918 resultados para Integrity and Protection
Resumo:
OBJECTIVE: Mitogen-activated protein kinases (MAPKs), including JNK, p38, and ERK1/2, noticeably influence ischemia/reperfusion injury (IRI). The complement inhibitor dextran sulfate (DXS) associates with damaged endothelium denudated of its heparan sulfate proteoglycan (HSPG) layer. Other glycosaminoglycan analogs are known to influence MAPK signaling. Hypothetically therefore, targeted intravascular cytoprotection by DXS may function in part through influencing MAPK activation to reduce IRI-induced damage of the vasculature. METHODS: IRI of the infrarenal aorta of male Wistar rats was induced by 90 minutes clamping followed by 120 minutes reperfusion. DXS (5 mg/mL) or physiologic saline (NaCl controls) was infused locally into the ischemic aortic segment immediately prior to reperfusion. Ninety minutes ischemia-only and heparinase infusion (maximal damage) experiments, as well as native rat aorta, served as controls. Aortas were excised following termination of the experiments for further analysis. RESULTS: DXS significantly inhibited IRI-induced JNK and ERK1/2 activation (P = .043; P =.005) without influencing the p38 pathway (P =.110). Reduced aortic injury, with significant inhibition of apoptosis (P = .032 for DXS vs NaCl), correlated with decreased nuclear factor kappaB translocation within the aortic wall. DXS treatment clearly reduced C1q, C4b/c, C3b/c, and C9 complement deposition, whilst preserving endothelial cell integrity and reducing reperfusion-induced HSPG shedding. Protection was associated with binding of fluorescein labeled DXS to ischemically damaged tissue. CONCLUSIONS: Local application of DXS into ischemic vasculature immediately prior to reperfusion reduces complement deposition and preserves endothelial integrity, partially through modulating activation of MAPKs and may offer a new approach to tackle IRI in vascular surgical procedures. CLINICAL RELEVANCE: The purpose of the present study was to determine the role of dextran sulfate (DXS), a glycosaminoglycan analog and complement inhibitor, in modulating intracellular MAPK signaling pathways, reducing complement activation and ultimately attenuating ischemia/reperfusion injury (IRI) in a rat aortic-clamping model, in part a surrogate model to study the microvasculature. The study shows a role for DXS in ameliorating endothelial injury by reducing IRI-mediated damage and intravascular, local inflammation in the affected aortic segment. DXS may be envisaged as an endothelial protectant in vascular injury, such as occurs during vascular surgical procedures.
Resumo:
Under the 12th International Conference on Building Materials and Components is inserted this communication related to the field of management of those assets that constitute the Spanish Cultural Heritage and maintenance. This work is related to the field of management of those assets that constitute the Spanish Cultural Heritage which share an artistic or historical background. The conservation and maintenance become a social demand necessary for the preservation of public values, requiring the investment of necessary resources. The legal protection involves a number of obligations and rights to ensure the conservation and heritage protection. The duty of maintenance and upkeep exceeds the useful life the property that must endure more for their cultural value for its usability. The establishment of the necessary conditions to prevent deterioration and precise in order to fulfill its social function, seeking to prolong the life of the asset, preserving their physical integrity and its ability to convey the values protected. This obligation implies a substantial financial effort to the holder of the property, either public or private entity, addressing a problem of economic sustainability. Economic exploitation, with the aim of contributing to their well-maintained, is sometimes the best way to get resources. The work will include different lines of research with the following objectives. - Establishment of processes for assessing total costs over the building life cycle (LCC), during the planning stages or maintenance budgets to determine the most advantageous operating system. - Relationship between the value of property and maintenance costs, and establishing a sensitivity analysis.
Resumo:
El extraordinario auge de las nuevas tecnologías de la información, el desarrollo de la Internet de las Cosas, el comercio electrónico, las redes sociales, la telefonía móvil y la computación y almacenamiento en la nube, han proporcionado grandes beneficios en todos los ámbitos de la sociedad. Junto a éstos, se presentan nuevos retos para la protección y privacidad de la información y su contenido, como la suplantación de personalidad y la pérdida de la confidencialidad e integridad de los documentos o las comunicaciones electrónicas. Este hecho puede verse agravado por la falta de una frontera clara que delimite el mundo personal del mundo laboral en cuanto al acceso de la información. En todos estos campos de la actividad personal y laboral, la Criptografía ha jugado un papel fundamental aportando las herramientas necesarias para garantizar la confidencialidad, integridad y disponibilidad tanto de la privacidad de los datos personales como de la información. Por otro lado, la Biometría ha propuesto y ofrecido diferentes técnicas con el fin de garantizar la autentificación de individuos a través del uso de determinadas características personales como las huellas dáctilares, el iris, la geometría de la mano, la voz, la forma de caminar, etc. Cada una de estas dos ciencias, Criptografía y Biometría, aportan soluciones a campos específicos de la protección de datos y autentificación de usuarios, que se verían enormemente potenciados si determinadas características de ambas ciencias se unieran con vistas a objetivos comunes. Por ello es imperativo intensificar la investigación en estos ámbitos combinando los algoritmos y primitivas matemáticas de la Criptografía con la Biometría para dar respuesta a la demanda creciente de nuevas soluciones más técnicas, seguras y fáciles de usar que potencien de modo simultáneo la protección de datos y la identificacíón de usuarios. En esta combinación el concepto de biometría cancelable ha supuesto una piedra angular en el proceso de autentificación e identificación de usuarios al proporcionar propiedades de revocación y cancelación a los ragos biométricos. La contribución de esta tesis se basa en el principal aspecto de la Biometría, es decir, la autentificación segura y eficiente de usuarios a través de sus rasgos biométricos, utilizando tres aproximaciones distintas: 1. Diseño de un esquema criptobiométrico borroso que implemente los principios de la biometría cancelable para identificar usuarios lidiando con los problemas acaecidos de la variabilidad intra e inter-usuarios. 2. Diseño de una nueva función hash que preserva la similitud (SPHF por sus siglas en inglés). Actualmente estas funciones se usan en el campo del análisis forense digital con el objetivo de buscar similitudes en el contenido de archivos distintos pero similares de modo que se pueda precisar hasta qué punto estos archivos pudieran ser considerados iguales. La función definida en este trabajo de investigación, además de mejorar los resultados de las principales funciones desarrolladas hasta el momento, intenta extender su uso a la comparación entre patrones de iris. 3. Desarrollando un nuevo mecanismo de comparación de patrones de iris que considera tales patrones como si fueran señales para compararlos posteriormente utilizando la transformada de Walsh-Hadarmard. Los resultados obtenidos son excelentes teniendo en cuenta los requerimientos de seguridad y privacidad mencionados anteriormente. Cada uno de los tres esquemas diseñados han sido implementados para poder realizar experimentos y probar su eficacia operativa en escenarios que simulan situaciones reales: El esquema criptobiométrico borroso y la función SPHF han sido implementados en lenguaje Java mientras que el proceso basado en la transformada de Walsh-Hadamard en Matlab. En los experimentos se ha utilizado una base de datos de imágenes de iris (CASIA) para simular una población de usuarios del sistema. En el caso particular de la función de SPHF, además se han realizado experimentos para comprobar su utilidad en el campo de análisis forense comparando archivos e imágenes con contenido similar y distinto. En este sentido, para cada uno de los esquemas se han calculado los ratios de falso negativo y falso positivo. ABSTRACT The extraordinary increase of new information technologies, the development of Internet of Things, the electronic commerce, the social networks, mobile or smart telephony and cloud computing and storage, have provided great benefits in all areas of society. Besides this fact, there are new challenges for the protection and privacy of information and its content, such as the loss of confidentiality and integrity of electronic documents and communications. This is exarcebated by the lack of a clear boundary between the personal world and the business world as their differences are becoming narrower. In both worlds, i.e the personal and the business one, Cryptography has played a key role by providing the necessary tools to ensure the confidentiality, integrity and availability both of the privacy of the personal data and information. On the other hand, Biometrics has offered and proposed different techniques with the aim to assure the authentication of individuals through their biometric traits, such as fingerprints, iris, hand geometry, voice, gait, etc. Each of these sciences, Cryptography and Biometrics, provides tools to specific problems of the data protection and user authentication, which would be widely strengthen if determined characteristics of both sciences would be combined in order to achieve common objectives. Therefore, it is imperative to intensify the research in this area by combining the basics mathematical algorithms and primitives of Cryptography with Biometrics to meet the growing demand for more secure and usability techniques which would improve the data protection and the user authentication. In this combination, the use of cancelable biometrics makes a cornerstone in the user authentication and identification process since it provides revocable or cancelation properties to the biometric traits. The contributions in this thesis involve the main aspect of Biometrics, i.e. the secure and efficient authentication of users through their biometric templates, considered from three different approaches. The first one is designing a fuzzy crypto-biometric scheme using the cancelable biometric principles to take advantage of the fuzziness of the biometric templates at the same time that it deals with the intra- and inter-user variability among users without compromising the biometric templates extracted from the legitimate users. The second one is designing a new Similarity Preserving Hash Function (SPHF), currently widely used in the Digital Forensics field to find similarities among different files to calculate their similarity level. The function designed in this research work, besides the fact of improving the results of the two main functions of this field currently in place, it tries to expand its use to the iris template comparison. Finally, the last approach of this thesis is developing a new mechanism of handling the iris templates, considering them as signals, to use the Walsh-Hadamard transform (complemented with three other algorithms) to compare them. The results obtained are excellent taking into account the security and privacy requirements mentioned previously. Every one of the three schemes designed have been implemented to test their operational efficacy in situations that simulate real scenarios: The fuzzy crypto-biometric scheme and the SPHF have been implemented in Java language, while the process based on the Walsh-Hadamard transform in Matlab. The experiments have been performed using a database of iris templates (CASIA-IrisV2) to simulate a user population. The case of the new SPHF designed is special since previous to be applied i to the Biometrics field, it has been also tested to determine its applicability in the Digital Forensic field comparing similar and dissimilar files and images. The ratios of efficiency and effectiveness regarding user authentication, i.e. False Non Match and False Match Rate, for the schemes designed have been calculated with different parameters and cases to analyse their behaviour.
Resumo:
Sustainable development (or sustainability) is a decision-making framework for maintaining and achieving human well-being, both in the present and into the future. The framework requires both consideration and achievement of environmental protection, social justice and economic development. In that framework, environmental protection must be integrated into decisions about social and economic development, and social justice and economic viability must be integrated into decisions about environmental quality. First endorsed by the world’s nations in 1992, this framework is intended to provide an effective response to the twin global challenges of growing environmental degradation and widespread extreme poverty. Sustainability provides a framework for humans to live in harmony with nature, rather than at nature’s expense. It may therefore be one of the most important ideas to come out of the 20th century. In the last two decades, the framework has become a touchstone in nearly every economic sector and at every level of government, unleashing an extraordinary range of creativity in all of those realms. Sustainable development is having a significant effect on the practice of law and on the way in which laws are written and implemented. Understanding the framework is increasingly important for law makers and lawyers. As sustainable development (or sustainability) has grown in prominence, its critics have become more numerous and more vocal. Three major lines of criticism are that the term is “too boring” to command public attention, “too vague” to provide guidance, and “too late” to address the world’s problems. Critics suggest goals such as abundance, environmental integrity, and resilience. Beginning with the international agreements that shaped the concept of sustainable development, this Article provides a functional and historical analysis of the meaning of sustainable development. It then analyzes and responds to each of these criticisms in turn. While the critics, understood constructively, suggest ways of strengthening this framework, they do not provide a compelling alternative. The challenge for lawyers, law makers, and others is to use and improve this framework to make better decisions.
Resumo:
The European Agency for the Management of Operational Cooperation at the External Borders of the Member States of the European Union (Frontex) was created to improve border management cooperation between Member States. Seen from its inception as a security-oriented body, tools and rules have been gradually developed to enhance the human rights dimension and protection regarding Frontex activities. However, this step has not been accompanied with the explicit recognition of Frontex’s legal responsibility regarding violations of human rights occurring during joint operations it coordinates. Despite Frontex position rejecting such a responsibility, it is no longer clear whether this position can be maintained, as Yves Pascouau and Pascal Schumacher demonstrate in this Policy Brief.
Resumo:
Two classes of software that are notoriously difficult to develop on their own are rapidly merging into one. This will affect every key service that we rely upon in modern society, yet a successful merge is unlikely to be achievable using software development techniques specific to either class. This paper explains the growing demand for software capable of both self-adaptation and high integrity, and advocates the use of a collection of "@runtime" techniques for its development, operation and management. We summarise early research into the development of such techniques, and discuss the remaining work required to overcome the great challenge of self-adaptive high-integrity software. © 2011 ACM.
Resumo:
Natural tumor surveillance capabilities of the host were investigated in six different mouse tumor models where endogenous interleukin (IL)-12. does or does not dictate the efficiency of the innate immune response. Gene-targeted and lymphocyte subset-depleted mice were used to establish the relative importance of natural killer (NK) and NK1.1(+) T (NKT) cells in protection from tumor initiation and metastasis. In the models examined, CD3(-) NK cells were responsible for tumor rejection and protection from metastasis in models where control of major histocompatibility complex class I-deficient tumors was independent of IL-12, A protective role for NKT cells was only observed when tumor rejection required endogenous IL-12 activity. In particular, T cell receptor J alpha 281 gene-targeted mice confirmed a critical function for NKT cells in protection from spontaneous tumors initiated by the chemical carcinogen, methylcholanthrene. This is the first description of an antitumor function for NKT cells in the absence of exogenously administered potent stimulators such as IL-12 or alpha-galactosylceramide.
Resumo:
(99m)Tc-MIBI gated myocardial scintigraphy (GMS) evaluates myocyte integrity and perfusion, left ventricular (LV) dyssynchrony and function. Cardiac resynchronization therapy (CRT) may improve the clinical symptoms of heart failure (HF), but its benefits for LV function are less pronounced. We assessed whether changes in myocardial (99m)Tc-MIBI uptake after CRT are related to improvement in clinical symptoms, LV synchrony and performance, and whether GMS adds information for patient selection for CRT. A group of 30 patients with severe HF were prospectively studied before and 3 months after CRT. Variables analysed were HF functional class, QRS duration, LV ejection fraction (LVEF) by echocardiography, myocardial (99m)Tc-MIBI uptake, LV end-diastolic volume (EDV) and end-systolic volume (ESV), phase analysis LV dyssynchrony indices, and regional motion by GMS. After CRT, patients were divided into two groups according to improvement in LVEF: group 1 (12 patients) with increase in LVEF of 5 or more points, and group 2 (18 patients) without a significant increase. After CRT, both groups showed a significant improvement in HF functional class, reduced QRS width and increased septal wall (99m)Tc-MIBI uptake. Only group 1 showed favourable changes in EDV, ESV, LV dyssynchrony indices, and regional motion. Before CRT, EDV, and ESV were lower in group 1 than in group 2. Anterior and inferior wall (99m)Tc-MIBI uptakes were higher in group 1 than in group 2 (p < 0.05). EDV was the only independent predictor of an increase in LVEF (p=0.01). The optimal EDV cut-off point was 315 ml (sensitivity 89%, specificity 94%). The evaluation of EDV by GMS added information on patient selection for CRT. After CRT, LVEF increase occurred in hearts less dilated and with more normal (99m)Tc-MIBI uptake.
Resumo:
Ergosterol is an important compound responsible to maintain integrity and fluidity of Leishmania spp. membranes. Starting from an overexpression/selection method, our group has isolated and mapped nine different loci of Leishmania (L.) major related to resistance against two inhibitors of the ergosterol biosynthesis pathway, terbinafine (TBF) and itraconazole (ITZ). Individual functional analysis after overexpression induction of these loci in the presence of TBF and/or ITZ [or the ITZ analog ketoconazole (CTZ)] have shown low but significant levels of resistance after transfection into L. major wild-type parasites. In this work, we have shown the insert mapping and chromosomal identification of one of these loci (cosItz2). Functional analysis experiments associated with chromosomal localization by comparison at genomic database allowed us to identify two prospective gene-protein systems not related to the ergosterol biosynthesis and capable to confer wild-type cells resistance to ITZ-CTZ after transfection. We expected that this approach can open new insights for a better understanding of mechanisms of ITZ-CTZ action and resistance in Leishmania resulting in new strategies for the leishmaniasis treatment.
Resumo:
Study objective: To compare the effects of ethinylestradiol (EE) and 17 beta-estradiol (E(2)) on nitric oxide (NO) production and protection against oxidative stress in human endothelial cell cultures. Design: Experimental study. Settings: Research laboratory. Material: Human ECV304 endothelial cell cultures. Intervention(s): The NO synthesis was determined by flow cytometry, and oxidative stress was determined by a cell viability assay, after exposure to hydrogen peroxide (H(2)O(2)) and stimulation of endothelial cells with EE at concentrations similar to those of a contraceptive containing 30 mu g EE. Main Outcome Measure(s): The effects of EE were compared with those of E(2) at concentrations similar to those occurring during the follicular phase. Result(s): Ethinylestradiol did not increase NO synthesis and did not protect cells against oxidative stress. The viability of the cells incubated with E(2) in combination with H(2)O(2) was greater than the viability obtained with H(2)O(2) only or with H(2)O(2) in combination with EE. The cells stimulated with E(2) presented a significant increase in NO production compared with control. Conclusion(s): In contrast to the effects of E(2), EE did not protect human ECV304 endothelial cells against oxidative stress and did not increase their production of NO. (Fertil Steril (R) 2010; 94: 1578-82. (C) 2010 by American Society for Reproductive Medicine.)
Resumo:
The advantages of using cryopreserved semen in equine reproduction are well known. During cryopreservationl spermatozoa undergo many changes that lead to a decrease in fertility. There is no agreement on the ideal sperm dose and concentration to maximize fertility rates. Thus, the objectives of this experiment were to evaluate sperm motion by computer-assisted analysis (CASA), sperm membrane integrity and function with fluorescence probes of cryopreserved sperm at three concentrations: 100 (C100), 200 (C200) and 400 x 10(6) sperm/mL (C400), and two straw volumes (0.50 and 0.25 mL). There was no interaction between sperm concentration and storage volume (P > .05). Sperm motion characteristics were influenced by concentration (C100 > C200 > C400; P < .05). Curvilinear velocity (VCL) in 0.25-mL straws had higher average values (P < .05). Membrane integrity and function were not changed by straw volume (P > .05). However, sperm concentration changed the percentage of cells with intact plasma membrane (C100 > C200 > C400; P < .05) and the percentage of cells with high mitochondrial membrane potential (C100 = C200; P > .05 and C400 < C100 and C200; P < .05). According to this experiment, the best freeing method was that involving 100 x 10(6) sperm/mL, regardless of straw volume.
Resumo:
Backtrack simulation analysis indicates that wind-blown mosquitoes could have traveled from New Guinea to Australia, potentially introducing Japanese encephalitis virus. Large incursions of the virus in 1995 and 1998 were linked with low-pressure systems that sustained strong northerly winds from New Guinea to the Cape York Peninsula.
Resumo:
Keratinocyte Growth factor (KGF) is an epithelial cell growth factor of the fibroblast growth factor family and is produced by fibroblasts and microvascular endothelium in response to proinflammatory cytokines and steroid hormones. KGF is a heparin binding growth factor that exerts effects on epithelial cells in a paracrine fashion through interaction with KGF receptors. Preclinical data has demonstrated that KGF can prevent lung and gastrointestinal toxicity following chemotherapy and radiation and preliminary clinical data in the later setting supports these findings. In the experimental allogeneic bone marrow transplant scenario KGF has shown significant ability to prevent graft-versus-host disease by maintaining gastrointestinal tract integrity and acting as a cytokine shield to prevent subsequent proinflammatory cytokine generation. Within this setting KGF has also shown an ability to prevent experimental idiopathic pneumonia syndrome by stimulating production of surfactant protein A, promoting alveolar epithelialization and attenuating immune-mediated injury. Perhaps most unexpectantly, KGF appears able to maintain thymic function during allogeneic stern cell transplantation and so promote T cell engraftment and reconstitution. These data suggest that KGF will find a therapeutic role in the prevention of epithelial toxicity following intensive chemotherapy and radiotherapy protocols and in allogeneic stem cell transplantation.
Resumo:
Tese de Doutoramento, Ciências do Mar (Ecologia Marinha), 26 de Novembro de 2013, Universidade dos Açores.
Resumo:
Bullying is one of today’s biggest problems. Bullying is the intentional repeated aggression directed at a target individual. There is substantial evidence of the negative psychological and health outcomes associated with bullying. It occurs very frequently, especially in adolescence, and action is needed to lessen its causes and alleviate its consequences. Research has shown that behavior problems usually interact with other risk and protection factors, as well as with factors of etiological development. This book discusses the prevalence, psychological impacts and intervention strategies of bullying.