976 resultados para Functions of letters
Resumo:
Progression of liver fibrosis to HCC (hepatocellular carcinoma) is a very complex process which involves several pathological phenomena, including hepatic stellate cell activation, inflammation, fibrosis and angiogenesis. Therefore inhibiting multiple pathological processes using a single drug can be an effective choice to curb the progression of HCC. In the present study, we used the mTOR inhibitor everolimus to observe its effect on the in vitro activation of hepatic stellate cells and angiogenesis. The results of the present study demonstrated that everolimus treatment blocked the functions of the immortalized human activated hepatic stellate cell line LX-2 without affecting the viability and migration of primary human stellate cells. We also observed that treatment with everolimus (20 nM) inhibited collagen production by activated stellate cells, as well as cell contraction. Everolimus treatment was also able to attenuate the activation of primary stellate cells to their activated form. Angiogenesis studies showed that everolimus blocked angiogenesis in a rat aortic ring assay and inhibited the tube formation and migration of liver sinusoidal endothelial cells. Finally, everolimus treatment reduced the load of tumoral myofibroblasts in a rat model of HCC. These data suggest that everolimus targets multiple mechanisms, making it a potent blocker of the progression of HCC from liver fibrosis.
Resumo:
In this work, the algebraic properties of the local transition functions of elementary cellular automata (ECA) were analysed. Specifically, a classification of such cellular automata was done according to their algebraic degree, the balancedness, the resiliency, nonlinearity, the propagation criterion and the existence of non-zero linear structures. It is shown that there is not any ECA satisfying all properties at the same time.
Resumo:
El extraordinario auge de las nuevas tecnologías de la información, el desarrollo de la Internet de las Cosas, el comercio electrónico, las redes sociales, la telefonía móvil y la computación y almacenamiento en la nube, han proporcionado grandes beneficios en todos los ámbitos de la sociedad. Junto a éstos, se presentan nuevos retos para la protección y privacidad de la información y su contenido, como la suplantación de personalidad y la pérdida de la confidencialidad e integridad de los documentos o las comunicaciones electrónicas. Este hecho puede verse agravado por la falta de una frontera clara que delimite el mundo personal del mundo laboral en cuanto al acceso de la información. En todos estos campos de la actividad personal y laboral, la Criptografía ha jugado un papel fundamental aportando las herramientas necesarias para garantizar la confidencialidad, integridad y disponibilidad tanto de la privacidad de los datos personales como de la información. Por otro lado, la Biometría ha propuesto y ofrecido diferentes técnicas con el fin de garantizar la autentificación de individuos a través del uso de determinadas características personales como las huellas dáctilares, el iris, la geometría de la mano, la voz, la forma de caminar, etc. Cada una de estas dos ciencias, Criptografía y Biometría, aportan soluciones a campos específicos de la protección de datos y autentificación de usuarios, que se verían enormemente potenciados si determinadas características de ambas ciencias se unieran con vistas a objetivos comunes. Por ello es imperativo intensificar la investigación en estos ámbitos combinando los algoritmos y primitivas matemáticas de la Criptografía con la Biometría para dar respuesta a la demanda creciente de nuevas soluciones más técnicas, seguras y fáciles de usar que potencien de modo simultáneo la protección de datos y la identificacíón de usuarios. En esta combinación el concepto de biometría cancelable ha supuesto una piedra angular en el proceso de autentificación e identificación de usuarios al proporcionar propiedades de revocación y cancelación a los ragos biométricos. La contribución de esta tesis se basa en el principal aspecto de la Biometría, es decir, la autentificación segura y eficiente de usuarios a través de sus rasgos biométricos, utilizando tres aproximaciones distintas: 1. Diseño de un esquema criptobiométrico borroso que implemente los principios de la biometría cancelable para identificar usuarios lidiando con los problemas acaecidos de la variabilidad intra e inter-usuarios. 2. Diseño de una nueva función hash que preserva la similitud (SPHF por sus siglas en inglés). Actualmente estas funciones se usan en el campo del análisis forense digital con el objetivo de buscar similitudes en el contenido de archivos distintos pero similares de modo que se pueda precisar hasta qué punto estos archivos pudieran ser considerados iguales. La función definida en este trabajo de investigación, además de mejorar los resultados de las principales funciones desarrolladas hasta el momento, intenta extender su uso a la comparación entre patrones de iris. 3. Desarrollando un nuevo mecanismo de comparación de patrones de iris que considera tales patrones como si fueran señales para compararlos posteriormente utilizando la transformada de Walsh-Hadarmard. Los resultados obtenidos son excelentes teniendo en cuenta los requerimientos de seguridad y privacidad mencionados anteriormente. Cada uno de los tres esquemas diseñados han sido implementados para poder realizar experimentos y probar su eficacia operativa en escenarios que simulan situaciones reales: El esquema criptobiométrico borroso y la función SPHF han sido implementados en lenguaje Java mientras que el proceso basado en la transformada de Walsh-Hadamard en Matlab. En los experimentos se ha utilizado una base de datos de imágenes de iris (CASIA) para simular una población de usuarios del sistema. En el caso particular de la función de SPHF, además se han realizado experimentos para comprobar su utilidad en el campo de análisis forense comparando archivos e imágenes con contenido similar y distinto. En este sentido, para cada uno de los esquemas se han calculado los ratios de falso negativo y falso positivo. ABSTRACT The extraordinary increase of new information technologies, the development of Internet of Things, the electronic commerce, the social networks, mobile or smart telephony and cloud computing and storage, have provided great benefits in all areas of society. Besides this fact, there are new challenges for the protection and privacy of information and its content, such as the loss of confidentiality and integrity of electronic documents and communications. This is exarcebated by the lack of a clear boundary between the personal world and the business world as their differences are becoming narrower. In both worlds, i.e the personal and the business one, Cryptography has played a key role by providing the necessary tools to ensure the confidentiality, integrity and availability both of the privacy of the personal data and information. On the other hand, Biometrics has offered and proposed different techniques with the aim to assure the authentication of individuals through their biometric traits, such as fingerprints, iris, hand geometry, voice, gait, etc. Each of these sciences, Cryptography and Biometrics, provides tools to specific problems of the data protection and user authentication, which would be widely strengthen if determined characteristics of both sciences would be combined in order to achieve common objectives. Therefore, it is imperative to intensify the research in this area by combining the basics mathematical algorithms and primitives of Cryptography with Biometrics to meet the growing demand for more secure and usability techniques which would improve the data protection and the user authentication. In this combination, the use of cancelable biometrics makes a cornerstone in the user authentication and identification process since it provides revocable or cancelation properties to the biometric traits. The contributions in this thesis involve the main aspect of Biometrics, i.e. the secure and efficient authentication of users through their biometric templates, considered from three different approaches. The first one is designing a fuzzy crypto-biometric scheme using the cancelable biometric principles to take advantage of the fuzziness of the biometric templates at the same time that it deals with the intra- and inter-user variability among users without compromising the biometric templates extracted from the legitimate users. The second one is designing a new Similarity Preserving Hash Function (SPHF), currently widely used in the Digital Forensics field to find similarities among different files to calculate their similarity level. The function designed in this research work, besides the fact of improving the results of the two main functions of this field currently in place, it tries to expand its use to the iris template comparison. Finally, the last approach of this thesis is developing a new mechanism of handling the iris templates, considering them as signals, to use the Walsh-Hadamard transform (complemented with three other algorithms) to compare them. The results obtained are excellent taking into account the security and privacy requirements mentioned previously. Every one of the three schemes designed have been implemented to test their operational efficacy in situations that simulate real scenarios: The fuzzy crypto-biometric scheme and the SPHF have been implemented in Java language, while the process based on the Walsh-Hadamard transform in Matlab. The experiments have been performed using a database of iris templates (CASIA-IrisV2) to simulate a user population. The case of the new SPHF designed is special since previous to be applied i to the Biometrics field, it has been also tested to determine its applicability in the Digital Forensic field comparing similar and dissimilar files and images. The ratios of efficiency and effectiveness regarding user authentication, i.e. False Non Match and False Match Rate, for the schemes designed have been calculated with different parameters and cases to analyse their behaviour.
Resumo:
Saccharomyces cerevisiae is dimorphic and switches from a yeast form to a pseudohyphal (PH) form when starved for nitrogen. PH cells are elongated, bud in a unipolar manner, and invade the agar substrate. We assessed the requirements for actin in mediating the dramatic morphogenetic events that accompany the transition to PH growth. Twelve “alanine scan” alleles of the single yeast actin gene (ACT1) were tested for effects on filamentation, unipolar budding, agar invasion, and cell elongation. Some act1 mutations affect all phenotypes, whereas others affect only one or two aspects of PH growth. Tests of intragenic complementation among specific act1 mutations support the phenotypic evidence for multiple actin functions in filamentous growth. We present evidence that interaction between actin and the actin-binding protein fimbrin is important for PH growth and suggest that association of different actin-binding proteins with actin mediates the multiple functions of actin in filamentous growth. Furthermore, characterization of cytoskeletal structure in wild type and act1/act1 mutants indicates that PH cell morphogenesis requires the maintenance of a highly polarized actin cytoskeleton. Collectively, this work demonstrates that actin plays a central role in fungal dimorphism.
Resumo:
Rom2p is a GDP/GTP exchange factor for Rho1p and Rho2p GTPases; Rho proteins have been implicated in control of actin cytoskeletal rearrangements. ROM2 and RHO2 were identified in a screen for high-copy number suppressors of cik1Δ, a mutant defective in microtubule-based processes in Saccharomyces cerevisiae. A Rom2p::3XHA fusion protein localizes to sites of polarized cell growth, including incipient bud sites, tips of small buds, and tips of mating projections. Disruption of ROM2 results in temperature-sensitive growth defects at 11°C and 37°C. rom2Δ cells exhibit morphological defects. At permissive temperatures, rom2Δ cells often form elongated buds and fail to form normal mating projections after exposure to pheromone; at the restrictive temperature, small budded cells accumulate. High-copy number plasmids containing either ROM2 or RHO2 suppress the temperature-sensitive growth defects of cik1Δ and kar3Δ strains. KAR3 encodes a kinesin-related protein that interacts with Cik1p. Furthermore, rom2Δ strains exhibit increased sensitivity to the microtubule depolymerizing drug benomyl. These results suggest a role for Rom2p in both polarized morphogenesis and functions of the microtubule cytoskeleton.
Resumo:
Although extensively studied biochemically, members of the Protein 4.1 superfamily have not been as well characterized genetically. Studies of coracle, a Drosophila Protein 4.1 homologue, provide an opportunity to examine the genetic functions of this gene family. coracle was originally identified as a dominant suppressor of EgfrElp, a hypermorphic form of the Drosophila Epidermal growth factor receptor gene. In this article, we present a phenotypic analysis of coracle, one of the first for a member of the Protein 4.1 superfamily. Screens for new coracle alleles confirm the null coracle phenotype of embryonic lethality and failure in dorsal closure, and they identify additional defects in the embryonic epidermis and salivary glands. Hypomorphic coracle alleles reveal functions in many imaginal tissues. Analysis of coracle mutant cells indicates that Coracle is a necessary structural component of the septate junction required for the maintenance of the transepithelial barrier but is not necessary for apical–basal polarity, epithelial integrity, or cytoskeletal integrity. In addition, coracle phenotypes suggest a specific role in cell signaling events. Finally, complementation analysis provides information regarding the functional organization of Coracle and possibly other Protein 4.1 superfamily members. These studies provide insights into a range of in vivo functions for coracle in developing embryos and adults.
Resumo:
Although much of the brain’s functional organization is genetically predetermined, it appears that some noninnate functions can come to depend on dedicated and segregated neural tissue. In this paper, we describe a series of experiments that have investigated the neural development and organization of one such noninnate function: letter recognition. Functional neuroimaging demonstrates that letter and digit recognition depend on different neural substrates in some literate adults. How could the processing of two stimulus categories that are distinguished solely by cultural conventions become segregated in the brain? One possibility is that correlation-based learning in the brain leads to a spatial organization in cortex that reflects the temporal and spatial clustering of letters with letters in the environment. Simulations confirm that environmental co-occurrence does indeed lead to spatial localization in a neural network that uses correlation-based learning. Furthermore, behavioral studies confirm one critical prediction of this co-occurrence hypothesis, namely, that subjects exposed to a visual environment in which letters and digits occur together rather than separately (postal workers who process letters and digits together in Canadian postal codes) do indeed show less behavioral evidence for segregated letter and digit processing.
Resumo:
In the 7 years since dynamin was first isolated from bovine brain in search of novel microtubule-based motors, our understanding of this enzyme has expanded significantly. We now know that brain dynamin belongs to a family of large GTPases, which mediate vesicle trafficking. Furthermore, this enzymatic activity is markedly increased through association with microtubules, acidic phospholipids, and certain regulatory proteins that contain Src homology 3 (SH3) domains. From functional, genetic, and cellular manipulations, it is now generally accepted that dynamin participates in the endocytic uptake of receptors, associated ligands, and plasma membrane following an exocytic event. These observations have confirmed at least one function of dynamin that was predicted from seminal studies on a pleiotropic mutant, shibirets (shits) in Drosophila melanogaster. Of equal interest is the finding that there are multiple dynamin gene products, including two that are expressed in a tissue-specific manner, and they share marked homology with a larger family of distinct but related proteins. Therefore, it is attractive to speculate that the different dynamins may participate in related cellular functions, such as distinct endocytic processes and even secretion. In turn, dynamin could play an important role in cell growth, cell spreading, and neurite outgrowth. The purpose of this review is to enumerate on the expansive dynamin literature and to discuss the nomenclature, expression, and putative functions of this growing and interesting family of proteins.
Resumo:
The proper placement of the Escherichia coli division septum requires the MinE protein. MinE accomplishes this by imparting topological specificity to a division inhibitor coded by the minC and minD genes. As a result, the division inhibitor prevents septation at potential division sites that exist at the cell poles but permits septation at the normal division site at midcell. In this paper, we define two functions of MinE that are required for this effect and present evidence that different domains within the 88-amino acid MinE protein are responsible for each of these two functions. The first domain, responsible for the ability of MinE to counteract the activity of the MinCD division inhibitor, is located in a small region near the N terminus of the protein. The second domain, required for the topological specificity of MinE function, is located in the more distal region of the protein and affects the site specificity of placement of the division septum even when separated from the domain responsible for suppression of the activity of the division inhibitor.
Resumo:
Paper notebook containing copies of letters sent by Croswell to the Harvard Corporation in relation to his work on the Harvard Library Catalogue.
Resumo:
On Sabbath desecration by the companies: revised and expanded version of letters "published about a year ago in one of the newspapers of Trenton."
Resumo:
Abridgment of Letters from Edinburgh, written in the years 1774 and 1775
Resumo:
"This volume comprises a selection of letters and essays, written by me, and addressed to the demerits of protection, from 1842 to 1847, inclusive. The two succeeding volumes are a biographic history of free trade and the League. They embrace memoirs of persons identified with the rise and progress of commerce and constitutional liberty, from earliest English history to 1850."-Dedication to vol. 1.
Resumo:
Vol. 3 has title: Francia's reign of terror, being the continuation of Letters on Paraguay ... In three volumes ...
Resumo:
"A dialogue between a man of letters, and M. J.J. Rousseau, on the subject of romances. Published since his Eloisa, and intended as a preface to that work."--v. 1, p. [ix]-xxix.