990 resultados para DL-1
Resumo:
Poly(l-lactide) (PLLA), a versatile biodegradable polymer, is one of the most commonly-used materials for tissue engineering applications. To improve cell affinity for PLLA, poly(ethylene glycol) (PEG) was used to develop diblock copolymers. Human bone marrow stromal cells (hBMSCs) were cultured on MPEG-b-PLLA copolymer films to determine the effects of modification on the attachment and proliferation of hBMSC. The mRNA expression of 84 human extracellular matrix (ECM) and adhesion molecules was analyzed using RT-qPCR to understand the underlying mechanisms. It was found that MPEG-b-PLLA copolymer films significantly improved cell adhesion, extension, and proliferation.This was found to be related to the significant upregulation of two adhesion genes, CDH1 and CTNND2, which encode 1-cadherin and delta-2-catenin, respectively, two key components for the cadherin-catenin complex. In summary, MPEG-b-PLLA copolymer surfaces improved initial cell adhesion by stimulation of adhesion molecule gene expression.
Resumo:
The anionic heterocumulene SCCCN- was generated in the gas phase by collisional activation of the radical anion of 1,2-dicyanoethylenedithiolate. The mechanism of this reaction, as well as the structures of neutral and anionic products, was investigated by hybrid density functional theory (DFT) calculations. Dissociation to form SCCCN- and SCN is proposed to occur by a radical directed cyano migration reaction, with calculations suggesting this is the lowest energy fragmentation pathway available to the precursor anion. In contrast, the even-electron protonated 1,2-dicyanoethylenedithiolate anion fragmented by loss of HCN.
Resumo:
In this research we observe the situated, embodied and playful interaction that participants engage in with open-ended interactive artworks. The larger project from which this work derives [28] contributes a methodological model for the evaluation of open-ended interactive artwork that treats each work individually and recognises the importance of the artist intent and the traditions from which the work derives. In this paper, we describe this evolving methodology for evaluating and understanding participation via three case studies of open-ended interactive art installations. This analysis builds an understanding of open-ended free-play non-narrative environments and the affordances these environments enable for participants.
Resumo:
This paper examines the role of visual information in a remote help-giving situation involving the collaborative physical task of designing a prototype remote control. We analyze a set of video recordings captured within an experimental setting. Our analysis shows that using gestures and relevant artefacts and by projecting activities on the camera, participants were able to discuss several design-related issues. The results indicate that with a limited camera view (mainly faces and shoulders), participants' conversations were centered at the physical prototype that they were designing. The socially organized use of our experimental setting provides some key implications for designing future remote collaborative systems.
Resumo:
Traditional methods are ill-suited for the synthesis of ortho,ortho-biphenols, a structural motif found in many polyphenolic natural products, as well as synthetically useful compounds such as the chiral ligands binol, vapol, and vanol. The new route consists of a radical-based reaction of an acetal-tethered biphenyl ether substrate and subsequent hydrolytic cleavage of the dibenzo-1,3-dioxepine intermediate.
Resumo:
o-Bromo(propa-1,2-dien-1-yl)arenes exhibit novel and orthogonal reactivity under Pd catalysis in the presence of secondary amines to form enamines (concerted Pd insertion, intramolecular carbopalladation, and terminative Buchwald–Hartwig coupling) and of amides to form indoles (addition, Buchwald–Hartwig cyclization, and loss of the acetyl group). The substrates for these reactions can be accessed in a reliable and highly selective two-step process from 2-bromoaryl bromides.
Resumo:
The structure of several carboxy-substituted hexahydro-1,4:5,8-diepoxynaphthalenes have been solved with X-ray crystallography, in some cases confirming previously contentious structures. The compounds of interest are constructed in efficient one-step 2 × [4+2] cycloaddition reactions from furan and acetylene carboxylate derivatives.
Resumo:
Pyrido[1,2-a]benzimidazoles1, 2a are interesting compounds both from the viewpoint of medicinal chemistry2–7 (solubility,7 DNA intercalation3) and materials chemistry8 (fluorescence). Of note among the former is the antibiotic drug Rifaximin,5 which contains this heteroaromatic core. The classical synthetic approach for the assembly of pyrido[1,2-a]benzimidazoles is by [3+3] cyclocondensation of benzimidazoles containing a methylene group at C2 with appropriate bielectrophiles.2a However, these procedures are often low-yielding, involve indirect/lengthy sequences, and/or provide access to a limited range of products, primarily providing derivatives with substituents located on the pyridine ring (A ring, Scheme 1).2–4 Theoretically, a good alternative synthetic method for the synthesis of pyrido[1,2-a]benzimidazoles with substituents in the benzene ring (C ring) should be accessible by intramolecular transition-metal-catalyzed CN bond formation in N-(2-chloroaryl)pyridin-2-amines, based on chemistry recently developed in our research group.9 These substrates themselves are easily available through SNAr or selective Pd-catalyzed amination10 of 2-chloropyridine with 2-chloroanilines.11 If a synthetic procedure that eliminated the need for preactivation of the 2-position of the 2-chloroarylamino entity could be developed, this would be even more powerful, as anilines are more readily commercially available than 2-chloroanilines. Therefore the synthesis of pyrido[1,2-a]benzimidazoles (4) by a transition-metal-catalyzed intramolecular CH amination approach from N-arylpyridin-2-amines (3) was explored (Scheme 1).
Resumo:
In this chapter, we discuss four related areas of cryptology, namely, authentication, hashing, message authentication codes (MACs), and digital signatures. These topics represent active and growing research topics in cryptology. Space limitations allow us to concentrate only on the essential aspects of each topic. The bibliography is intended to supplement our survey. We have selected those items which providean overview of the current state of knowledge in the above areas. Authentication deals with the problem of providing assurance to a receiver that a communicated message originates from a particular transmitter, and that the received message has the same content as the transmitted message. A typical authentication scenario occurs in computer networks, where the identity of two communicating entities is established by means of authentication. Hashing is concerned with the problem of providing a relatively short digest–fingerprint of a much longer message or electronic document. A hashing function must satisfy (at least) the critical requirement that the fingerprints of two distinct messages are distinct. Hashing functions have numerous applications in cryptology. They are often used as primitives to construct other cryptographic functions. MACs are symmetric key primitives that provide message integrity against active spoofing by appending a cryptographic checksum to a message that is verifiable only by the intended recipient of the message. Message authentication is one of the most important ways of ensuring the integrity of information that is transferred by electronic means. Digital signatures provide electronic equivalents of handwritten signatures. They preserve the essential features of handwritten signatures and can be used to sign electronic documents. Digital signatures can potentially be used in legal contexts.
Resumo:
In this chapter we continue the exposition of crypto topics that was begun in the previous chapter. This chapter covers secret sharing, threshold cryptography, signature schemes, and finally quantum key distribution and quantum cryptography. As in the previous chapter, we have focused only on the essentials of each topic. We have selected in the bibliography a list of representative items, which can be consulted for further details. First we give a synopsis of the topics that are discussed in this chapter. Secret sharing is concerned with the problem of how to distribute a secret among a group of participating individuals, or entities, so that only predesignated collections of individuals are able to recreate the secret by collectively combining the parts of the secret that were allocated to them. There are numerous applications of secret-sharing schemes in practice. One example of secret sharing occurs in banking. For instance, the combination to a vault may be distributed in such a way that only specified collections of employees can open the vault by pooling their portions of the combination. In this way the authority to initiate an action, e.g., the opening of a bank vault, is divided for the purposes of providing security and for added functionality, such as auditing, if required. Threshold cryptography is a relatively recently studied area of cryptography. It deals with situations where the authority to initiate or perform cryptographic operations is distributed among a group of individuals. Many of the standard operations of single-user cryptography have counterparts in threshold cryptography. Signature schemes deal with the problem of generating and verifying electronic) signatures for documents.Asubclass of signature schemes is concerned with the shared-generation and the sharedverification of signatures, where a collaborating group of individuals are required to perform these actions. A new paradigm of security has recently been introduced into cryptography with the emergence of the ideas of quantum key distribution and quantum cryptography. While classical cryptography employs various mathematical techniques to restrict eavesdroppers from learning the contents of encrypted messages, in quantum cryptography the information is protected by the laws of physics.
Resumo:
Background The epidemiology of dengue in the South Pacific has been characterized by transmission of a single dominant serotype for 3–5 years, with subsequent replacement by another serotype. From 2001 to 2008 only DENV-1 was reported in the Pacific. In 2008, DENV-4 emerged and quickly displaced DENV-1 in the Pacific, except in New Caledonia (NC) where DENV-1 and DENV-4 co-circulated in 2008–2009. During 2012–2013, another DENV-1 outbreak occurred in NC, the third DENV-1 outbreak in a decade. Given that dengue is a serotype-specific immunizing infection, the recurrent outbreaks of a single serotype within a 10-year period was unexpected. Findings This study aimed to inform this phenomenon by examining the phylogenetic characteristics of the DENV-1 viruses in NC and other Pacific islands between 2001 and 2013. As a result, we have demonstrated that NC experienced introductions of viruses from both the Pacific (genotype IV) and South-east Asia (genotype I). Moreover, whereas genotype IV and I were co-circulating at the beginning of 2012, we observed that from the second half of 2012, i.e. during the major DENV-1 outbreak, all analyzed viruses were genotype I suggesting that a genotype switch occurred. Conclusions Repeated outbreaks of the same dengue serotype, as observed in NC, is uncommon in the Pacific islands. Why the earlier DENV-1 outbreaks did not induce sufficient herd immunity is unclear, and likely multifactorial, but the robust vector control program may have played a role by limiting transmission and thus maintaining a large susceptible pool in the population. Keywords: Dengue; Phylogeny; Genotype; Epidemics; New Caledonia
Resumo:
We have used electronic structure calculations to investigate the 1,2-dehydration of alcohols as a model for water loss during the pyrolysis of carbohydrates found in biomass. Reaction enthalpies and energy barriers have been calculated for neat alcohols, protonated alcohols and alcohols complexed to alkali metal ions (Li + and Na +). We have estimated pre-exponential A factors in order to obtain gas phase rate constants. For neat alcohols, the barrier to 1,2-dehydration is about 67 kcal mol -1, which is consistent with the limited experimental data. Protonation and metal complexation significantly reduce this activation barrier and thus, facilitate more rapid reaction. With the addition of alkali metals, the rate of dehydration can increase by a factor of 10 8 while addition of a proton can lead to an increase of a factor of 10 23.
Resumo:
Two lecture notes describe recent developments of evolutionary multi objective optimization (MO) techniques in detail and their advantages and drawbacks compared to traditional deterministic optimisers. The role of Game Strategies (GS), such as Pareto, Nash or Stackelberg games as companions or pre-conditioners of Multi objective Optimizers is presented and discussed on simple mathematical functions in Part I , as well as their implementations on simple aeronautical model optimisation problems on the computer using a friendly design framework in Part II. Real life (robust) design applications dealing with UAVs systems or Civil Aircraft and using the EAs and Game Strategies combined material of Part I & Part II are solved and discussed in Part III providing the designer new compromised solutions useful to digital aircraft design and manufacturing. Many details related to Lectures notes Part I, Part II and Part III can be found by the reader in [68].
Resumo:
Database watermarking has received significant research attention in the current decade. Although, almost all watermarking models have been either irreversible (the original relation cannot be restored from the watermarked relation) and/or non-blind (requiring original relation to detect the watermark in watermarked relation). This model has several disadvantages over reversible and blind watermarking (requiring only watermarked relation and secret key from which the watermark is detected and original relation is restored) including inability to identify rightful owner in case of successful secondary watermarking, inability to revert the relation to original data set (required in high precision industries) and requirement to store unmarked relation at a secure secondary storage. To overcome these problems, we propose a watermarking scheme that is reversible as well as blind. We utilize difference expansion on integers to achieve reversibility. The major advantages provided by our scheme are reversibility to high quality original data set, rightful owner identification, resistance against secondary watermarking attacks, and no need to store original database at a secure secondary storage.
Resumo:
The Comment by Mayers and Reiter criticizes our work on two counts. Firstly, it is claimed that the quantum decoherence effects that we report in consequence of our experimental analysis of neutron Compton scattering from H in gaseous H2 are not, as we maintain, outside the framework of conventional neutron scatteringtheory. Secondly, it is claimed that we did not really observe such effects, owing to a faulty analysis of the experimental data, which are claimed to be in agreement with conventional theory. We focus in this response on the critical issue of the reliability of our experimental results and analysis. Using the same standard Vesuvio instrument programs used by Mayers et al., we show that, if the experimental results for H in gaseous H2 are in agreement with conventional theory, then those for D in gaseous D2 obtained in the same way cannot be, and vice-versa. We expose a flaw in the calibration methodology used by Mayers et al. that leads to the present disagreement over the behaviour of H, namely the ad hoc adjustment of the measured H peak positions in TOF during the calibration of Vesuvio so that agreement is obtained with the expectation of conventional theory. We briefly address the question of the necessity to apply the theory of open quantum systems.