness these resources so they can be used for high-performance computing. Traditionally cycle stealing systems have used client-server based architectures which place significant limits on their ability to scale and the range of applica-tions they can support. By applying a fully decentralised network model to cycle stealing the limits of centralised models can be overcome. Using decentralised networks in this manner presents some difficulties which have not been encountered in their previous uses. Generally decentralised ap-plications do not require any significant fault tolerance guarantees. High-performance computing on the other hand requires very stringent guarantees to ensure correct results are obtained. Unfortunately mechanisms developed for traditional high-performance computing cannot be simply translated because of their reliance on a reliable storage mechanism. In the highly dynamic world of P2P computing this reliable storage is not available. As part of this research a fault tolerance system has been created which provides considerable reliability without the need for a persistent storage. As well as increased scalability, fully decentralised networks offer the ability for volunteers to communicate directly. This ability provides the possibility of supporting applications whose tasks require direct, message passing style communication. Previous cycle stealing systems have only supported embarrassingly parallel applications and applications with limited forms of communication so a new programming model has been developed which can support this style of communication within a cycle stealing context. In this thesis I present a fully decentralised cycle stealing framework. The framework addresses the problems of providing a reliable fault tolerance sys-tem and supporting direct communication between parallel tasks. The thesis includes a programming model for developing cycle stealing applications with direct inter-process communication and methods for optimising object locality on decentralised networks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Although internet chat is a significant aspect of many internet users’ lives, the manner in which participants in quasi-synchronous chat situations orient to issues of social and moral order remains to be studied in depth. The research presented here is therefore at the forefront of a continually developing area of study. This work contributes new insights into how members construct and make accountable the social and moral orders of an adult-oriented Internet Relay Chat (IRC) channel by addressing three questions: (1) What conversational resources do participants use in addressing matters of social and moral order? (2) How are these conversational resources deployed within IRC interaction? and (3) What interactional work is locally accomplished through use of these resources? A survey of the literature reveals considerable research in the field of computer-mediated communication, exploring both asynchronous and quasi-synchronous discussion forums. The research discussed represents a range of communication interests including group and collaborative interaction, the linguistic construction of social identity, and the linguistic features of online interaction. It is suggested that the present research differs from previous studies in three ways: (1) it focuses on the interaction itself, rather than the ways in which the medium affects the interaction; (2) it offers turn-by-turn analysis of interaction in situ; and (3) it discusses membership categories only insofar as they are shown to be relevant by participants through their talk. Through consideration of the literature, the present study is firmly situated within the broader computer-mediated communication field. Ethnomethodology, conversation analysis and membership categorization analysis were adopted as appropriate methodological approaches to explore the research focus on interaction in situ, and in particular to investigate the ways in which participants negotiate and co-construct social and moral orders in the course of their interaction. IRC logs collected from one chat room were analysed using a two-pass method, based on a modification of the approaches proposed by Pomerantz and Fehr (1997) and ten Have (1999). From this detailed examination of the data corpus three interaction topics are identified by means of which participants clearly orient to issues of social and moral order: challenges to rule violations, ‘trolling’ for cybersex, and experiences regarding the 9/11 attacks. Instances of these interactional topics are subjected to fine-grained analysis, to demonstrate the ways in which participants draw upon various interactional resources in their negotiation and construction of channel social and moral orders. While these analytical topics stand alone in individual focus, together they illustrate different instances in which participants’ talk serves to negotiate social and moral orders or collaboratively construct new orders. Building on the work of Vallis (2001), Chapter 5 illustrates three ways that rule violation is initiated as a channel discussion topic: (1) through a visible violation in open channel, (2) through an official warning or sanction by a channel operator regarding the violation, and (3) through a complaint or announcement of a rule violation by a non-channel operator participant. Once the topic has been initiated, it is shown to become available as a topic for others, including the perceived violator. The fine-grained analysis of challenges to rule violations ultimately demonstrates that channel participants orient to the rules as a resource in developing categorizations of both the rule violation and violator. These categorizations are contextual in that they are locally based and understood within specific contexts and practices. Thus, it is shown that compliance with rules and an orientation to rule violations as inappropriate within the social and moral orders of the channel serves two purposes: (1) to orient the speaker as a group member, and (2) to reinforce the social and moral orders of the group. Chapter 6 explores a particular type of rule violation, solicitations for ‘cybersex’ known in IRC parlance as ‘trolling’. In responding to trolling violations participants are demonstrated to use affiliative and aggressive humour, in particular irony, sarcasm and insults. These conversational resources perform solidarity building within the group, positioning non-Troll respondents as compliant group members. This solidarity work is shown to have three outcomes: (1) consensus building, (2) collaborative construction of group membership, and (3) the continued construction and negotiation of existing social and moral orders. Chapter 7, the final data analysis chapter, offers insight into how participants, in discussing the events of 9/11 on the actual day, collaboratively constructed new social and moral orders, while orienting to issues of appropriate and reasonable emotional responses. This analysis demonstrates how participants go about ‘doing being ordinary’ (Sacks, 1992b) in formulating their ‘first thoughts’ (Jefferson, 2004). Through sharing their initial impressions of the event, participants perform support work within the interaction, in essence working to normalize both the event and their initial misinterpretation of it. Normalising as a support work mechanism is also shown in relation to participants constructing the ‘quiet’ following the event as unusual. Normalising is accomplished by reference to the indexical ‘it’ and location formulations, which participants use both to negotiate who can claim to experience the ‘unnatural quiet’ and to identify the extent of the quiet. Through their talk participants upgrade the quiet from something legitimately experienced by one person in a particular place to something that could be experienced ‘anywhere’, moving the phenomenon from local to global provenance. With its methodological design and detailed analysis and findings, this research contributes to existing knowledge in four ways. First, it shows how rules are used by participants as a resource in negotiating and constructing social and moral orders. Second, it demonstrates that irony, sarcasm and insults are three devices of humour which can be used to perform solidarity work and reinforce existing social and moral orders. Third, it demonstrates how new social and moral orders are collaboratively constructed in relation to extraordinary events, which serve to frame the event and evoke reasonable responses for participants. And last, the detailed analysis and findings further support the use of conversation analysis and membership categorization as valuable methods for approaching quasi-synchronous computer-mediated communication.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The research presented in this thesis addresses inherent problems in signaturebased intrusion detection systems (IDSs) operating in heterogeneous environments. The research proposes a solution to address the difficulties associated with multistep attack scenario specification and detection for such environments. The research has focused on two distinct problems: the representation of events derived from heterogeneous sources and multi-step attack specification and detection. The first part of the research investigates the application of an event abstraction model to event logs collected from a heterogeneous environment. The event abstraction model comprises a hierarchy of events derived from different log sources such as system audit data, application logs, captured network traffic, and intrusion detection system alerts. Unlike existing event abstraction models where low-level information may be discarded during the abstraction process, the event abstraction model presented in this work preserves all low-level information as well as providing high-level information in the form of abstract events. The event abstraction model presented in this work was designed independently of any particular IDS and thus may be used by any IDS, intrusion forensic tools, or monitoring tools. The second part of the research investigates the use of unification for multi-step attack scenario specification and detection. Multi-step attack scenarios are hard to specify and detect as they often involve the correlation of events from multiple sources which may be affected by time uncertainty. The unification algorithm provides a simple and straightforward scenario matching mechanism by using variable instantiation where variables represent events as defined in the event abstraction model. The third part of the research looks into the solution to address time uncertainty. Clock synchronisation is crucial for detecting multi-step attack scenarios which involve logs from multiple hosts. Issues involving time uncertainty have been largely neglected by intrusion detection research. The system presented in this research introduces two techniques for addressing time uncertainty issues: clock skew compensation and clock drift modelling using linear regression. An off-line IDS prototype for detecting multi-step attacks has been implemented. The prototype comprises two modules: implementation of the abstract event system architecture (AESA) and of the scenario detection module. The scenario detection module implements our signature language developed based on the Python programming language syntax and the unification-based scenario detection engine. The prototype has been evaluated using a publicly available dataset of real attack traffic and event logs and a synthetic dataset. The distinct features of the public dataset are the fact that it contains multi-step attacks which involve multiple hosts with clock skew and clock drift. These features allow us to demonstrate the application and the advantages of the contributions of this research. All instances of multi-step attacks in the dataset have been correctly identified even though there exists a significant clock skew and drift in the dataset. Future work identified by this research would be to develop a refined unification algorithm suitable for processing streams of events to enable an on-line detection. In terms of time uncertainty, identified future work would be to develop mechanisms which allows automatic clock skew and clock drift identification and correction. The immediate application of the research presented in this thesis is the framework of an off-line IDS which processes events from heterogeneous sources using abstraction and which can detect multi-step attack scenarios which may involve time uncertainty.

Relevância:

20.00% 20.00%

Publicador: