881 resultados para High security identity tags


Relevância:

100.00% 100.00%

Publicador:

Resumo:

La incidencia de terceros actores en las Relaciones Internacionales es cada vez más frecuente y ha llevado a muchas de estas interacciones a un grado de mayor hostilidad, hasta el punto de convertirse en focos de inseguridad para toda una región. Este tipo de situaciones se presenta en mayor medida en zonas como medio oriente que se caracterizan por ser complejos de seguridad de alta hostilidad en los que se desarrollan amplias agendas de seguridad. Un marco de análisis de dicha situación la podemos encontrar en el conflicto Líbano – Israel y la incidencia que ha tenido Hezbolá (actor no estatal) como agente de securitización lo que ha generado una mayor tensión entre los estados de Líbano e Israel y como consecuencia de ello un mayor grado de inseguridad para la región (Medio Oriente).

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A prerequisite for the enrichment of antibodies screened from phage display libraries is their stable expression on a phage during multiple selection rounds. Thus, if stringent panning procedures are employed, selection is simultaneously driven by antigen affinity, stability and solubility. To take advantage of robust pre-selected scaffolds of such molecules, we grafted single-chain Fv (scFv) antibodies, previously isolated from a human phage display library after multiple rounds of in vitro panning on tumor cells, with the specificity of the clinically established murine monoclonal anti-CD22 antibody RFB4. We show that a panel of grafted scFvs retained the specificity of the murine monoclonal antibody, bound to the target antigen with high affinity (6.4-9.6 nM), and exhibited exceptional biophysical stability with retention of 89-93% of the initial binding activity after 6 days of incubation in human serum at 37degreesC. Selection of stable human scaffolds with high sequence identity to both the human germline and the rodent frameworks required only a small number of murine residues to be retained within the human frameworks in order to maintain the structural integrity of the antigen binding site. We expect this approach may be applicable for the rapid generation of highly stable humanized antibodies with low immunogenic potential.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This article examines the role of advertisement and promotion in the successful development of nationwide building societies in interwar Britain and the rapid overall growth of the building society movement. Major building societies are shown to have used extensive advertising to compensate for their initial lack of established national brands, promote home-ownership, and make savers aware of the attractive earnings and high security of building society savings. During a period when most building societies had very limited branch networks, extensive advertising increased the public profile of the major societies and thus assisted their rapid expansion via lower-cost modes such as agency networks.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

O Brasil é o sétimo maior consumidor mundial de águas engarrafadas. Os recipientes mais utilizados, galões plásticos de 20 litros, devem ser submetidos à inspeção individual e posteriormente a sanificação. Recentemente, enfermidades associadas a microrganismos emergentes têm despertado o interesse por novos sanitizantes. Entre estes, o gás ozônio é um dos mais atraentes em virtude da sua segurança e eficácia superiores aos desinfetantes convencionais, não gerando resíduos tóxicos. Neste trabalho, o ozônio foi avaliado como método alternativo na sanificação de galões de água de 20 litros, na cidade de Alfenas, MG. Trinta galões foram avaliados sem tratamento e trinta após a sanificação com água ozonizada (4mg/L/2minutos) quanto à contagem total de microrganismos aeróbios mesófilos heterotróficos, número mais provável (NMP) de coliformes totais e Escherichia coli, Staphyloccocus aureus e Pseudomonas spp. em 100mL de solução enxaguatória. A contagem média de unidades formadoras de colônias (UFC) de microrganismos heterotróficos no estágio de pré-lavagem foi de 5,7/cm² enquanto que o tratamento com a água ozonizada reduziu este valor para 0,003/cm², além de promover a negativação das análises para coliformes Pseudomonas ssp. e somente 13,3% das amostras apresentaram-se positivas para Staphylococcus aureus após a sanificação. Concluiu-se que o tratamento com utilização de ozônio foi eficiente, nas condições testadas.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Pós-graduação em Biotecnologia - IQ

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Scorpion toxins targeting voltage-gated sodium (NaV) channels are peptides that comprise 6076 amino acid residues cross-linked by four disulfide bridges. These toxins can be divided in two groups (a and beta toxins), according to their binding properties and mode of action. The scorpion a-toxin Ts2, previously described as a beta-toxin, was purified from the venom of Tityus serrulatus, the most dangerous Brazilian scorpion. In this study, seven mammalian NaV channel isoforms (rNaV1.2, rNaV1.3, rNaV1.4, hNaV1.5, mNaV1.6, rNaV1.7 and rNaV1.8) and one insect NaV channel isoform (DmNaV1) were used to investigate the subtype specificity and selectivity of Ts2. The electrophysiology assays showed that Ts2 inhibits rapid inactivation of NaV1.2, NaV1.3, NaV1.5, NaV1.6 and NaV1.7, but does not affect NaV1.4, NaV1.8 or DmNaV1. Interestingly, Ts2 significantly shifts the voltage dependence of activation of NaV1.3 channels. The 3D structure of this toxin was modeled based on the high sequence identity (72%) shared with Ts1, another T. serrulatus toxin. The overall fold of the Ts2 model consists of three beta-strands and one a-helix, and is arranged in a triangular shape forming a cysteine-stabilized a-helix/beta-sheet (CSa beta) motif.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

During the last twenty years, Cydia pomonolla granulovirus (CpGV, Baculoviridae) has become the most important biological control agent for the codling moth (CM) in organic and integrated apple production. All registered products in Europe are based on the isolate CpGV-M, which was discovered 1964 in Mexico. A serious threat to future application of CpGV is the occurrence of CM field populations resistant to CpGV. Since 2003, populations with up to 10,000-fold reduced susceptibility were reported from orchards in Germany, France, Italy, Switzerland, Austria and the Netherlands. A putative alternative to CpGV-M are novel CpGV isolates which are able to overcome CM resistance. This thesis focuses on the identification and characterisation of resistance overcoming CpGV isolates and the analysis of their molecular difference to CpGV-M.rnSixteen CpGV isolates were tested against CM lab strains in bioassays. Hereby, five isolates were identified which were able to completely overcome resistance. The genomes of these isolates were compared to CpGV-M by restriction fragment length polymorphism (RFLP) analysis. To identify the molecular factor responsible for improved virulence of some CpGV isolates, major genomic differences were sequenced and analysed. A 0.7 kb insertion was found in CpGV-I01, -I12 and -E2, but not in other resistance overcoming isolates. Analysis of the insertions sequence revealed that it might be due to a transposition event, but not involved in overcoming resistance. rnFor unequivocal identification of CpGV isolates, a new method based on molecular analysis was established. Partial sequencing of the conserved polyhedrin/granulin (polh/gran), late expression factor-8 (lef-8) and late expression factor-9 (lef-9) genes revealed single nucleotide polymorphisms (SNPs). SNP analysis correlated with the grouping obtained by RFLP analysis. A phylogenetic classification due to different genome types A-E is proposed. Phylogenetic analysis suggested that CpGV-M was the phylogenetically youngest of the tested CpGV isolates.rnWhole genome sequencing of two resistance overcoming isolates CpGV-I12 (type D genome) and -S (type E genome) and CpGV-M (type A genome) was performed. Comparison of the three genomes revealed a high sequence identity. Several insertions and deletions ranging from 1-700 nucleotides (nt) were found. Comparison on open reading frame (ORF) level revealed that CpGV-I12 and -S shared only one protein alteration when compared to CpGV-M: a stretch of 24 nt present in ORF cp24 was not found in any of the resistance overcoming isolates. Cp24 codes for the early gene pe38. Combined with the results of phylogenetic analysis, it is proposed that these 24 nt are a recent insertion into the CpGV-M genome. The role of pe38 in overcoming resistance was investigated by knocking out pe38 of a CpGV-M based bacmid and swapping of CpGV-I12 pe38 of into the k.o. bacmid. When pe38 of CpGV-I12 was inserted into the k.o. bacmid, the infectivity could not be rescued, suggesting that the genomic portion of pe38 might play a role in its function.rnIt can be concluded that the recently observed CpGV resistance in CM is only related to type A genomes. RFLP and SNP analysis provide tools for identifying and characterising different CpGV isolates reliably, a pre-condition for a future registration of CpGV products based on novel CpGV isolates.rnrnrn

Relevância:

100.00% 100.00%

Publicador:

Resumo:

I sottotipi H1N1, H1N2 e H3N2 di influenza A virus sono largamente diffusi nella popolazione suina di tutto il mondo. Nel presente lavoro è stato sviluppato un protocollo di sequenziamento di c.d. nuova generazione, su piattaforma Ion Torrent PGM, idoneo per l’analisi di tutti i virus influenzali suini (SIV). Per valutare l’evoluzione molecolare dei SIV italiani, sono stati sequenziati ed analizzati mediante analisi genomica e filogenetica un totale di sessantadue ceppi di SIV appartenenti ai sottotipi H1N1, H1N2 e H3N2, isolati in Italia dal 1998 al 2014. Sono stati evidenziati in sei campioni due fenomeni di riassortimento: tutti i SIV H1N2 esaminati presentavano una neuraminidasi di derivazione umana, diversa da quella dei SIV H1N2 circolanti in Europa, inoltre l’emoagglutinina (HA) di due isolati H1N2 era originata dal riassortimento con un SIV H1N1 avian-like. L’analisi molecolare dell’HA ha permesso di rivelare un’inserzione di due amminoacidi in quattro SIV H1N1 pandemici e una delezione di due aminoacidi in quattro SIV H1N2, entrambe a livello del sito di legame con il recettore cellulare. E’ stata inoltre evidenziata un’elevata omologia di un SIV H1N1 con ceppi europei isolati negli anni ’80, suggerendo la possibile origine vaccinale di questo virus. E’ stato possibile, in aggiunta, applicare il nuovo protocollo sviluppato per sequenziare un virus influenzale aviare altamente patogeno trasmesso all’uomo, direttamente da campione biologico. La diversità genetica nei SIV esaminati in questo studio conferma l’importanza di un continuo monitoraggio della costellazione genomica dei virus influenzali nella popolazione suina.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The following is an analysis of the role of computer aided surgery by infralabyrinthine-subcochlear approach to the petrous apex for cholesterol granulomas with hearing preservation. In a retrospective case review from 1996 to 2008 six patients were analysed in our tertiary referral centre, otorhinolaryngology outpatient clinic. Excellent intraoperative localisation of the carotid artery, facial nerve and the entrance into the cholesterol cyst of the bone by means of the navigation system was seen. Additionally, the operation time decreased from an initial 4 h down to 2 h. The application of computer-aided surgery allows intraoperative monitoring of the position of the tip of the microsurgical instruments in case of a rare disease and in the delicate area of the petrous apex giving a high security level.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

CXCL14 is a chemokine with an atypical, yet highly conserved, primary structure characterized by a short N terminus and high sequence identity between human and mouse. Although it induces chemotaxis of monocytic cells at high concentrations, its physiological role in leukocyte trafficking remains elusive. In contrast, several studies have demonstrated that CXCL14 is a broad-spectrum antimicrobial peptide that is expressed abundantly and constitutively in epithelial tissues. In this study, we further explored the antimicrobial properties of CXCL14 against respiratory pathogens in vitro and in vivo. We found that CXCL14 potently killed Pseudomonas aeruginosa, Streptococcus mitis, and Streptococcus pneumoniae in a dose-dependent manner in part through membrane depolarization and rupture. By performing structure-activity studies, we found that the activity against Gram-negative bacteria was largely associated with the N-terminal peptide CXCL141-13. Interestingly, the central part of the molecule representing the β-sheet also maintained ∼62% killing activity and was sufficient to induce chemotaxis of THP-1 cells. The C-terminal α-helix of CXCL14 had neither antimicrobial nor chemotactic effect. To investigate a physiological function for CXCL14 in innate immunity in vivo, we infected CXCL14-deficient mice with lung pathogens and we found that CXCL14 contributed to enhanced clearance of Streptococcus pneumoniae, but not Pseudomonas aeruginosa. Our comprehensive studies reflect the complex bactericidal mechanisms of CXCL14, and we propose that different structural features are relevant for the killing of Gram-negative and Gram-positive bacteria. Taken together, our studies show that evolutionary-conserved features of CXCL14 are important for constitutive antimicrobial defenses against pneumonia.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper, a new countermeasure against power and electromagnetic (EM) Side Channel Attacks (SCA) on FPGA implemented cryptographic algorithms is proposed. This structure mainly focuses on a critical vulnerability, Early Evaluation, also known as Early Propagation Effect (EPE), which exists in most conventional SCA-hardened DPL (Dual-rail with Precharge Logic) solutions. The main merit of this proposal is that the EPE can be effectively prevented by using a synchronized non regular precharge network, which maintains identical routing between the original and mirror parts, where costs and design complexity compared with previous EPE-resistant countermeasures are reduced, while security level is not sacrificed. Another advantage for our Precharge Absorbed(PA) - DPL method is that its Dual-Core style (independent architecture for true and false parts) could be generated using partial reconfiguration. This helps to get a dynamic security protection with better energy planning. That means system only keeps the true part which fulfills the normal en/decryption task in low security level, and reconfigures the false parts once high security level is required. A relatively limited clock speed is a compromise, since signal propagation is restricted to a portion of the clock period. In this paper, we explain the principles of PA-DPL and provide the guidelines to design this structure. We experimentally validate our methods in a minimized AES co-processor on Xilinx Virtex-5 board using electromagnetic (EM) attacks.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Las prestaciones y características de los dispositivos móviles actuales los sitúa a un nivel similar a los ordenadores de escritorio tradicionales en cuanto a funcionalidad y posibilidades de uso, añadiendo además la movilidad y la sensación de pertenencia al usuario que se deriva de ésta. Estas cualidades convierten a las plataformas móviles de computación en verdaderos ordenadores personales, y cada día es más popular su utilización en ámbitos distintos del ocio y las comunicaciones propiamente dichas, pasando a convertirse en herramientas de apoyo a la productividad también en el entorno profesional y corporativo. La utilización del dispositivo móvil como parte de una infraestructura de telecomunicaciones da lugar a nuevas expresiones de problemas clásicos de gestión y seguridad. Para tratar de abordarlos con la flexibilidad y la escalabilidad necesarias se plantean alternativas novedosas que parten de enfoques originales a estos problemas, como las ideas y conceptos que se engloban en la filosofía del Control de Acceso a la Red (Network Access Control, o NAC). La mayoría de los planteamientos de NAC se basan, en el ámbito de la seguridad, en comprobar ciertas características del dispositivo móvil para tratar de determinar hasta qué punto puede éste suponer una amenaza para los recursos de la red u otros usuarios de la misma. Obtener esta información de forma fiable resulta extremadamente difícil si se caracteriza el dispositivo mediante un modelo de caja blanca, muy adecuado dada la apertura propia de los sistemas operativos móviles actuales, muy diferentes de los de antaño, y la ausencia de un marco de seguridad efectivo en ellos. Este trabajo explora el Estado de la Técnica en este ámbito de investigación y plantea diferentes propuestas orientadas a cubrir las deficiencias de las soluciones propuestas hasta el momento y a satisfacer los estrictos requisitos de seguridad que se derivan de la aplicación del modelo de caja blanca, materializándose en última instancia en la definición de un mecanismo de evaluación de características arbitrarias de un cierto dispositivo móvil basado en Entornos Seguros de Ejecución (Trusted Execution Environments, o TEEs) con elevadas garantías de seguridad compatible con los planteamientos actuales de NAC. ABSTRACT The performance and features of today’s mobile devices make them able to compete with traditional desktop computers in terms of functionality and possible usages. In addition to this, they sport mobility and the stronger sense of ownership that derives from it. These attributes change mobile computation platforms into truly personal computers, allowing them to be used not only for leisure or as mere communications devices, but also as supports of productivity in professional and corporative environments. The utilization of mobile devices as part of a telecommunications infrastructure brings new expressions of classic management and security problems with it. In order to tackle them with appropriate flexibility and scalability, new alternatives are proposed based on original approaches to these problems, such as the concepts and ideas behind the philosophy of Network Access Control (NAC). The vast majority of NAC proposals are based, security-wise, on checking certain mobile device’s properties in order to evaluate how probable it is for it to become a threat for network resources or even other users of the infrastructure. Obtaining this information in a reliable and trustworthy way is extremely difficult if the device is characterized using a white-box model, which is the most appropriate if the openness of today’s mobile operating systems, very different from former ones, and the absence of an effective security framework are taken into account. This work explores the State of the Art related with the aforementioned field of research and presents different proposals targeted to overcome the deficiencies of current solutions and satisfy the strict security requirements derived from the application of the white box model. These proposals are ultimately materialized in the definition of a high-security evaluation procedure of arbitrary properties of a given mobile device based on Trusted Execution Environments (TEEs) which is compatible with modern NAC approaches.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

La Comunidad de Madrid ha tenido un pasado minero importante que ha dejado su vestigio en el territorio. Actualmente la explotación de minerales no metálicos y de rocas industriales y ornamentales continúa, pero no así la de la minería metálica que en el pasado fue abundante. Hoy en día todas estas minas están abandonadas, dando lugar a zonas degradadas con un elevado riesgo para la seguridad de las personas y de los animales terrestres que habitan por sus inmediaciones, y necesitan ser intervenidas atendiendo, además, a su integración o recuperación ecológica y paisajística en el territorio. El principal propósito de esta tesis es conocer la situación actual que presentan las minas abandonadas de metales y proponer unos modelos de actuación para la rehabilitación e integración de los espacios mineros abandonados de la Comunidad de Madrid, cuya ventaja también estriba en su posible extrapolación a otras aéreas de gestión con una problemática similar. Partiendo de una selección de cincuenta y siete minas de interior metálicas abandonadas, se ha hecho un diagnostico en función de su seguridad (riesgo), interés cultural, arqueológico e histórico y por su afección a espacios protegidos, resultando que en todas, excepto en tres de ellas, es preciso llevar a cabo medidas protectoras y de restauración e integración en el medio ambiente. El conjunto de minas catalogadas de alto riesgo para la seguridad son veintitrés, y sobre ellas se ha realizado un Análisis Clúster, en el que además de los criterios de gestión formulados: seguridad, protección del patrimonio minero-industrial e integración ecológico-paisajística, se han incorporado otros modificadores como distancia a poblaciones, caminos, pistas y vías pecuarias, y accesibilidad. Con los resultados de este análisis se obtienen una clasificación por grupos de las minas en relación con las características intrínsecas de las explotaciones preseleccionadas y la tipología de problemas que presentan, y a partir de ella se plantean soluciones viables que se concretan en la redacción de una serie de anteproyectos tipo. Una de las principales aportaciones es que se trata de un modelo de inventariocaracterización- actuación extrapolable a otros entornos similares con problemáticas parecidas. Las propuestas de actuación que figuran en los anteproyectos tipo se proponen como medidas aplicables en situaciones similares. La tesis además también incorpora una base de datos georreferenciada que permite la localización de las explotaciones mineras abandonadas, el acceso rápido a sus características y a la propuesta de restauración correspondiente. ABSTRACT The Community of Madrid had an important mining past that left its traces in the territory. Currently the explotation of non-metallic minerals and industrial and ornamental rocks continues, but not so much with the metal deposits that were abundant in the past. Today these mines are abandoned, resulting in degraded areas with a high risk to the safety of nearby people and animals that inhabit its vicinity, and they need to be intervened, by tending to their environment integration or ecological and landscape recovery. The main objective of this thesis is to know the current situation of abandoned metal mines and propose an action model for the rehabilitation and integration of abandoned mining areas of the Community of Madrid, whose advantage also is its possible extrapolation to other management areas with similar problems. From a selection of fifty-seven abandoned metal mines, a diagnosis has been made, based on safety (risk), cultural, archaeological and historical interests and how it can be related to protected areas, resulting that all but three of them need measures of protection, restoration and integration to the environment. The set of mines that are classified as a high security risk are twenty-three, and it has been made on them an Cluster Analysis, as in addition to the management formulated criteria, such as safety, protection of mining and industrial heritage and eco-landscape integration, it has been incorporated other modifying variables, such as distance to populations, roads, tracks and livestock paths, and accessibility. With the results of this analysis, a classification of similar groups of mines in relation with the intrinsic characteristics of the preselected mines and typology problems, and from it a set of viable solutions will be specified, being then drafted on a series of proposals. One of the main contributions of this research is that it consists of an inventorycharacterization- action model, which can be extrapolated to other similar environments with similar problems. The action measures that are contained in the proposals are defined as applicable to similar situations. The thesis also incorporates a geo-referenced database that allows finding the location of abandoned mines, thus giving quick access to its features and its corresponding restoration proposal.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Fish serum contains several specific binding proteins for insulin-like growth factors (IGFBPs). The structure and physiological function of these fish IGFBPs are unknown. Here we report the complete primary sequence of a zebrafish IGFBP deduced from cDNA clones isolated by library screening and rapid amplification of cDNA ends. The full-length 1,757-bp cDNA encodes a protein of 276 aa, which contains a putative 22-residue signal peptide and a 254-residue mature protein. The mature zebrafish IGFBP has a predicted molecular size of 28,440 Da and shows high sequence identity with human IGFBP-2 (52%). The sequence identities with other human IGFBPs are <37%. Chinese hamster ovary cells stably transfected with the zebrafish IGFBP-2 cDNA secreted a 31-kDa protein, which bound to IGF-I and IGF-II with high affinity, but did not bind to Des(1–3)IGF-I or insulin. Northern blot analyses revealed that the zebrafish IGFBP-2 transcript is a 1.8-kb band expressed in many embryonic and adult tissues. In adult zebrafish, IGFBP-2 mRNA levels were greatly reduced by growth hormone treatment but increased by prolonged fasting. When overexpressed or added to cultured zebrafish and mammalian cells, the zebrafish IGFBP-2 significantly inhibited IGF-I-stimulated cell proliferation and DNA synthesis. These results indicate that zebrafish IGFBP-2 is a negative growth regulator acting downstream in the growth hormone-IGF-I axis.