929 resultados para Compromise of 1850.
Resumo:
Septic shock is a cytokine-mediated process typically caused by a severe underlying infection. Toxins generated by the infecting organism trigger a cascade of events leading to hypotension, to multiple organ system failure, and frequently to death. Beyond supportive care, no effective therapy is available for the treatment of septic shock. Nitric oxide (NO) is a potent vasodilator generated late in the sepsis pathway leading to hypotension; therefore, NO represents a potential target for therapy. We have previously demonstrated that transforming growth factor (TGF) beta1 inhibits inducible NO synthase (iNOS) mRNA and NO production in vascular smooth muscle cells after its induction by cytokines critical in the sepsis cascade. Thus, we hypothesized that TGF-beta1 may inhibit iNOS gene expression in vivo and be beneficial in the treatment of septic shock. In a conscious rat model of septic shock produced by Salmonella typhosa lipopolysaccharide (LPS), TGF-beta1 markedly reduced iNOS mRNA and protein levels in several organs. In contrast, TGF-beta1 did not decrease endothelium-derived constitutive NOS mRNA in organs of rats receiving LPS. We also performed studies in anesthetized rats to evaluate the effect of TGF-beta1 on the hemodynamic compromise of septic shock; after an initial 25% decrease in mean arterial pressure, TGF-beta1 arrested LPS-induced hypotension and decreased mortality. A decrease in iNOS mRNA and protein levels in vascular smooth muscle cells was demonstrated by in situ hybridization and NADPH diaphorase staining in rats treated with TGF-beta1. Thus these studies suggest that TGF-beta1 inhibits iNOS in vivo and that TGF-beta1 may be of future benefit in the therapy of septic shock.
Resumo:
Recent results have demonstrated that the spin trapping agent N-tert-butyl-alpha-phenylnitrone (PBN) reduces infarct size due to middle cerebral artery occlusion (MCAO), even when given after ischemia. The objective of the present study was to explore whether PBN influences recovery of energy metabolism. MCAO of 2-hr duration was induced in rats by an intraluminal filament technique. Brains were frozen in situ at the end of ischemia and after 1, 2, and 4 hr of recirculation. PBN was given 1 hr after recirculation. Neocortical focal and perifocal ("penumbra") areas were sampled for analyses of phosphocreatine (PCr), creatine, ATP, ADP, AMP, glycogen, glucose, and lactate. The penumbra showed a moderate-to-marked decrease and the focus showed a marked decrease in PCr and ATP concentrations, a decline in the sum of adenine nucleotides, near-depletion of glycogen, and an increase in lactate concentration after 2 hr of ischemia. Recirculation for 1 hr led to only a partial recovery of energy state, with little further improvement after 2 hr and signs of secondary deterioration after 4 hr, particularly in the focus. After 4 hr of recirculation, PBN-treated animals showed pronounced recovery of energy state, with ATP and lactate contents in both focus and penumbra approaching normal values. Although an effect of PBN on mitochondria cannot be excluded, the results suggest that PBN acts by preventing a gradual compromise of microcirculation. The results justify a reevaluation of current views on the pathophysiology of focal ischemic damage and suggest that a therapeutic window of many hours exists in stroke.
Resumo:
Includes index.
Resumo:
The problem of Job.--The case of John Bunyan.--Tennyson and pessimism.--The knowledge of good and evil.--Natural law, ethics, and evolution.--The implications of self-consciousness.--Some observations on the anomalies of self-consciousness.--Self-consciousness, social consciousness and nature.--Originality and consciousness.--Meister Eckhart.--An episode of early California life: the squatter riot of 1850 in Sacramento.--Jean Marie Guyau.
Resumo:
In young adults, improvements in the rate of force development as a result of resistance training are accompanied by increases in neural drive in the very initial phase of muscle activation. The purpose of this experiment was to determine if older adults also exhibit similar adaptations in response to rate of force development (RFD) training. Eight young (21-35 years) and eight older (60-79 years) adults were assessed during the production of maximum rapid contractions, before and after four weeks of progressive resistance training for the elbow flexors. Young and older adults exhibited significant increases (P< 0.01) in peak RFD, of 25.6% and 28.6% respectively. For both groups the increase in RFD was accompanied by an increase in the root mean square (RMS) amplitude and in the rate of rise (RER) in the electromyogram (EMG) throughout the initial 100 ms of activation. For older adults, however, this training response was only apparent in the brachialis and brachioradialis muscles. This response was not observed in surface EMG recorded from the biceps brachii muscle during either RFD testing or throughout training, nor was it observed in the pronator teres muscle. The minimal adaptations observed for older adults in the bifunctional muscles biceps brachii and pronator teres are considered to indicate a compromise of the neural adaptations older adults might experience in response to resistance training.
Resumo:
The use of gene guns in ballistically delivering DNA vaccine coated gold micro-particles to skin can potentially damage targeted cells, therefore influencing transfection efficiencies. In this paper, we assess cell death in the viable epidermis by non-invasive near infrared two-photon microscopy following micro-particle bombardment of murine skin. We show that the ballistic delivery of micro-particles to the viable epidermis can result in localised cell death. Furthermore, experimental results show the degree of cell death is dependant on the number of micro-particles delivered per unit of tissue surface area. Micro-particles densities of 0.16 +/- 0.27 (mean +/- S.D.), 1.35 +/- 0.285 and 2.72 +/- 0.47 per 1000 mu m(2) resulted in percent deaths of 3.96 +/- 5.22, 45.91 +/- 10.89, 90.52 +/- 12.28, respectively. These results suggest that optimization of transfection by genes administered with gene guns is - among other effects - a compromise of micro-particle payload and cell death. (c) 2005 Elsevier Ltd. All rights reserved.
Resumo:
Despite recent Success, many fast-disintegrating tablets (FDTs) still face problems of low mechanical strength, poor mouth-feel and higher disintegration times. This Study aimed to optimise FDTS using a progressive three-stage approach. A series of hardness, fracturability and disintegration time tests were performed on the formulations at each stage. During Stage 1, tablets were prepared in concentrations between 2% and 5% w/w, and were formulated at each concentration as single and combination bloom strength gelatin (BSG) using 75 and 225 BSGs. Analysis revealed that both hardness and disintegration time increased with an increase in gelatin concentration. A combination (5% gelatin) FDT comprising a 50:50 ratio of 75:225 BSGs (hardness: 13.7 +/- 0.9 N and disintegration time: 24.1 +/- 0.6 s) was judged the most ideal, and was carried forward to Stage II: the addition of the saccharides sorbitol, mannitol and sucrose in concentrations between 10% and 80% w/w. The best properties were exhibited by mannitol-containing formulations (50%-hardness: 30.9 +/- 2.8 N and disintegration time: 13.3 +/- 2.1 s), which were carried forward to the next stage: the addition of viscosity-modifying polymers to improve mouth-feel and aid pre-gastric retention. Addition of carbopol 974P-NF resulted in the enhancement of viscosity with a compromise of the hardness of the tablet, whereas Pluronic F127 (6%) showed an increase in disintegration time and viscosity with retention of mechanical propel-ties. (C) 2008 Elsevier B.V. All rights reserved.
Resumo:
The experiments described in this thesis compared conventional methods of screening for neurotoxins with potential electrophysiological and pharmacological tests in an attempt to improve the sensitivity of detection of progressive distal neuropathy. Adult male albino mice were dosed orally with the neurotoxicant acylamide and subjected to a test of limb strength and co-ordination and a functional observational battery. These methods established a no observable effect level of 10 mg/kg. A dose of 200 mg/kg resulted in abnormalities of gait and reduced limb strength and/or co-ordination. Analysis of the in vitro 'jitter' of the latency of trains of action potentials evoked at a frequency of 30 Hz in the mouse phrenic nerve/hemidiaphragm preparation showed this technique to be unsuitable for detection of the early phases of acrylamide induced peripheral neuropathy (l00 mg/kg). The evoked and spontaneous twitch responses of the hemidiaphragm preparation following in vitro exposure to the organophosphorous anticholinesterase compound ecothiopate were altered by in vivo pre treatment with acrylamide. Acrylamide caused an increase in the time course of the potentiation of stimulated twitches and a decrease in the maximum potentiation. Spontaneous twitches were reduced in amplitude and frequency. These effects occurred at an acrylamide dose level insufficient to cause clinical signs of neuropathy. Investigations into the mechanisms underlying these observations yielded the following observations. Analysis of miniature endplate potentials at this dose level indicated prolongation of the life of acetylcholine in the synaptic cleft but the implied decrease in cholinesterase activity could not be demonstrated biochemically or histologically. The electrical excitability of the nerve terminal region of phrenic motor nerves was reduced following acrylamide although a possible compromise of antidromic action potential conduction could not be confirmed. There was no histopathological evidence of neuropathy at this dose level. Further exploration of this phenomenon is desirable in order to ascertain whether the effect is specific to acrylamide and/or ecothiopate and to elucidate the mechanisms behind these novel observations.
Resumo:
To reduce the damage of phishing and spyware attacks, banks, governments, and other security-sensitive industries are deploying one-time password systems, where users have many passwords and use each password only once. If a single password is compromised, it can be only be used to impersonate the user once, limiting the damage caused. However, existing practical approaches to one-time passwords have been susceptible to sophisticated phishing attacks. ---------- We give a formal security treatment of this important practical problem. We consider the use of one-time passwords in the context of password-authenticated key exchange (PAKE), which allows for mutual authentication, session key agreement, and resistance to phishing attacks. We describe a security model for the use of one-time passwords, explicitly considering the compromise of past (and future) one-time passwords, and show a general technique for building a secure one-time-PAKE protocol from any secure PAKE protocol. Our techniques also allow for the secure use of pseudorandomly generated and time-dependent passwords.
Resumo:
A Wireless Sensor Network (WSN) is a set of sensors that are integrated with a physical environment. These sensors are small in size, and capable of sensing physical phenomena and processing them. They communicate in a multihop manner, due to a short radio range, to form an Ad Hoc network capable of reporting network activities to a data collection sink. Recent advances in WSNs have led to several new promising applications, including habitat monitoring, military target tracking, natural disaster relief, and health monitoring. The current version of sensor node, such as MICA2, uses a 16 bit, 8 MHz Texas Instruments MSP430 micro-controller with only 10 KB RAM, 128 KB program space, 512 KB external ash memory to store measurement data, and is powered by two AA batteries. Due to these unique specifications and a lack of tamper-resistant hardware, devising security protocols for WSNs is complex. Previous studies show that data transmission consumes much more energy than computation. Data aggregation can greatly help to reduce this consumption by eliminating redundant data. However, aggregators are under the threat of various types of attacks. Among them, node compromise is usually considered as one of the most challenging for the security of WSNs. In a node compromise attack, an adversary physically tampers with a node in order to extract the cryptographic secrets. This attack can be very harmful depending on the security architecture of the network. For example, when an aggregator node is compromised, it is easy for the adversary to change the aggregation result and inject false data into the WSN. The contributions of this thesis to the area of secure data aggregation are manifold. We firstly define the security for data aggregation in WSNs. In contrast with existing secure data aggregation definitions, the proposed definition covers the unique characteristics that WSNs have. Secondly, we analyze the relationship between security services and adversarial models considered in existing secure data aggregation in order to provide a general framework of required security services. Thirdly, we analyze existing cryptographic-based and reputationbased secure data aggregation schemes. This analysis covers security services provided by these schemes and their robustness against attacks. Fourthly, we propose a robust reputationbased secure data aggregation scheme for WSNs. This scheme minimizes the use of heavy cryptographic mechanisms. The security advantages provided by this scheme are realized by integrating aggregation functionalities with: (i) a reputation system, (ii) an estimation theory, and (iii) a change detection mechanism. We have shown that this addition helps defend against most of the security attacks discussed in this thesis, including the On-Off attack. Finally, we propose a secure key management scheme in order to distribute essential pairwise and group keys among the sensor nodes. The design idea of the proposed scheme is the combination between Lamport's reverse hash chain as well as the usual hash chain to provide both past and future key secrecy. The proposal avoids the delivery of the whole value of a new group key for group key update; instead only the half of the value is transmitted from the network manager to the sensor nodes. This way, the compromise of a pairwise key alone does not lead to the compromise of the group key. The new pairwise key in our scheme is determined by Diffie-Hellman based key agreement.
Resumo:
Using retinal imaging, the nature and extent of compromise of retinal structural integrity has been characterized in individuals suffering from diabetic peripheral neuropathy. These findings extend our understanding of the pathological processes involved in diabetic neuropathy and offer novel ophthalmic approaches to the diagnosis and monitoring of this debilitating condition.
Resumo:
In Hewitt v Bayntum & Allianz Australia Insurance Ltd [2015] QSC 250 the court was asked to sanction a compromise of a proceeding by a plaintiff who, though a recovering drug addict, was able to give instructions and understand the proposed compromise.
Resumo:
Books Paths to Readers describes the history of the origins and consolidation of modern and open book stores in Finland 1740 1860. The thesis approaches the book trade as a part of a print culture. Instead of literary studies choice to concentrate on texts and writers, book history seeks to describe the print culture of a society and how the literary activities and societies interconnect. For book historians, printed works are creations of various individuals and groups: writers, printers, editors, book sellers, censors, critics and finally, readers. They all take part in the creation, delivery and interpretation of printed works. The study reveals the ways selling and distributing books have influenced the printed works and the literary and print culture. The research period 1740 1860 covers the so-called second revolution of the book, or the modernisation of the print culture. The thesis describes the history of 60 book stores and their 96 owners. The study concentrates on three themes: firstly, how the particular book trade network became a central institution for printed works distribution, secondly what were the relations between cosmopolitan European book markets and the national cultural sphere, and thirdly how book stores functioned as cultural institutions and business enterprises. Book stores that have a varied assortment and are targeted to all readers became the main institution for book trade in Finland during 1740 1860. It happened because of three features. First, the book binders monopoly on selling bound copies in Sweden was abolished in 1740s. As a consequence entrepreneurs could concentrate solely to trade activities and offer copies from various publishers at their stores. Secondly the common business model of bartering was replaced by selling copies for cash, first in the German book trade centre Leipzig in 1770s. The change intensified book markets activities and Finnish book stores foreign connections. Thirdly, after Finland was annexed to the Russian empire in 1809, the Grand duchy s administration steered foreign book trade to book stores (because of censorship demands). Up to 1830 s book stores were available only in Helsinki and Turku. During next ten years book stores opened in six regional centres. The early entrepreneurs ran usually vertical businesses consisting of printing, publishing and distribution activities. This strategy lowered costs, eased the delivery of printed works and helped to create elaborated centres for all book activities. These book stores main clientele consisted of the Swedish speaking gentry. During late 1840s various opinion leaders called for the development of a national Finnish print culture, and also book stores. As a result, during the five years before the beginning of the Crimean war (1853 1856) book stores were opened in almost all Finnish towns: at the beginning of the war 36 book stores operated in 21 towns. The later book sellers, mainly functioning in small towns among Finnish speaking people, settled usually strictly for selling activities. Book stores received most of their revenues from selling foreign titles. Swedish, German, French and Belgian (pirate editions of popular French novels) books were widely available for the multilingual gentry. Foreign titles and copies brought in most of the revenues. Censorship inspections or unfavourable custom fees would not limit the imports. Even if the local Finnish print production steadily rose, many copies, even titles, were never delivered via book stores. Only during the 1840 s and 1850 s the most advanced publishers would concentrate on creating publishing programmes and delivering their titles via book stores. Book sellers regulated commissions were small. They got even smaller because of large amounts of unsold copies, various and usual misunderstandings of consignments and accounts or plain accidents that destroyed shipments and warehouses. Also, the cultural aim of a creating large and assortments and the tendency of short selling periods demanded professional entrepreneurship, which many small town book sellers however lacked. In the midst of troublesome business efforts, co-operation and mutual concern of the book market s entrepreneurs were the key elements of the trade, although on local level book sellers would compete, sometimes even ferociously. The difficult circumstances (new censorship decree of 1850, Crimean war) and lack of entrepreneurship, experience and customers meant that half of the book stores opened in 1845 1860 was shut in less than five years. In 1858 the few leading publishers established The Finnish Book Publishers Association. Its first task was to create new business rules and manners for the book trade. The association s activities began to professionalise the whole network, but at the same time the earlier independence of regional publishing and selling enterprises diminished greatly. The consolidation of modern and open book store network in Finland is a history of a slow and complex development without clear signs of a beginning or an end. The ideal book store model was rarely accomplished in its all features. Nevertheless, book stores became the norm of the book trade. They managed to offer larger selections, reached larger clienteles and maintained constant activity better than any other book distribution model. In essential, the book stores methods have not changed up to present times.
Resumo:
Resumen: En la carrera por obtener la corona de Aragón, que ha quedado vacante, el Infante don Fernando de Castilla se enfrenta a cinco contrincantes con las mismas expectativas. Luego de un lapso de dos años de Interregno y de confrontación en todos los frentes, el parlamentario, el militar, el económico y hasta el religioso, el Infante es elegido como nuevo monarca en el Compromiso de Caspe. Si durante el proceso electivo las relaciones habían sido de pura competencia, luego del mismo los conflictos continúan, en especial con uno de los candidatos, el Conde de Urgel. Este artículo tiene como objetivo describir este conflicto, como un proceso vivo que se transforma, adquiere nuevas dimensiones, involucra a otras partes, con intervenciones de terceros conciliadores e infructuosas negociaciones para dar una solución a esta disputa, que finalmente se define a través de la lucha armada.
Resumo:
A informação é considerada hoje um dos maiores ativos nas organizações, e, como tal, necessita ser protegida de forma adequada às necessidades do negócio. Conforme o valor da informação cresce, aumenta também o interesse em interceptar e adulterar seu conteúdo, levando a um comprometimento dos sistemas que suportam o negócio. A Câmara dos Deputados é um dos órgãos integrantes do Poder Legislativo Brasileiro e cabe a ela representar o povo, legislar sobre os assuntos de interesse nacional e fiscalizar a aplicação dos recursos públicos. Por meio de seu Sistema Eletrônico de Votação, ocorrem votações em que são tomadas decisões que afetam a vida de toda a nação. Com o uso da pesquisa documental, realizada a partir de um estudo de caso efetuado com base na análise de documentos existentes no âmbito da Coordenação do Sistema Eletrônico de Votação, este trabalho pretende comparar os controles de segurança da informação em uso e os controles recomendados para obtenção da certificação ISO 27001, para que se dê transparência ao processo de votação. Este trabalho apresenta como resultado o percentual dos controles recomendados pela norma que estão em uso, permitindo demonstrar que a segurança da informação é seriamente considerada durante o processo eletrônico de votação no Plenário Ulysses Guimarães da Câmara dos Deputados.