888 resultados para whether binding on non-associated third party payer
Resumo:
Contraction of cardiac muscle is regulated through the Ca2+ dependent protein-protein interactions of the troponin complex (Tn). The critical role cardiac troponin C (cTnC) plays as the Ca2+ receptor in this complex makes it an attractive target for positive inotropic compounds. In this study, the ten Met methyl groups in cTnC, [98% 13C ϵ]-Met cTnC, are used as structural markers to monitor conformational changes in cTnC and identify sites of interaction between cTnC and cardiac troponin I (cTnI) responsible for the Ca2+ dependent interactions. In addition the structural consequences that a number of Ca2+-sensitizing compounds have on free cTnC and the cTnC·cTnI complex were characterized. Using heteronuclear NMR experiments and monitoring chemical shift changes in the ten Met methyl 1H-13C correlations in 3Ca2+ cTnC when bound to cTnI revealed an anti-parallel arrangement for the two proteins such that the N-domain of cTnI interacts with the C-domain of cTnC. The large chemical shifts in Mets-81, -120, and -157 identified points of contact between the proteins that include the C-domain hydrophobic surface in cTnC and the A, B, and D helical interface located in the regulatory N-domain of cTnC. TnI association [cTnI(33–80), cTnI(86–211), or cTnI(33–211)] was found also to dramatically reduce flexibility in the D/E central linker of cTnC as monitored by line broadening in the Met 1H- 13C correlations of cTnC induced by a nitroxide spin label, MTSSL, covalently attached to cTnC at Cys 84. TnI association resulted in an extended cTnC that is unlike the compact structure observed for free cTnC. The Met 1H-13C correlations also allowed the binding characteristics of bepridil, TFP, levosimendan, and EMD 57033 to the apo, 2Ca2+, and Ca2+ saturated forms of cTnC to be determined. In addition, the location of drug binding on the 3Ca2+cTnC·cTnI complex was identified for bepridil and TFP. Use of a novel spin-labeled phenothiazine, and detection of isotope filtered NOEs, allowed identification of drug binding sites in the shallow hydrophobic cup in the C-terminal domain, and on two hydrophobic surfaces on N-regulatory domain in free 3Ca2+ cTnC. In contrast, only one N-domain drug binding site exists in 3Ca2+ cTnC·cTnI complex. The methyl groups of Met 45, 60 and 80, which are grouped in a hydrophobic patch near site II in cTnC, showed the greatest change upon titration with bepridil or TFP, suggesting that this is a critical site of drug binding in both free cTnC and when associated with cTnI. The strongest NOEs were seen for Met-60 and -80, which are located on helices C and D, respectively, of Ca2+ binding site II. These results support the conclusion that the small hydrophobic patch which includes Met-45, -60, and -80 constitutes a drug binding site, and that binding drugs to this site will lead to an increase in Ca2+ binding affinity of site II while preserving maximal cTnC activity. Thus, the subregion in cTnC makes a likely target against which to design new and selective Ca2+-sensitizing compounds. ^
Resumo:
The predictable in situ production of 230Th from the decay of uranium in seawater, and its subsequent removal by scavenging onto falling particles, provides a valuable tool for normalizing fluxes to the seafloor. We describe a new application, determination of the 232Th that dissolves in the water column and is removed to the seafloor. 232Th is supplied to the ocean in continental minerals, dissolution of which leads to a measurable standing stock in the water column. Sedimentary adsorbed 232Th/230Th ratios have the potential to provide a proxy for estimating the amount of dissolved material that enters the ocean, both today and in the past. Ten core top samples were treated with up to eight different leaching techniques in order to determine the best method for the separating adsorbed from lattice bound thorium. In addition, separate components of the sediments were analyzed to test whether clay dissolution was an important contribution to the final measurement. There was no systematic correlation between the strength of acid used in the leach and the measured 232Th/230Th ratios. In all cases clean foraminifera produced the same ratio as leaches on bulk sediment. In three out of five samples leaches performed on non-carbonate detritus in the <63 µm size fraction were also identical. Without additional water column data it is not yet clear whether there is a simple one to one correlation between the expected deep-water 232Th/230Th and that produced by leaching, especially in carbonate-rich sediments. However, higher ratios, and associated high 232Th adsorbed fluxes, were observed in areas with high expected detrital inputs. The adsorbed fraction was ~35-50% of the total 232Th in seven out of ten samples. Our 230Th normalized 232Th fluxes are reasonable by comparison to global estimates of detrital inputs to the ocean. In nine cases out of ten, the total 230Th-normalized 232Th flux is greater than predicted from the annual dust fall at each specific location, but lower than the average global detrital input from all sources.
Resumo:
Predictions about the ecological consequences of oceanic uptake of CO2 have been preoccupied with the effects of ocean acidification on calcifying organisms, particularly those critical to the formation of habitats (e.g. coral reefs) or their maintenance (e.g. grazing echinoderms). This focus overlooks the direct effects of CO2 on non-calcareous taxa, particularly those that play critical roles in ecosystem shifts. We used two experiments to investigate whether increased CO2 could exacerbate kelp loss by facilitating non-calcareous algae that, we hypothesized, (i) inhibit the recovery of kelp forests on an urbanized coast, and (ii) form more extensive covers and greater biomass under moderate future CO2 and associated temperature increases. Our experimental removal of turfs from a phase-shifted system (i.e. kelp- to turf-dominated) revealed that the number of kelp recruits increased, thereby indicating that turfs can inhibit kelp recruitment. Future CO2 and temperature interacted synergistically to have a positive effect on the abundance of algal turfs, whereby they had twice the biomass and occupied over four times more available space than under current conditions. We suggest that the current preoccupation with the negative effects of ocean acidification on marine calcifiers overlooks potentially profound effects of increasing CO2 and temperature on non-calcifying organisms.
Resumo:
Although the sequential execution speed of logic programs has been greatly improved by the concepts introduced in the Warren Abstract Machine (WAM), parallel execution represents the only way to increase this speed beyond the natural limits of sequential systems. However, most proposed parallel logic programming execution models lack the performance optimizations and storage efficiency of sequential systems. This paper presents a parallel abstract machine which is an extension of the WAM and is thus capable of supporting ANDParallelism without giving up the optimizations present in sequential implementations. A suitable instruction set, which can be used as a target by a variety of logic programming languages, is also included. Special instructions are provided to support a generalized version of "Restricted AND-Parallelism" (RAP), a technique which reduces the overhead traditionally associated with the run-time management of variable binding conflicts to a series of simple run-time checks, which select one out of a series of compiled execution graphs.
Resumo:
Esta tesis doctoral se centra principalmente en técnicas de ataque y contramedidas relacionadas con ataques de canal lateral (SCA por sus siglas en inglés), que han sido propuestas dentro del campo de investigación académica desde hace 17 años. Las investigaciones relacionadas han experimentado un notable crecimiento en las últimas décadas, mientras que los diseños enfocados en la protección sólida y eficaz contra dichos ataques aún se mantienen como un tema de investigación abierto, en el que se necesitan iniciativas más confiables para la protección de la información persona de empresa y de datos nacionales. El primer uso documentado de codificación secreta se remonta a alrededor de 1700 B.C., cuando los jeroglíficos del antiguo Egipto eran descritos en las inscripciones. La seguridad de la información siempre ha supuesto un factor clave en la transmisión de datos relacionados con inteligencia diplomática o militar. Debido a la evolución rápida de las técnicas modernas de comunicación, soluciones de cifrado se incorporaron por primera vez para garantizar la seguridad, integridad y confidencialidad de los contextos de transmisión a través de cables sin seguridad o medios inalámbricos. Debido a las restricciones de potencia de cálculo antes de la era del ordenador, la técnica de cifrado simple era un método más que suficiente para ocultar la información. Sin embargo, algunas vulnerabilidades algorítmicas pueden ser explotadas para restaurar la regla de codificación sin mucho esfuerzo. Esto ha motivado nuevas investigaciones en el área de la criptografía, con el fin de proteger el sistema de información ante sofisticados algoritmos. Con la invención de los ordenadores se ha acelerado en gran medida la implementación de criptografía segura, que ofrece resistencia eficiente encaminada a obtener mayores capacidades de computación altamente reforzadas. Igualmente, sofisticados cripto-análisis han impulsado las tecnologías de computación. Hoy en día, el mundo de la información ha estado involucrado con el campo de la criptografía, enfocada a proteger cualquier campo a través de diversas soluciones de cifrado. Estos enfoques se han fortalecido debido a la unificación optimizada de teorías matemáticas modernas y prácticas eficaces de hardware, siendo posible su implementación en varias plataformas (microprocesador, ASIC, FPGA, etc.). Las necesidades y requisitos de seguridad en la industria son las principales métricas de conducción en el diseño electrónico, con el objetivo de promover la fabricación de productos de gran alcance sin sacrificar la seguridad de los clientes. Sin embargo, una vulnerabilidad en la implementación práctica encontrada por el Prof. Paul Kocher, et al en 1996 implica que un circuito digital es inherentemente vulnerable a un ataque no convencional, lo cual fue nombrado posteriormente como ataque de canal lateral, debido a su fuente de análisis. Sin embargo, algunas críticas sobre los algoritmos criptográficos teóricamente seguros surgieron casi inmediatamente después de este descubrimiento. En este sentido, los circuitos digitales consisten típicamente en un gran número de celdas lógicas fundamentales (como MOS - Metal Oxide Semiconductor), construido sobre un sustrato de silicio durante la fabricación. La lógica de los circuitos se realiza en función de las innumerables conmutaciones de estas células. Este mecanismo provoca inevitablemente cierta emanación física especial que puede ser medida y correlacionada con el comportamiento interno del circuito. SCA se puede utilizar para revelar datos confidenciales (por ejemplo, la criptografía de claves), analizar la arquitectura lógica, el tiempo e incluso inyectar fallos malintencionados a los circuitos que se implementan en sistemas embebidos, como FPGAs, ASICs, o tarjetas inteligentes. Mediante el uso de la comparación de correlación entre la cantidad de fuga estimada y las fugas medidas de forma real, información confidencial puede ser reconstruida en mucho menos tiempo y computación. Para ser precisos, SCA básicamente cubre una amplia gama de tipos de ataques, como los análisis de consumo de energía y radiación ElectroMagnética (EM). Ambos se basan en análisis estadístico y, por lo tanto, requieren numerosas muestras. Los algoritmos de cifrado no están intrínsecamente preparados para ser resistentes ante SCA. Es por ello que se hace necesario durante la implementación de circuitos integrar medidas que permitan camuflar las fugas a través de "canales laterales". Las medidas contra SCA están evolucionando junto con el desarrollo de nuevas técnicas de ataque, así como la continua mejora de los dispositivos electrónicos. Las características físicas requieren contramedidas sobre la capa física, que generalmente se pueden clasificar en soluciones intrínsecas y extrínsecas. Contramedidas extrínsecas se ejecutan para confundir la fuente de ataque mediante la integración de ruido o mala alineación de la actividad interna. Comparativamente, las contramedidas intrínsecas están integradas en el propio algoritmo, para modificar la aplicación con el fin de minimizar las fugas medibles, o incluso hacer que dichas fugas no puedan ser medibles. Ocultación y Enmascaramiento son dos técnicas típicas incluidas en esta categoría. Concretamente, el enmascaramiento se aplica a nivel algorítmico, para alterar los datos intermedios sensibles con una máscara de manera reversible. A diferencia del enmascaramiento lineal, las operaciones no lineales que ampliamente existen en criptografías modernas son difíciles de enmascarar. Dicho método de ocultación, que ha sido verificado como una solución efectiva, comprende principalmente la codificación en doble carril, que está ideado especialmente para aplanar o eliminar la fuga dependiente de dato en potencia o en EM. En esta tesis doctoral, además de la descripción de las metodologías de ataque, se han dedicado grandes esfuerzos sobre la estructura del prototipo de la lógica propuesta, con el fin de realizar investigaciones enfocadas a la seguridad sobre contramedidas de arquitectura a nivel lógico. Una característica de SCA reside en el formato de las fuentes de fugas. Un típico ataque de canal lateral se refiere al análisis basado en la potencia, donde la capacidad fundamental del transistor MOS y otras capacidades parásitas son las fuentes esenciales de fugas. Por lo tanto, una lógica robusta resistente a SCA debe eliminar o mitigar las fugas de estas micro-unidades, como las puertas lógicas básicas, los puertos I/O y las rutas. Las herramientas EDA proporcionadas por los vendedores manipulan la lógica desde un nivel más alto, en lugar de realizarlo desde el nivel de puerta, donde las fugas de canal lateral se manifiestan. Por lo tanto, las implementaciones clásicas apenas satisfacen estas necesidades e inevitablemente atrofian el prototipo. Por todo ello, la implementación de un esquema de diseño personalizado y flexible ha de ser tomado en cuenta. En esta tesis se presenta el diseño y la implementación de una lógica innovadora para contrarrestar SCA, en la que se abordan 3 aspectos fundamentales: I. Se basa en ocultar la estrategia sobre el circuito en doble carril a nivel de puerta para obtener dinámicamente el equilibrio de las fugas en las capas inferiores; II. Esta lógica explota las características de la arquitectura de las FPGAs, para reducir al mínimo el gasto de recursos en la implementación; III. Se apoya en un conjunto de herramientas asistentes personalizadas, incorporadas al flujo genérico de diseño sobre FPGAs, con el fin de manipular los circuitos de forma automática. El kit de herramientas de diseño automático es compatible con la lógica de doble carril propuesta, para facilitar la aplicación práctica sobre la familia de FPGA del fabricante Xilinx. En este sentido, la metodología y las herramientas son flexibles para ser extendido a una amplia gama de aplicaciones en las que se desean obtener restricciones mucho más rígidas y sofisticadas a nivel de puerta o rutado. En esta tesis se realiza un gran esfuerzo para facilitar el proceso de implementación y reparación de lógica de doble carril genérica. La viabilidad de las soluciones propuestas es validada mediante la selección de algoritmos criptográficos ampliamente utilizados, y su evaluación exhaustiva en comparación con soluciones anteriores. Todas las propuestas están respaldadas eficazmente a través de ataques experimentales con el fin de validar las ventajas de seguridad del sistema. El presente trabajo de investigación tiene la intención de cerrar la brecha entre las barreras de implementación y la aplicación efectiva de lógica de doble carril. En esencia, a lo largo de esta tesis se describirá un conjunto de herramientas de implementación para FPGAs que se han desarrollado para trabajar junto con el flujo de diseño genérico de las mismas, con el fin de lograr crear de forma innovadora la lógica de doble carril. Un nuevo enfoque en el ámbito de la seguridad en el cifrado se propone para obtener personalización, automatización y flexibilidad en el prototipo de circuito de bajo nivel con granularidad fina. Las principales contribuciones del presente trabajo de investigación se resumen brevemente a continuación: Lógica de Precharge Absorbed-DPL logic: El uso de la conversión de netlist para reservar LUTs libres para ejecutar la señal de precharge y Ex en una lógica DPL. Posicionamiento entrelazado Row-crossed con pares idénticos de rutado en redes de doble carril, lo que ayuda a aumentar la resistencia frente a la medición EM selectiva y mitigar los impactos de las variaciones de proceso. Ejecución personalizada y herramientas de conversión automática para la generación de redes idénticas para la lógica de doble carril propuesta. (a) Para detectar y reparar conflictos en las conexiones; (b) Detectar y reparar las rutas asimétricas. (c) Para ser utilizado en otras lógicas donde se requiere un control estricto de las interconexiones en aplicaciones basadas en Xilinx. Plataforma CPA de pruebas personalizadas para el análisis de EM y potencia, incluyendo la construcción de dicha plataforma, el método de medición y análisis de los ataques. Análisis de tiempos para cuantificar los niveles de seguridad. División de Seguridad en la conversión parcial de un sistema de cifrado complejo para reducir los costes de la protección. Prueba de concepto de un sistema de calefacción auto-adaptativo para mitigar los impactos eléctricos debido a la variación del proceso de silicio de manera dinámica. La presente tesis doctoral se encuentra organizada tal y como se detalla a continuación: En el capítulo 1 se abordan los fundamentos de los ataques de canal lateral, que abarca desde conceptos básicos de teoría de modelos de análisis, además de la implementación de la plataforma y la ejecución de los ataques. En el capítulo 2 se incluyen las estrategias de resistencia SCA contra los ataques de potencia diferencial y de EM. Además de ello, en este capítulo se propone una lógica en doble carril compacta y segura como contribución de gran relevancia, así como también se presentará la transformación lógica basada en un diseño a nivel de puerta. Por otra parte, en el Capítulo 3 se abordan los desafíos relacionados con la implementación de lógica en doble carril genérica. Así mismo, se describirá un flujo de diseño personalizado para resolver los problemas de aplicación junto con una herramienta de desarrollo automático de aplicaciones propuesta, para mitigar las barreras de diseño y facilitar los procesos. En el capítulo 4 se describe de forma detallada la elaboración e implementación de las herramientas propuestas. Por otra parte, la verificación y validaciones de seguridad de la lógica propuesta, así como un sofisticado experimento de verificación de la seguridad del rutado, se describen en el capítulo 5. Por último, un resumen de las conclusiones de la tesis y las perspectivas como líneas futuras se incluyen en el capítulo 6. Con el fin de profundizar en el contenido de la tesis doctoral, cada capítulo se describe de forma más detallada a continuación: En el capítulo 1 se introduce plataforma de implementación hardware además las teorías básicas de ataque de canal lateral, y contiene principalmente: (a) La arquitectura genérica y las características de la FPGA a utilizar, en particular la Xilinx Virtex-5; (b) El algoritmo de cifrado seleccionado (un módulo comercial Advanced Encryption Standard (AES)); (c) Los elementos esenciales de los métodos de canal lateral, que permiten revelar las fugas de disipación correlacionadas con los comportamientos internos; y el método para recuperar esta relación entre las fluctuaciones físicas en los rastros de canal lateral y los datos internos procesados; (d) Las configuraciones de las plataformas de pruebas de potencia / EM abarcadas dentro de la presente tesis. El contenido de esta tesis se amplia y profundiza a partir del capítulo 2, en el cual se abordan varios aspectos claves. En primer lugar, el principio de protección de la compensación dinámica de la lógica genérica de precarga de doble carril (Dual-rail Precharge Logic-DPL) se explica mediante la descripción de los elementos compensados a nivel de puerta. En segundo lugar, la lógica PA-DPL es propuesta como aportación original, detallando el protocolo de la lógica y un caso de aplicación. En tercer lugar, dos flujos de diseño personalizados se muestran para realizar la conversión de doble carril. Junto con ello, se aclaran las definiciones técnicas relacionadas con la manipulación por encima de la netlist a nivel de LUT. Finalmente, una breve discusión sobre el proceso global se aborda en la parte final del capítulo. El Capítulo 3 estudia los principales retos durante la implementación de DPLs en FPGAs. El nivel de seguridad de las soluciones de resistencia a SCA encontradas en el estado del arte se ha degenerado debido a las barreras de implantación a través de herramientas EDA convencionales. En el escenario de la arquitectura FPGA estudiada, se discuten los problemas de los formatos de doble carril, impactos parásitos, sesgo tecnológico y la viabilidad de implementación. De acuerdo con estas elaboraciones, se plantean dos problemas: Cómo implementar la lógica propuesta sin penalizar los niveles de seguridad, y cómo manipular un gran número de celdas y automatizar el proceso. El PA-DPL propuesto en el capítulo 2 se valida con una serie de iniciativas, desde características estructurales como doble carril entrelazado o redes de rutado clonadas, hasta los métodos de aplicación tales como las herramientas de personalización y automatización de EDA. Por otra parte, un sistema de calefacción auto-adaptativo es representado y aplicado a una lógica de doble núcleo, con el fin de ajustar alternativamente la temperatura local para equilibrar los impactos negativos de la variación del proceso durante la operación en tiempo real. El capítulo 4 se centra en los detalles de la implementación del kit de herramientas. Desarrollado sobre una API third-party, el kit de herramientas personalizado es capaz de manipular los elementos de la lógica de circuito post P&R ncd (una versión binaria ilegible del xdl) convertido al formato XDL Xilinx. El mecanismo y razón de ser del conjunto de instrumentos propuestos son cuidadosamente descritos, que cubre la detección de enrutamiento y los enfoques para la reparación. El conjunto de herramientas desarrollado tiene como objetivo lograr redes de enrutamiento estrictamente idénticos para la lógica de doble carril, tanto para posicionamiento separado como para el entrelazado. Este capítulo particularmente especifica las bases técnicas para apoyar las implementaciones en los dispositivos de Xilinx y su flexibilidad para ser utilizado sobre otras aplicaciones. El capítulo 5 se enfoca en la aplicación de los casos de estudio para la validación de los grados de seguridad de la lógica propuesta. Se discuten los problemas técnicos detallados durante la ejecución y algunas nuevas técnicas de implementación. (a) Se discute el impacto en el proceso de posicionamiento de la lógica utilizando el kit de herramientas propuesto. Diferentes esquemas de implementación, tomando en cuenta la optimización global en seguridad y coste, se verifican con los experimentos con el fin de encontrar los planes de posicionamiento y reparación optimizados; (b) las validaciones de seguridad se realizan con los métodos de correlación y análisis de tiempo; (c) Una táctica asintótica se aplica a un núcleo AES sobre BCDL estructurado para validar de forma sofisticada el impacto de enrutamiento sobre métricas de seguridad; (d) Los resultados preliminares utilizando el sistema de calefacción auto-adaptativa sobre la variación del proceso son mostrados; (e) Se introduce una aplicación práctica de las herramientas para un diseño de cifrado completa. Capítulo 6 incluye el resumen general del trabajo presentado dentro de esta tesis doctoral. Por último, una breve perspectiva del trabajo futuro se expone, lo que puede ampliar el potencial de utilización de las contribuciones de esta tesis a un alcance más allá de los dominios de la criptografía en FPGAs. ABSTRACT This PhD thesis mainly concentrates on countermeasure techniques related to the Side Channel Attack (SCA), which has been put forward to academic exploitations since 17 years ago. The related research has seen a remarkable growth in the past decades, while the design of solid and efficient protection still curiously remain as an open research topic where more reliable initiatives are required for personal information privacy, enterprise and national data protections. The earliest documented usage of secret code can be traced back to around 1700 B.C., when the hieroglyphs in ancient Egypt are scribed in inscriptions. Information security always gained serious attention from diplomatic or military intelligence transmission. Due to the rapid evolvement of modern communication technique, crypto solution was first incorporated by electronic signal to ensure the confidentiality, integrity, availability, authenticity and non-repudiation of the transmitted contexts over unsecure cable or wireless channels. Restricted to the computation power before computer era, simple encryption tricks were practically sufficient to conceal information. However, algorithmic vulnerabilities can be excavated to restore the encoding rules with affordable efforts. This fact motivated the development of modern cryptography, aiming at guarding information system by complex and advanced algorithms. The appearance of computers has greatly pushed forward the invention of robust cryptographies, which efficiently offers resistance relying on highly strengthened computing capabilities. Likewise, advanced cryptanalysis has greatly driven the computing technologies in turn. Nowadays, the information world has been involved into a crypto world, protecting any fields by pervasive crypto solutions. These approaches are strong because of the optimized mergence between modern mathematical theories and effective hardware practices, being capable of implement crypto theories into various platforms (microprocessor, ASIC, FPGA, etc). Security needs from industries are actually the major driving metrics in electronic design, aiming at promoting the construction of systems with high performance without sacrificing security. Yet a vulnerability in practical implementation found by Prof. Paul Kocher, et al in 1996 implies that modern digital circuits are inherently vulnerable to an unconventional attack approach, which was named as side-channel attack since then from its analysis source. Critical suspicions to theoretically sound modern crypto algorithms surfaced almost immediately after this discovery. To be specifically, digital circuits typically consist of a great number of essential logic elements (as MOS - Metal Oxide Semiconductor), built upon a silicon substrate during the fabrication. Circuit logic is realized relying on the countless switch actions of these cells. This mechanism inevitably results in featured physical emanation that can be properly measured and correlated with internal circuit behaviors. SCAs can be used to reveal the confidential data (e.g. crypto-key), analyze the logic architecture, timing and even inject malicious faults to the circuits that are implemented in hardware system, like FPGA, ASIC, smart Card. Using various comparison solutions between the predicted leakage quantity and the measured leakage, secrets can be reconstructed at much less expense of time and computation. To be precisely, SCA basically encloses a wide range of attack types, typically as the analyses of power consumption or electromagnetic (EM) radiation. Both of them rely on statistical analyses, and hence require a number of samples. The crypto algorithms are not intrinsically fortified with SCA-resistance. Because of the severity, much attention has to be taken into the implementation so as to assemble countermeasures to camouflage the leakages via "side channels". Countermeasures against SCA are evolving along with the development of attack techniques. The physical characteristics requires countermeasures over physical layer, which can be generally classified into intrinsic and extrinsic vectors. Extrinsic countermeasures are executed to confuse the attacker by integrating noise, misalignment to the intra activities. Comparatively, intrinsic countermeasures are built into the algorithm itself, to modify the implementation for minimizing the measurable leakage, or making them not sensitive any more. Hiding and Masking are two typical techniques in this category. Concretely, masking applies to the algorithmic level, to alter the sensitive intermediate values with a mask in reversible ways. Unlike the linear masking, non-linear operations that widely exist in modern cryptographies are difficult to be masked. Approved to be an effective counter solution, hiding method mainly mentions dual-rail logic, which is specially devised for flattening or removing the data-dependent leakage in power or EM signatures. In this thesis, apart from the context describing the attack methodologies, efforts have also been dedicated to logic prototype, to mount extensive security investigations to countermeasures on logic-level. A characteristic of SCA resides on the format of leak sources. Typical side-channel attack concerns the power based analysis, where the fundamental capacitance from MOS transistors and other parasitic capacitances are the essential leak sources. Hence, a robust SCA-resistant logic must eliminate or mitigate the leakages from these micro units, such as basic logic gates, I/O ports and routings. The vendor provided EDA tools manipulate the logic from a higher behavioral-level, rather than the lower gate-level where side-channel leakage is generated. So, the classical implementations barely satisfy these needs and inevitably stunt the prototype. In this case, a customized and flexible design scheme is appealing to be devised. This thesis profiles an innovative logic style to counter SCA, which mainly addresses three major aspects: I. The proposed logic is based on the hiding strategy over gate-level dual-rail style to dynamically overbalance side-channel leakage from lower circuit layer; II. This logic exploits architectural features of modern FPGAs, to minimize the implementation expenses; III. It is supported by a set of assistant custom tools, incorporated by the generic FPGA design flow, to have circuit manipulations in an automatic manner. The automatic design toolkit supports the proposed dual-rail logic, facilitating the practical implementation on Xilinx FPGA families. While the methodologies and the tools are flexible to be expanded to a wide range of applications where rigid and sophisticated gate- or routing- constraints are desired. In this thesis a great effort is done to streamline the implementation workflow of generic dual-rail logic. The feasibility of the proposed solutions is validated by selected and widely used crypto algorithm, for thorough and fair evaluation w.r.t. prior solutions. All the proposals are effectively verified by security experiments. The presented research work attempts to solve the implementation troubles. The essence that will be formalized along this thesis is that a customized execution toolkit for modern FPGA systems is developed to work together with the generic FPGA design flow for creating innovative dual-rail logic. A method in crypto security area is constructed to obtain customization, automation and flexibility in low-level circuit prototype with fine-granularity in intractable routings. Main contributions of the presented work are summarized next: Precharge Absorbed-DPL logic: Using the netlist conversion to reserve free LUT inputs to execute the Precharge and Ex signal in a dual-rail logic style. A row-crossed interleaved placement method with identical routing pairs in dual-rail networks, which helps to increase the resistance against selective EM measurement and mitigate the impacts from process variations. Customized execution and automatic transformation tools for producing identical networks for the proposed dual-rail logic. (a) To detect and repair the conflict nets; (b) To detect and repair the asymmetric nets. (c) To be used in other logics where strict network control is required in Xilinx scenario. Customized correlation analysis testbed for EM and power attacks, including the platform construction, measurement method and attack analysis. A timing analysis based method for quantifying the security grades. A methodology of security partitions of complex crypto systems for reducing the protection cost. A proof-of-concept self-adaptive heating system to mitigate electrical impacts over process variations in dynamic dual-rail compensation manner. The thesis chapters are organized as follows: Chapter 1 discusses the side-channel attack fundamentals, which covers from theoretic basics to analysis models, and further to platform setup and attack execution. Chapter 2 centers to SCA-resistant strategies against generic power and EM attacks. In this chapter, a major contribution, a compact and secure dual-rail logic style, will be originally proposed. The logic transformation based on bottom-layer design will be presented. Chapter 3 is scheduled to elaborate the implementation challenges of generic dual-rail styles. A customized design flow to solve the implementation problems will be described along with a self-developed automatic implementation toolkit, for mitigating the design barriers and facilitating the processes. Chapter 4 will originally elaborate the tool specifics and construction details. The implementation case studies and security validations for the proposed logic style, as well as a sophisticated routing verification experiment, will be described in Chapter 5. Finally, a summary of thesis conclusions and perspectives for future work are included in Chapter 5. To better exhibit the thesis contents, each chapter is further described next: Chapter 1 provides the introduction of hardware implementation testbed and side-channel attack fundamentals, and mainly contains: (a) The FPGA generic architecture and device features, particularly of Virtex-5 FPGA; (b) The selected crypto algorithm - a commercially and extensively used Advanced Encryption Standard (AES) module - is detailed; (c) The essentials of Side-Channel methods are profiled. It reveals the correlated dissipation leakage to the internal behaviors, and the method to recover this relationship between the physical fluctuations in side-channel traces and the intra processed data; (d) The setups of the power/EM testing platforms enclosed inside the thesis work are given. The content of this thesis is expanded and deepened from chapter 2, which is divided into several aspects. First, the protection principle of dynamic compensation of the generic dual-rail precharge logic is explained by describing the compensated gate-level elements. Second, the novel DPL is originally proposed by detailing the logic protocol and an implementation case study. Third, a couple of custom workflows are shown next for realizing the rail conversion. Meanwhile, the technical definitions that are about to be manipulated above LUT-level netlist are clarified. A brief discussion about the batched process is given in the final part. Chapter 3 studies the implementation challenges of DPLs in FPGAs. The security level of state-of-the-art SCA-resistant solutions are decreased due to the implementation barriers using conventional EDA tools. In the studied FPGA scenario, problems are discussed from dual-rail format, parasitic impact, technological bias and implementation feasibility. According to these elaborations, two problems arise: How to implement the proposed logic without crippling the security level; and How to manipulate a large number of cells and automate the transformation. The proposed PA-DPL in chapter 2 is legalized with a series of initiatives, from structures to implementation methods. Furthermore, a self-adaptive heating system is depicted and implemented to a dual-core logic, assumed to alternatively adjust local temperature for balancing the negative impacts from silicon technological biases on real-time. Chapter 4 centers to the toolkit system. Built upon a third-party Application Program Interface (API) library, the customized toolkit is able to manipulate the logic elements from post P&R circuit (an unreadable binary version of the xdl one) converted to Xilinx xdl format. The mechanism and rationale of the proposed toolkit are carefully convoyed, covering the routing detection and repairing approaches. The developed toolkit aims to achieve very strictly identical routing networks for dual-rail logic both for separate and interleaved placement. This chapter particularly specifies the technical essentials to support the implementations in Xilinx devices and the flexibility to be expanded to other applications. Chapter 5 focuses on the implementation of the case studies for validating the security grades of the proposed logic style from the proposed toolkit. Comprehensive implementation techniques are discussed. (a) The placement impacts using the proposed toolkit are discussed. Different execution schemes, considering the global optimization in security and cost, are verified with experiments so as to find the optimized placement and repair schemes; (b) Security validations are realized with correlation, timing methods; (c) A systematic method is applied to a BCDL structured module to validate the routing impact over security metric; (d) The preliminary results using the self-adaptive heating system over process variation is given; (e) A practical implementation of the proposed toolkit to a large design is introduced. Chapter 6 includes the general summary of the complete work presented inside this thesis. Finally, a brief perspective for the future work is drawn which might expand the potential utilization of the thesis contributions to a wider range of implementation domains beyond cryptography on FPGAs.
Resumo:
Nonlinear analysis tools for studying and characterizing the dynamics of physiological signals have gained popularity, mainly because tracking sudden alterations of the inherent complexity of biological processes might be an indicator of altered physiological states. Typically, in order to perform an analysis with such tools, the physiological variables that describe the biological process under study are used to reconstruct the underlying dynamics of the biological processes. For that goal, a procedure called time-delay or uniform embedding is usually employed. Nonetheless, there is evidence of its inability for dealing with non-stationary signals, as those recorded from many physiological processes. To handle with such a drawback, this paper evaluates the utility of non-conventional time series reconstruction procedures based on non uniform embedding, applying them to automatic pattern recognition tasks. The paper compares a state of the art non uniform approach with a novel scheme which fuses embedding and feature selection at once, searching for better reconstructions of the dynamics of the system. Moreover, results are also compared with two classic uniform embedding techniques. Thus, the goal is comparing uniform and non uniform reconstruction techniques, including the one proposed in this work, for pattern recognition in biomedical signal processing tasks. Once the state space is reconstructed, the scheme followed characterizes with three classic nonlinear dynamic features (Largest Lyapunov Exponent, Correlation Dimension and Recurrence Period Density Entropy), while classification is carried out by means of a simple k-nn classifier. In order to test its generalization capabilities, the approach was tested with three different physiological databases (Speech Pathologies, Epilepsy and Heart Murmurs). In terms of the accuracy obtained to automatically detect the presence of pathologies, and for the three types of biosignals analyzed, the non uniform techniques used in this work lightly outperformed the results obtained using the uniform methods, suggesting their usefulness to characterize non-stationary biomedical signals in pattern recognition applications. On the other hand, in view of the results obtained and its low computational load, the proposed technique suggests its applicability for the applications under study.
Resumo:
Debido al futuro incierto de la mayor parte de los fumigantes edáficos usados actualmente en la Unión Europea, que pueden implicar riesgos para la salud humana/animal y el medio ambiente, es necesario desarrollar programas de manejo integrado para el control de plagas de cultivos. Estos programas se incluyen como obligatorios en el Reglamento (EC) No. 1107/2009. De acuerdo con este Reglamento, es obligatoria la evaluación del riesgo asociado al uso de productos fitosanitarios sobre los organismos edáficos no diana y sus funciones, además de llevar a cabo ensayos con diferentes especies indicadoras para obtener datos de toxicidad que puedan ser usados posteriormente en la evaluación de riesgo. Sin embargo, la baja representatividad de algunas de estas especies indicadoras en el área Mediterránea supone una gran limitación. En esta situación, el Panel Científico de Productos Fitosanitarios y sus Residuos de la Autoridad Europea en Seguridad Alimentaria (EFSA), ha señalado la necesidad de modificar los datos ecotoxicológicos requeridos para evaluar los efectos adversos de los productos fitosanitarios de una manera más integrada, incluyendo criterios funcionales y estructurales mediante organismos como bacterias, hongos, protozoos y nematodos. De este modo, la EFSA ha recomendado el uso de los nematodos en la evaluación de la funcionalidad y estructura del suelo. Los nematodos están globalmente distribuidos y son morfológicamente diversos; esto junto con su gran abundancia y diversidad de respuestas a las perturbaciones edáficas, los convierte en indicadores adecuados del estado del suelo. Puesto que los nematodos interaccionan con muchos otros organismos que participan en diferentes eslabones de la red trófica edáfica, jugando papeles importantes en procesos edáficos esenciales en los agroescosistemas, la diversidad de nematodos es, a menudo, usada como indicador biológico de los efectos de las prácticas agrícolas en el estado del suelo. En los últimos años, diferentes índices basados en la comunidad nematológica han facilitado la interpretación de datos complejos sobre la ecología del suelo. Los índices de la red trófica edáfica, basados en la abundancia de grupos funcionales definidos como grupos C-P y grupos tróficos, permiten la evaluación de la funcionalidad de la red trófica edáfica. Por otra parte, la dificultad en la identificación taxonómica de nematodos para explicar su uso limitado como indicadores ecológicos, es ampliamente discutida, y existe cierta controversia en cuanto a la eficacia de los diferentes métodos de identificación de nematodos. Se argumenta que la identificación morfológica es difícil y puede llevar mucho tiempo debido a la falta de expertos especializados, y se afirma que las técnicas moleculares pueden resolver algunas limitaciones de las técnicas morfológicas como la identificación de juveniles. Sin embargo, los métodos de identificación molecular tienen también limitaciones; la mayoría de las bases de datos de secuencias de ADN están fuertemente orientadas hacia los nematodos fitoparásitos, los cuales representan sólo una parte de la comunidad edáfica de nematodos, mientras que hay poca información disponible de nematodos de vida libre a pesar de representar la mayoría de los nematodos edáficos. Este trabajo se centra en el estudio de los efectos de fumigantes edáficos en la funcionalidad del suelo a través del uso de diferentes indicadores basados en la comunidad de nematodos, como los índices de la red trófica, índices de diversidad, abundancia de los taxones más relevantes etc. También se han analizado otros indicadores funcionales relacionados con la supresividad edáfica, el ciclo de nutrientes o la actividad de la microfauna del suelo. En el capítulo 1, la diversidad de nematodos estudiada en una explotación comercial de fresa y sus alrededores durante dos campañas consecutivas en el suroeste español, fue baja en los suelos fumigados con fumigantes químicos ambas campañas y, aunque se observó una recuperación a lo largo de la campaña en la zona tratada, los suelos fumigados mostraron una condición perturbada permanente. La comunidad de nematodos estuvo más asociada al ciclo de nutrientes en la zona sin cultivar que en los suelos cultivados, y se observó poca relación entre la biomasa de las plantas y la estructura de la comunidad de nematodos. Los surcos sin tratar dentro de la zona de cultivo funcionaron como reservorio tanto de nematodos fitoparásitos como beneficiosos; sin embargo estas diferencias entre los surcos y los lomos de cultivo no fueron suficientes para mantener la supresividad edáfica en los surcos. Los suelos tratados fueron menos supresivos que los suelos sin tratar, y se observaron correlaciones positivas entre la supresividad edáfica y la estructura de la red trófica edáfica y la diversidad de nematodos. En el capítulo 2, se evaluaron los efectos de dos pesticidas orgánicos con efecto nematicida y dos nematicidas convencionales sobre las propiedades físico químicas del suelo, la diversidad de nematodos y la biomasa de las plantas en condiciones experimentales en dos tipos de suelo: suelos agrícolas poco diversos y suelos provenientes de una zona de vegetación natural muy diversos. El mayor efecto se observó en el tratamiento con neem, el cual indujo un gran incremento en el número de dauerlarvas en los suelos pobres en nutrientes, mientras que el mismo tratamiento indujo un incremento de poblaciones de nematodos bacterívoros, más estables y menos oportunistas, en los suelos del pinar ricos en materia orgánica. En el capítulo 3, se comparó la eficacia de métodos moleculares (TRFLP, Terminal Restriction Fragment Length Polymorphism) y morfológicos (microscopía de alta resolución) para la identificación de diferentes comunidades denematodos de España e Irlanda. Se compararon estadísticamente las diferencias y similitudes en la diversidad de nematodos, otros indicadores ecológicos y de la red trófica edáfica. Las identificaciones mediante el uso de TRFLP sólo detectó un porcentaje de los taxones presentes en las muestras de suelo identificadas morfológicamente, y los nematodos omnívoros y predadores no fueron detectados molecularmente en nuestro estudio. Los índices calculados en base a los nematodos micróboros mostraron más similitud cuando se identificaron morfológica y molecularmente que los índices basados en grupos tróficos más altos. Nuestros resultados muestran que, al menos con la técnica usada en este estudio, la identificación morfológica de nematodos es una herramienta fiable y más precisa que la identificación molecular, puesto que en general se obtiene una mayor resolución en la identificación de nematodos. En el capítulo 4, se estudiaron también los efectos de los nematicidas químicos sobre la comunidad de nematodos y la biomasa de las plantas en condiciones experimentales de campo, donde se aplicaron en una rotación de cultivo judía-col durante un ciclo de cultivo. Se aplicaron dos tipos de enmiendas orgánicas con el objetivo de mitigar el efecto negativo de los productos fitosanitarios sobre la diversidad edáfica. El efecto de los nematicidas sobre las propiedades del suelo y sobre la comunidad de nematodos fue más agudo que el efecto de las enmiendas. La incorporación de los restos de cosecha al final del ciclo de cultivo de la judía tuvo un gran efecto sobre la comunidad de nematodos, y aunque el número total de nematodos incrementó al final del experimento, se observó una condición perturbada permanente de la red trófica edáfica a lo largo del experimento. ABSTRACT Due to the uncertain future of the soil fumigants most commonly used in the EU, that might involve risks for human/animal health and the environment, there is a need to develop new integrated pest management programs, included as mandatory in the Regulation (EC) No. 1107/2009, to control crop diseases. According to this Regulation, evaluating the risk associated to the use of the plant production products (PPP) on non-target soil fauna and their function, and developing assays with different indicator species to obtain toxicity data to be used in the risk evaluation is mandatory. However, the low representativeness of some of these indicator species in the Mediterranean area is a relevant limitation. In this situation, the Scientific Panel of Plant Protection Products and their Residues of the European Food Safety Authority (EFSA) has pointed out the necessity of modifying the ecotoxicological data set required to evaluate non-target effects of PPP in a more integrated way, including structural and functional endpoints with organism such as bacteria, fungi, protists and nematodes. Thus, EFSA has recommended the use of nematodes in the assessment of the functional and structural features of the soil. Nematodes are globally distributed and morphologically diverse, and due to their high abundance and diversity of responses to soil disturbance, they are suitable indicators of the soil condition. Since nematodes interact with many other organisms as participants in several links of the soil food web, playing important roles in essential soil processes in agroecosystems, nematode diversity is often used as a biological indicator of the effects of agricultural practices on soil condition. In the last years, various indices based on soil nematode assemblages, have facilitated the interpretation of complex soil ecological data. Soil food web indices based on the abundances of functional guilds defined by C-P groups and trophic groups, permit evaluating soil food web functioning. On the other hand, the difficulty of nematode taxonomical identification is commonly argued to explain their limited used as ecological indicators, and there is a certain controversy in terms of the efficacy of various nematode identification methods. It is argued that the morphological identification is difficult and time consuming due to the lack of specialist knowledge, and it is claimed that molecular techniques can solve some limitations of morphological techniques such as the identification of juveniles. Nevertheless, molecular identification methods are limited too, since most of the DNA-based databases are strongly oriented towards plant-parasitic nematodes that represent only a fraction of the soil nematode community, while there is little information available on free-living nematodes, which represent most soil nematodes. This work focuses on the study of the effects of soil fumigants on soil functioning through the use of different indicators based on soil nematode community as soil food web indices, diversity indices, the abundance of more relevant taxa etc. Other functional indicators related to soil suppressiveness, nutrient cycling, or the activity of soil microfauna have been also studied. In chapter 1, nematode diversity assessed in a commercial strawberry farm and its surroundings for two consecutive growing seasons in southern Spain, was low in fumigated soils with chemical pesticides throughout both seasons and, although yearly recovery occurred within the treated fields, fumigated soils showed a permanent perturbed condition. The nematode community was more closely associated to nutrient cycling in the non-cropped than in the cropped soils, and the link between plant biomass and nematode community structure was weak. Non-treated furrows within the treated fields were a reservoir of both beneficial and plant-parasitic nematodes, but such difference between furrows and beds was not enough to maintain more suppressive soil assemblages in the furrows. Treated soils were less suppressive than unmanaged soils, and there was a positive and significant correlation between soil suppressiveness and soil food web structure and diversity. In chapter 2, the effects of two organic pesticides with nematicide effect and two chemical nematicides on soil physicalchemical properties, soil nematode diversity and plant biomass in experimental conditions were assessed in two types of soils: low diversity soils from an agricultural farm, and high diversity soils from a natural vegetation area. The larger effect was observed on the neem treatment, which induced a large boost of dauer juveniles in the nutrient-depleted soil, while the same treatment induced the increase of more stable, less opportunistic, populations of generalist bacterivore nematodes in the pine forest soil, rich in organic matter. In chapter 3, comparison of the efficiency of molecular (TRFLP, Terminal Restriction Fragment Length Polymorphism) and morphological (microscopy at high magnification) identification methods was carried out in different nematode communities from five sites of different land uses in Spain and Ireland. Differences and similarities on nematode diversity and other ecological and soil food web indices assessed by both methods, were statistically compared. Molecular identification with TRFLP only detected a percentage of the taxa present in the soil samples identified morphologically, and omnivores and predators were not detected molecularly in our study. Indices involving microbial feeding nematodes were more similar between identification methods than indices involving higher trophic links. Our results show that, at least with the technique used in this study, identifying nematodes morphologically is a reliable and more precise identification tool than molecular identification, since a higher taxonomic resolution is in general obtained compared to TRFLP. In chapter 4, the effect of chemical nematicides on nematode community descriptors and plant biomass was also studied in field conditions in an experimental area in which dazomet and dimethyl disulfide was applied in a bean-cabbage rotation system for a single season. Organic amendments were incorporated into the soil with the aim of mitigate the negative effect of the pesticides on soil diversity. The effect of the nematicides was much more noticeable than the effect of the amendments on soil properties and nematode community descriptors. The incorporation of bean crop residues into the soil at the end of bean crop cycle affected soil nematode community descriptors to a great extent, and although total number of nematodes increased at the end of the experiment, a permanent perturbed soil food web condition was observed along the experiment.
Resumo:
More than 2.5 billion people are still unbanked and they do not access or use financial services. In this paper, we present an innovative service that allows Santander University Smart Card holders to make person-to-person payments to their friends, using different social channels, such as Telegram, Facebook or Twitter. Our first implementation is based on Facebook, one of the most used social networks. This approach allows the service to reach a great number of potential users but the delivery and stability of the service depends on an external provider. We include the description of the service architecture, its implementation, tests, and the lessons learned from the development. We also discuss pros and cons of the third party service dependency from the technical and business viewpoints.
Resumo:
We would like to thank the animal house staff and all members of the Energetics group for their invaluable help at various stages throughout the project. This work was supported by Natural Environment Research Council grant (NERC, NE/C004159/1). YG was supported by a scholarship from the rotary foundation. LV was supported by a Rubicon grant from the Netherlands Scientific Organisation (NWO).
Resumo:
The reaction center from Rhodobacter sphaeroides uses light energy for the reduction and protonation of a quinone molecule, QB. This process involves the transfer of two protons from the aqueous solution to the protein-bound QB molecule. The second proton, H+(2), is supplied to QB by Glu-L212, an internal residue protonated in response to formation of QA− and QB−. In this work, the pathway for H+(2) to Glu-L212 was studied by measuring the effects of divalent metal ion binding on the protonation of Glu-L212, which was assayed by two types of processes. One was proton uptake from solution after the one-electron reduction of QA (DQA→D+QA−) and QB (DQB→D+QB−), studied by using pH-sensitive dyes. The other was the electron transfer kAB(1) (QA−QB→QAQB−). At pH 8.5, binding of Zn2+, Cd2+, or Ni2+ reduced the rates of proton uptake upon QA− and QB− formation as well as kAB(1) by ≈an order of magnitude, resulting in similar final values, indicating that there is a common rate-limiting step. Because D+QA− is formed 105-fold faster than the induced proton uptake, the observed rate decrease must be caused by an inhibition of the proton transfer. The Glu-L212→Gln mutant reaction centers displayed greatly reduced amplitudes of proton uptake and exhibited no changes in rates of proton uptake or electron transfer upon Zn2+ binding. Therefore, metal binding specifically decreased the rate of proton transfer to Glu-L212, because the observed rates were decreased only when proton uptake by Glu-L212 was required. The entry point for the second proton H+(2) was thus identified to be the same as for the first proton H+(1), close to the metal binding region Asp-H124, His-H126, and His-H128.
Resumo:
L125R is a mutation in the transmembrane helix C of rhodopsin that is associated with autosomal dominant retinitis pigmentosa. To probe the orientation of the helix and its packing in the transmembrane domain, we have prepared and studied the mutations E122R, I123R, A124R, S127R, L125F, and L125A at, and in proximity to, the above mutation site. Like L125R, the opsin expressed in COS-1 cells from E122R did not bind 11-cis-retinal, whereas those from I123R and S127R formed the rhodopsin chromophore partially. A124R opsin formed the rhodopsin chromophore (lambda max 495 nm) in the dark, but the metarhodopsin II formed on illumination decayed about 6.5 times faster than that of the wild type and was defective in transducin activation. The mutant opsins from L125F and L125A bound 11-cis-retinal only partially, and in both cases, the mixtures of the proteins produced were separated into retinal-binding and non-retinal-binding (misfolded) fractions. The purified mutant rhodopsin from L125F showed lambda max at 500 nm, whereas that from L125A showed lambda max at 503 nm. The mutant rhodopsin L125F showed abnormal bleaching behavior and both mutants on illumination showed destabilized metarhodopsin II species and reduced transducin activation. Because previous results have indicated that misfolding in rhodopsin is due to the formation of a disulfide bond other than the normal disulfide bond between Cys-110 and Cys-187 in the intradiscal domain, we conclude from the misfolding in mutants L125F and L125A that the folding in vivo in the transmembrane domain is coupled to that in the intradiscal domain.
Resumo:
Transcriptional stimulation by the model activator GAL4-VP16 (a chimeric protein consisting of the DNA-binding domain of the yeast activator GAL4 and the acidic activation domain of the herpes simplex virus protein VP16) involves a series of poorly understood protein-protein interactions between the VP16 activation domain and components of the RNA polymerase II general transcription machinery. One of these interactions is the VP16-mediated binding and recruitment of transcription factor TFIIB. However, TATA box-binding protein (TBP)-associated factors (TAFs), or coactivators, are required for this interaction to culminate in productive transcription complex assembly, and one such TAF, Drosophila TAF40, reportedly forms a ternary complex with VP16 and TFIIB. Due to TFIIB's central role in gene activation, we sought to directly visualize the surfaces of this protein that mediate formation of the ternary complex. We developed an approach called protease footprinting in which the broad-specificity proteases chymotrypsin and alkaline protease were used to probe binding of 32P-end-labeled TFIIB to GAL4-VP16 or TAF40. Analysis of the cleavage products revealed two regions of TFIIB protected by VP16 from protease attack, one of which overlapped with a region protected by TAF40. The close proximity of the VP16 and TAF40 binding sites on the surface of TFIIB suggests that this region could act as a regulatory interface mediating the effects of activators and coactivators on transcription complex assembly.
Resumo:
Viral vectors based on adeno-associated virus (AAV) preferentially transduce cells in S phase of the cell cycle. We recently found that DNA-damaging agents increased the transduction of nondividing cells. However, the optimal concentrations were toxic to cells. Here we show that the transduction of normal human fibroblasts by AAV vectors is increased by prior exposure to DNA synthesis inhibitors, such as aphidicolin or hydroxyurea, and topoisomerase inhibitors, such as etoposide or camptothecin. Transduction efficiencies could be increased > 300-fold in stationary cultures at concentrations that did not affect cell viability or proliferative potential. Both S-phase and non-S-phase cells were affected, suggesting that cellular functions other than replicative DNA synthesis may be involved. Applying these methods to gene transfer protocols should improve prospects for gene therapy by AAV vectors.
Resumo:
Introdução: A prevalência de doenças crônicas, sobretudo na população idosa, nos coloca diante da necessidade de modelos longitudinais de cuidado. Atualmente os sujeitos estão sendo cada vez mais responsabilizados pelo gerenciamento de sua saúde através do uso de dispositivos de monitoramento, tais como o glicosímetro e o aferidor de pressão arterial. Esta nova realidade culmina na tomada de decisão no próprio domicílio. Objetivos: Identificar a tomada de decisão de idosos no monitoramento domiciliar das condições crônicas; identificar se as variáveis: sexo, escolaridade e renda influenciam a tomada de decisão; identificar a percepção dos idosos quanto às ações de cuidado no domicílio; identificar as dificuldades e estratégias no manuseio dos dispositivos de monitoramento. Materiais e métodos: Estudo quantitativo, exploratório e transversal. Casuística: 150 sujeitos com 60 anos de idade ou mais, sem comprometimento cognitivo, sem depressão e que façam uso do glicosímetro e/ou do aferidor de pressão arterial no domicílio. Instrumentos para seleção dos participantes: (1) Mini Exame do Estado Mental; (2) Escala de Depressão Geriátrica e (3) Escala de Atividades Instrumentais de Vida Diária de Lawton e Brody; Coleta de dados: realizada na cidade de Ribeirão Preto - SP entre setembro de 2014 e outubro de 2015. Instrumentos: (1) Questionário Socioeconômico; (2) Questionário sobre a tomada de decisão no monitoramento da saúde no domicílio (3) Classificação do uso de dispositivos eletrônicos voltados aos cuidados à saúde. Análise dos dados: Realizada estatística descritiva e quantificações absolutas e percentuais para identificar a relação entre tomada de decisão de acordo com o sexo, escolaridade e renda. Resultados: Participaram 150 idosos, sendo 117 mulheres e 33 homens, com média de idade de 72 anos. Destes, 113 são hipertensos e 62 são diabéticos. Quanto à tomada de decisão imediata, tanto os que fazem uso do aferidor de pressão arterial (n=128) quanto do glicosímetro (n=62) referem em sua maioria procurar ajuda médica, seguida da administração do medicamento prescrito e opções alternativas de tratamento. Em médio prazo destaca-se a procura por ajuda profissional para a maioria dos idosos em ambos os grupos. Foi notada pequena diferença na tomada de decisão com relação ao sexo. Quanto à escolaridade, os idosos com mais anos de estudos tendem a procurar mais pelo serviço de saúde se comparado aos idosos de menor escolaridade. A renda não mostrou influencia entre os usuários do glicosímetro. Já entre os usuários do aferidor de pressão arterial, idosos de maior renda tendem a procurar mais pelo serviço de saúde. A maioria dos participantes se refere ao monitoramento domiciliar da saúde de maneira positiva, principalmente pela praticidade em não sair de casa, obtenção rápida de resultados e possibilidade de controle contínuo da doença. As principais dificuldades no manuseio do glicosímetro estão relacionadas ao uso da lanceta e fita reagente, seguida da checagem dos resultados armazenados. Já as dificuldades no uso do aferidor de pressão arterial estão relacionadas a conferir o resultado após cada medida e ao posicionamento correto do corpo durante o monitoramento. Em ambos os grupos as estratégias utilizadas são pedir o auxílio de terceiros e tentativa e erro. Conclusão: Os idosos tem se mostrado favoráveis às ações de monitoramento domiciliar da saúde. De maneira geral, de imediato decidem por ações dentro do próprio domicílio para o controle dos sintomas e isto reforça a necessidade do investimento em informação de qualidade e educação em saúde para que o gerenciamento domiciliar possa vir a ser uma vertente do cuidado integral no tratamento das condições crônicas.
Resumo:
Este artículo sugiere que el personal de hotel ante un trato (in)justo del hotel hacia los clientes atribuye tal trato a la responsabilidad del hotel y, dependiendo que éste sea justo o injusto, aumentaría o disminuiría sus conductas orientadas al cliente (COBs). Los datos fueron recogidos mediante cuestionarios pasados a 204 empleados de ocho hoteles de lujo en las Islas Canarias (España). Para examinar las hipótesis se utilizaron modelos de ecuaciones estructurales (SEM). No así en el caso de percepciones de justicia distributiva, los resultados muestran que cuanta más justicia procedimental e interpersonal hacia los huéspedes perciban los empleados, más se implican en conductas orientadas al cliente (COBs). Los hallazgos sugieren la necesidad de prevenir episodios de maltrato a los huéspedes por parte del hotel, haciendo especial hincapié en aquellos que son visibles para los empleados, para promover así conductas orientadas al cliente (COBs). Hasta donde nosotros sabemos, este es el primer estudio empírico en donde la justicia organizativa (distributiva, procedimental e interpersonal) dirigida hacia los clientes y las conductas orientadas al cliente (COBs) de los empleados son examinadas conjuntamente en un mismo modelo.