970 resultados para Code Division Multiple Access System
Resumo:
Before entering the central nervous system (CNS) immune cells have to penetrate any one of its barriers, namely either the endothelial blood-brain barrier, the epithelial blood-cerebrospinal fluid barrier or the tanycytic barrier around the circumventricular organs, all of which maintain homeostasis within the CNS. The presence of these barriers in combination with the lack of lymphatic vessels and the absence of classical MHC-positive antigen presenting cells characterizes the CNS as an immunologically privileged site. In multiple sclerosis a large number of inflammatory cells gains access to the CNS parenchyma. Studies performed in experimental autoimmune encephalomyelitis (EAE), a rodent model for multiple sclerosis, have enabled us to understand some of the molecular mechanisms involved in immune cell entry into the CNS. In particular, the realization that /alpha4-integrins play a predominant role in leukocyte trafficking to the CNS has led to the development of a novel drug for the treatment of relapsing-remitting multiple sclerosis, which targets /alpha4-integrin mediated immune cell migration to the CNS. At the same time, the involvement of other adhesion and signalling molecules in this process remains to be investigated and novel molecules contributing to immune cell entry into the CNS are still being identified. The entire process of immune cell trafficking into the CNS is strictly controlled by the brain barriers not only under physiological conditions but also during neuroinflammation, when some barrier properties are lost. Thus, immune cell entry into the CNS critically depends on the unique characteristics of the brain barriers maintaining CNS homeostasis.
Resumo:
In multiple sclerosis and in its animal model experimental autoimmune encephalomyelitis (EAE), inflammatory cells migrate across the highly specialized endothelial blood-brain barrier (BBB) and gain access to the central nervous system (CNS). It is well established that leukocyte recruitment across this vascular bed is unique due to the predominant involvement of alpha4-integrins in mediating the initial contact to as well as firm adhesion with the endothelium. In contrast, the involvement of the selectins, L-selectin, E- and P-selectin and their respective carbohydrate ligands such as P-selectin glycoprotein (PSGL)-1 in this process has been controversially discussed. Intravital microscopic analysis of immune cell interaction with superficial brain vessels demonstrates a role for E- and P-selectin and their common ligand PSGL-1 in lymphocyte rolling. However, E- and P-selectin-deficient SJL- or C57Bl/6 mice or PSGL-1-deficient C57Bl/6 mice develop EAE indistinguishable from wild-type mice. Considering these apparently discrepant observations, it needs to be discussed whether the molecular mechanisms involved in leukocyte trafficking across superficial brain vessels are irrelevant for EAE pathogenesis or whether the therapeutic efficacy of targeting alpha4-integrins in EAE is truly dependent on the inhibition of leukocyte trafficking across the BBB.
Resumo:
File system security is fundamental to the security of UNIX and Linux systems since in these systems almost everything is in the form of a file. To protect the system files and other sensitive user files from unauthorized accesses, certain security schemes are chosen and used by different organizations in their computer systems. A file system security model provides a formal description of a protection system. Each security model is associated with specified security policies which focus on one or more of the security principles: confidentiality, integrity and availability. The security policy is not only about “who” can access an object, but also about “how” a subject can access an object. To enforce the security policies, each access request is checked against the specified policies to decide whether it is allowed or rejected. The current protection schemes in UNIX/Linux systems focus on the access control. Besides the basic access control scheme of the system itself, which includes permission bits, setuid and seteuid mechanism and the root, there are other protection models, such as Capabilities, Domain Type Enforcement (DTE) and Role-Based Access Control (RBAC), supported and used in certain organizations. These models protect the confidentiality of the data directly. The integrity of the data is protected indirectly by only allowing trusted users to operate on the objects. The access control decisions of these models depend on either the identity of the user or the attributes of the process the user can execute, and the attributes of the objects. Adoption of these sophisticated models has been slow; this is likely due to the enormous complexity of specifying controls over a large file system and the need for system administrators to learn a new paradigm for file protection. We propose a new security model: file system firewall. It is an adoption of the familiar network firewall protection model, used to control the data that flows between networked computers, toward file system protection. This model can support decisions of access control based on any system generated attributes about the access requests, e.g., time of day. The access control decisions are not on one entity, such as the account in traditional discretionary access control or the domain name in DTE. In file system firewall, the access decisions are made upon situations on multiple entities. A situation is programmable with predicates on the attributes of subject, object and the system. File system firewall specifies the appropriate actions on these situations. We implemented the prototype of file system firewall on SUSE Linux. Preliminary results of performance tests on the prototype indicate that the runtime overhead is acceptable. We compared file system firewall with TE in SELinux to show that firewall model can accommodate many other access control models. Finally, we show the ease of use of firewall model. When firewall system is restricted to specified part of the system, all the other resources are not affected. This enables a relatively smooth adoption. This fact and that it is a familiar model to system administrators will facilitate adoption and correct use. The user study we conducted on traditional UNIX access control, SELinux and file system firewall confirmed that. The beginner users found it easier to use and faster to learn then traditional UNIX access control scheme and SELinux.
Resumo:
Earth observations (EO) represent a growing and valuable resource for many scientific, research and practical applications carried out by users around the world. Access to EO data for some applications or activities, like climate change research or emergency response activities, becomes indispensable for their success. However, often EO data or products made of them are (or are claimed to be) subject to intellectual property law protection and are licensed under specific conditions regarding access and use. Restrictive conditions on data use can be prohibitive for further work with the data. Global Earth Observation System of Systems (GEOSS) is an initiative led by the Group on Earth Observations (GEO) with the aim to provide coordinated, comprehensive, and sustained EO and information for making informed decisions in various areas beneficial to societies, their functioning and development. It seeks to share data with users world-wide with the fewest possible restrictions on their use by implementing GEOSS Data Sharing Principles adopted by GEO. The Principles proclaim full and open exchange of data shared within GEOSS, while recognising relevant international instruments and national policies and legislation through which restrictions on the use of data may be imposed.The paper focuses on the issue of the legal interoperability of data that are shared with varying restrictions on use with the aim to explore the options of making data interoperable. The main question it addresses is whether the public domain or its equivalents represent the best mechanism to ensure legal interoperability of data. To this end, the paper analyses legal protection regimes and their norms applicable to EO data. Based on the findings, it highlights the existing public law statutory, regulatory, and policy approaches, as well as private law instruments, such as waivers, licenses and contracts, that may be used to place the datasets in the public domain, or otherwise make them publicly available for use and re-use without restrictions. It uses GEOSS and the particular characteristics of it as a system to identify the ways to reconcile the vast possibilities it provides through sharing of data from various sources and jurisdictions on the one hand, and the restrictions on the use of the shared resources on the other. On a more general level the paper seeks to draw attention to the obstacles and potential regulatory solutions for sharing factual or research data for the purposes that go beyond research and education.
Resumo:
HYPOTHESIS A previously developed image-guided robot system can safely drill a tunnel from the lateral mastoid surface, through the facial recess, to the middle ear, as a viable alternative to conventional mastoidectomy for cochlear electrode insertion. BACKGROUND Direct cochlear access (DCA) provides a minimally invasive tunnel from the lateral surface of the mastoid through the facial recess to the middle ear for cochlear electrode insertion. A safe and effective tunnel drilled through the narrow facial recess requires a highly accurate image-guided surgical system. Previous attempts have relied on patient-specific templates and robotic systems to guide drilling tools. In this study, we report on improvements made to an image-guided surgical robot system developed specifically for this purpose and the resulting accuracy achieved in vitro. MATERIALS AND METHODS The proposed image-guided robotic DCA procedure was carried out bilaterally on 4 whole head cadaver specimens. Specimens were implanted with titanium fiducial markers and imaged with cone-beam CT. A preoperative plan was created using a custom software package wherein relevant anatomical structures of the facial recess were segmented, and a drill trajectory targeting the round window was defined. Patient-to-image registration was performed with the custom robot system to reference the preoperative plan, and the DCA tunnel was drilled in 3 stages with progressively longer drill bits. The position of the drilled tunnel was defined as a line fitted to a point cloud of the segmented tunnel using principle component analysis (PCA function in MatLab). The accuracy of the DCA was then assessed by coregistering preoperative and postoperative image data and measuring the deviation of the drilled tunnel from the plan. The final step of electrode insertion was also performed through the DCA tunnel after manual removal of the promontory through the external auditory canal. RESULTS Drilling error was defined as the lateral deviation of the tool in the plane perpendicular to the drill axis (excluding depth error). Errors of 0.08 ± 0.05 mm and 0.15 ± 0.08 mm were measured on the lateral mastoid surface and at the target on the round window, respectively (n =8). Full electrode insertion was possible for 7 cases. In 1 case, the electrode was partially inserted with 1 contact pair external to the cochlea. CONCLUSION The purpose-built robot system was able to perform a safe and reliable DCA for cochlear implantation. The workflow implemented in this study mimics the envisioned clinical procedure showing the feasibility of future clinical implementation.
Resumo:
Enterococcus faecalis is a Gram-positive bacterium that lives as a commensal organism in the mammalian gastrointestinal tract, but can behave as an opportunistic pathogen. Our lab discovered that mutation of the eutK gene attenuates virulence of E. faecalis in the C. elegans model host. eutK is part of the ethanolamine metabolic pathway which was previously unknown in E. faecalis. I discovered the presence of two unique posttranscriptional regulatory features that control expression of eut locus genes. The first feature I found is an AdoCBL riboswitch, a cis-acting RNA regulatory element that acts as a positive regulator of gene expression. The second feature I discovered is a unique two-component system, EutVW. The EutV response regulator contains an ANTAR family domain, which binds RNA to trigger transcriptional antitermination. I determined that induction of expression of several genes in the eut locus is dependent on ethanolamine, AdoCBL and the two-component system. AdoCBL and ethanolamine are both required for induction of eut locus gene expression. Additionally, I discovered eutG is regulated by a unique mechanism of antitermination. Both the AdoCBL riboswitch and EutV response regulator control the expression of the downstream gene eutG. EutV potentially acts through a novel antitermination mechanism in which a dimer of EutV binds to a pair of mRNA stem loops forming an antitermination complex. My data show a unique mechanism by which two environmental signals are integrated by two different posttranscriptional regulators to regulate a single locus.
Resumo:
Multiple sclerosis (MS) is the most common demyelinating disease affecting the central nervous system. There is no cure for MS and current therapies have limited efficacy. While the majority of individuals with MS develop significant clinical disability, a subset experiences a disease course with minimal impairment even in the presence of significant apparent tissue damage on magnetic resonance imaging (MRI). The current studies combined functional MRI and diffusion tensor imaging (DTI) to elucidate brain mechanisms associated with lack of clinical disability in patients with MS. Recent evidence has implicated cortical reorganization as a mechanism to limit the clinical manifestation of the disease. Functional MRI was used to test the hypothesis that non-disabled MS patients (Expanded Disability Status Scale ≤ 1.5) show increased recruitment of cognitive control regions (dorsolateral prefrontal and anterior cingulate cortex) while performing sensory, motor and cognitive tasks. Compared to matched healthy controls, patients increased activation of cognitive control brain regions when performing non-dominant hand movements and the 2-back working memory task. Using dynamic causal modeling, we tested whether increased cognitive control recruitment is associated with alterations in connectivity in the working memory functional network. Patients exhibited similar network connectivity to that of control subjects when performing working memory tasks. We subsequently investigated the integrity of major white matter tracts to assess structural connectivity and its relation to activation and functional integration of the cognitive control system. Patients showed substantial alterations in callosal, inferior and posterior white matter tracts and less pronounced involvement of the corticospinal tracts and superior longitudinal fasciculi (SLF). Decreased structural integrity within the right SLF in patients was associated with decreased performance, and decreased activation and connectivity of the cognitive control system when performing working memory tasks. These studies suggest that patient with MS without clinical disability increase cognitive control system recruitment across functional domains and rely on preserved functional and structural connectivity of brain regions associated with this network. Moreover, the current studies show the usefulness of combining brain activation data from functional MRI and structural connectivity data from DTI to improve our understanding of brain adaptation mechanisms to neurological disease.
Resumo:
The paper seeks a re-conceptualization of the global digital divide debate. It critically explores the predominant notion, its evolution and measurement, as well as the policies that have been advanced to bridge the digital divide. Acknowledging the complexity of this inequality, the paper aims at analyzing the disparities beyond the connectivity and the skills barriers. Without understating the first two digital divides, it is argued that as the Internet becomes more sophisticated and more integrated into economic, social and cultural processes, a ‘third’ generation of divides becomes critical. These divides are drawn not at the entry to the net but within the net itself, and limit access to content. The increasing barriers to content, although of diverse nature, all relate to some governance characteristics inherent in cyberspace, such as global spillover of local decisions, regulation through code or proliferation of self- and co-regulatory models. It is maintained that as the practice of intervention intensifies in cyberspace, multiple and far-reaching points of control outside formal legal institutions are created, which threaten the availability of public goods and make the pursuit of public objectives difficult. This is an aspect that is rarely addressed in the global digital divide discussions, even in comprehensive analysis and political initiatives such as the World Summit on the Information Society. Yet, the conceptualization of the digital divide as impeded access to content may be key in terms of ensuring real participation and catering for the long-term implications of digital technologies.
Resumo:
An odorant's code is represented by activity in a dispersed ensemble of olfactory sensory neurons in the nose, activation of a specific combination of groups of mitral cells in the olfactory bulb and is considered to be mapped at divergent locations in the olfactory cortex. We present here an in vitro model of the mammalian olfactory system developed to gain easy access to all stations of the olfactory pathway. Mouse olfactory epithelial explants are cocultured with a brain slice that includes the olfactory bulb and olfactory cortex areas and maintains the central olfactory pathway intact and functional. Organotypicity of bulb and cortex is preserved and mitral cell axons can be traced to their target areas. Calcium imaging shows propagation of mitral cell activity to the piriform cortex. Long term coculturing with postnatal olfactory epithelial explants restores the peripheral olfactory pathway. Olfactory receptor neurons renew and progressively acquire a mature phenotype. Axons of olfactory receptor neurons grow out of the explant and rewire into the olfactory bulb. The extent of reinnervation exhibits features of a postlesion recovery. Functional imaging confirms the recovery of part of the peripheral olfactory pathway and shows that activity elicited in olfactory receptor neurons or the olfactory nerves is synaptically propagated into olfactory cortex areas. This model is the first attempt to reassemble a sensory system in culture, from the peripheral sensor to the site of cortical representation. It will increase our knowledge on how neuronal circuits in the central olfactory areas integrate sensory input and counterbalance damage.
Resumo:
Determining the expected age at a potential ice-core drilling site on a polar ice sheet generally depends on a combination of information from remote-sensing methods, estimates of current accumulation and modelling. This poses irreducible uncertainties in retrieving an undisturbed ice core of the desired age. Although recently perfected radar techniques will improve the picture of the ice sheet below future drilling sites, rapid prospective drillings could further increase the success of deep drilling projects. Here we design and explore a drilling system for a minimum-size rapid-access hole. The advantages of a small hole are the low demand for drilling fluid, low overall weight of the equipment, fast installing and de-installing and low costs. We show that, in theory, drilling of a 20mm hole to a depth of 3000m is possible in ~4 days. First concepts have been realized and verified in the field. Both the drill cuttings and the hole itself can be used to characterize the properties of the ice sheet and its potential to provide a trustworthy palaeo-record. A candidate drilling site could be explored in ~2 weeks, which would enable the characterization of several sites in one summer season.
Resumo:
The aim of direct cochlear access (DCA) is to replace the standard mastoidectomy with a small diameter tunnel from the lateral bone surface to the cochlea for electrode array insertion. In contrast to previous attempts, the approach described in this work not only achieves an unprecedented high accuracy, but also contains several safety sub-systems. This paper provides a brief description of the system components, and summarizes accuracy results using the system in a cadaver model over the past two years.
Resumo:
Each year about 650,000 Europeans die from stroke and a similar number lives with the sequelae of multiple sclerosis (MS). Stroke and MS differ in their etiology. Although cause and likewise clinical presentation set the two diseases apart, they share common downstream mechanisms that lead to damage and recovery. Demyelination and axonal injury are characteristics of MS but are also observed in stroke. Conversely, hallmarks of stroke, such as vascular impairment and neurodegeneration, are found in MS. However, the most conspicuous common feature is the marked neuroinflammatory response, marked by glia cell activation and immune cell influx. In MS and stroke the blood-brain barrier is disrupted allowing bone marrow-derived macrophages to invade the brain in support of the resident microglia. In addition, there is a massive invasion of auto-reactive T-cells into the brain of patients with MS. Though less pronounced a similar phenomenon is also found in ischemic lesions. Not surprisingly, the two diseases also resemble each other at the level of gene expression and the biosynthesis of other proinflammatory mediators. While MS has traditionally been considered to be an autoimmune neuroinflammatory disorder, the role of inflammation for cerebral ischemia has only been recognized later. In the case of MS the long track record as neuroinflammatory disease has paid off with respect to treatment options. There are now about a dozen of approved drugs for the treatment of MS that specifically target neuroinflammation by modulating the immune system. Interestingly, experimental work demonstrated that drugs that are in routine use to mitigate neuroinflammation in MS may also work in stroke models. Examples include Fingolimod, glatiramer acetate, and antibodies blocking the leukocyte integrin VLA-4. Moreover, therapeutic strategies that were discovered in experimental autoimmune encephalomyelitis (EAE), the animal model of MS, turned out to be also effective in experimental stroke models. This suggests that previous achievements in MS research may be relevant for stroke. Interestingly, the converse is equally true. Concepts on the neurovascular unit that were developed in a stroke context turned out to be applicable to neuroinflammatory research in MS. Examples include work on the important role of the vascular basement membrane and the BBB for the invasion of immune cells into the brain. Furthermore, tissue plasminogen activator (tPA), the only established drug treatment in acute stroke, modulates the pathogenesis of MS. Endogenous tPA is released from endothelium and astroglia and acts on the BBB, microglia and other neuroinflammatory cells. Thus, the vascular perspective of stroke research provides important input into the mechanisms on how endothelial cells and the BBB regulate inflammation in MS, particularly the invasion of immune cells into the CNS. In the current review we will first discuss pathogenesis of both diseases and current treatment regimens and will provide a detailed overview on pathways of immune cell migration across the barriers of the CNS and the role of activated astrocytes in this process. This article is part of a Special Issue entitled: Neuro inflammation: A common denominator for stroke, multiple sclerosis and Alzheimer's disease, guest edited by Helga de Vries and Markus Swaninger.