979 resultados para panic attacks


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Various intrinsic and external factors are constantly attacking the cells causing damage to DNA and to other cellular structures. Cells in turn have evolved with different kinds of mechanisms to protect against the attacks and to repair the damage. Ultraviolet radiation (UVR) is one of the major environmental genotoxic carcinogens that causes inflammation, mutations, immunosuppression, accelerated aging of the skin and skin cancers. Epidermis is the outermost layer of the skin consisting mostly of keratinocytes, whose primary function is to protect the skin against e.g. UV radiation. LIM domain proteins are a group of proteins involved in regulation of cell growth, damage signalling, cell fate determination and signal transduction. Despite their two zinc fingers, LIM domains do not bind to DNA, but rather mediate protein-protein interactions and function as modular protein binding interfaces. We initially identified CSRP1 as UVR-regulated transcript by using expression profiling. Here we have further studied the regulation and function of CRP1, a representative of cysteine rich protein- family consisting of two LIM domains. We find that CRP1 is increased by UVR in primary human keratinocytes and in normal human skin fibroblasts. Ectopic expression of CRP1 protected the cells against UVR and provided a survival advantage, whereas silencing of CRP1 rendered the cells more photosensitive. Actinic keratosis is a premalignant lesion of skin caused by excess exposure to sunlight and sunburn, which may lead to formation of squamous cell carcinoma. The expression of CRP1 was increased in basal keratinocytes of Actinic keratosis patient specimens suggesting that CRP1 may be increased by constant exposure to UVR and may provide survival advantage for the cells also in vivo. In squamous cell carcinoma, CRP1 was only expressed in the fibroblasts surrounding the tumour. Moreover, we found that ectopic expression of CRP1 suppresses cell proliferation. Transforming growth factor beta (TGFbeta) is a multifunctional cytokine that regulates several functions in cell including growth, apoptosis and differentiation, and plays important roles in pathological disorders like cancer and fibrosis. We found that TGFbeta-signalling pathway regulates CRP1 at protein, but not at transcriptional level. The increase was mediated both through Smad and non-Smad signalling pathways involving MAPK/p38. Furthermore, we found that TGFbeta-mediated increase in CRP1 was associated with myofibroblast differentiation, and that CRP1 was significantly more expressed in idiopathic pulmonary fibrosis as compared to normal lung specimens. Since cell contractility is a distinct feature of myofibroblasts, and CRP1 is associated with actin cytoskeleton, we studied the role of CRP1 in cell contractility. CRP1 was found to localize to stress fibres that mediate contractility and to mediate myofibroblast contraction. These studies identify CRP1 as a stress responsive and cytokine regulated cytoskeletal protein that participates in pathological processes involved in fibrotic diseases and cancer.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The hydrolysis reactions of organometallic ruthenium(II) piano-stool complexes of the type Ru-II(eta(6)-cymene)(L)Cl](0/+) (1-5, where L = kappa(1)- or kappa(2)-1,1-bis(diphenylphosphino)methane,1,1bis-(diphenylphosphino)methane oxide, kappa(1)-mercaptobenzothiazole) have been studied using density functional theory at the B3LYP level. In addition to considering a syn attack in an associative fashion, where the nucleophile approaches from the same side as the leaving group, we have explored alternative paths such as an anti attack in an associative manner, where the nucleophile attacks from the opposite side of the leaving group. During the anti attack, an intermediate is formed and there is a coordination mode change of the arene ring from eta(6) to eta(2) along with its rotation. When the intermediate goes to the product, the arene ring slips back from eta(2) to eta(6) coordination. This coordinated movement of the arene ring makes the associative anti attack an accessible pathway for the substitution process. Our calculations predict very similar activation barriers for both syn and anti attacks. In the dissociative path, the rate-determining step is the generation of a coordinatively unsaturated 16-electron ruthenium species. This turns out to be viable once solvent effects are included. The large size of the ancillary ligands on Ru makes the dissociative process as favorable as the associative process. Activation energy calculations reveal that although the dissociative path is favorable for kappa(1) complexes, both dissociative and associative processes can have significant contribution to the hydrolysis reaction in kappa(2) complexes. Once activated by hydrolysis, these complexes react with guanine and adenine bases of DNA. The thermodynamic stabilities of complexes formed with the nucleobases are also presented.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Molecular constraints for the localization of active site directed ligands (competitive inhibitors and substrates) in the active site of phospholipase A2 (PLA2) are characterized. Structure activity relationships with known inhibitors suggest that the head : group interactions dominate the selectivity as well as a substantial part of the affinity. The ab initio fitting of the amide ligands in the active site was carried out to characterize the head group interactions. Based on a systematic coordinate space search, formamide is docked with known experimental constraints such as coordination of the carbonyl group to Ca2+ and hydrogen bond between amide nitrogen and ND1 of His48. An optimal position for a bound water molecule is identified and its significance for the catalytic mechanism is postulated. Unlike the traditional ''pseudo-triad'' mechanism, the ''Ca-coordinatedoxyanion'' mechanism proposed here invokes activation of the catalytic water to form the oxyanion in the coordination sphere of calcium. As it attacks the carbonyl carbon of the ester, a near-tetrahedral intermediate is formed. As the second proton of the catalytic water is abstracted by the ester oxygen, its reorientation and simultaneous cleavage form hydrogen bond with ND1 of His48. In this mechanism of esterolysis, a catalytic role for the water co-ordinated to Ca2+ is recognised.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Graded alternate layers of Al2O3 and 8% Y2O3-ZrO2 and their admixtures were plasma sprayed onto bond-coated mild steel. They were evaluated for thermal-shock resistance, thermal-barrier characteristics, hot corrosion resistance (molten NaCl corrodant) and depth of attack, adhesion strength and the presence of phases. Although front-back temperature drops of 423-623 K were observed, some of the coatings showed good adherence even after 100 thermal shack cycles. In the sequence of the graded layers, the oxide which is directly in contact with the bond coat appears to influence the properties especially in coatings of 150 and 300 mu m thickness. Molten NaCl readily attacks the films at high hot-face temperatures (1273 K for 1 h) and the adhesive strength falls significantly by 50-60%. Diffusion of alkaline elements is also found to depend on the chemical composition of the outer coating directly facing the molten corrodant. (C) 1997 Elsevier Science Limited.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this study, we investigated nonlinear measures of chaos of QT interval time series in 28 normal control subjects, 36 patients with panic disorder and 18 patients with major depression in supine and standing postures. We obtained the minimum embedding dimension (MED) and the largest Lyapunov exponent (LLE) of instantaneous heart rate (HR) and QT interval series. MED quantifies the system's complexity and LLE predictability. There was a significantly lower MED and a significantly increased LLE of QT interval time series in patients. Most importantly, nonlinear indices of QT/HR time series, MEDqthr (MED of QT/HR) and LLEqthr (LLE of QT/HR), were highly significantly different between controls and both patient groups in either posture. Results remained the same even after adjusting for age. The increased LLE of QT interval time, series in patients with anxiety and depression is in line with our previous findings of higher QTvi (QT variability index, a log ratio of QT variability corrected for mean QT squared divided by heart rate variability corrected for mean heart rate squared) in these patients, using linear techniques. Increased LLEqthr (LLE of QT/HR) may be a more sensitive tool to study cardiac repolarization and a valuable addition to the time domain measures such as QTvi. This is especially important in light of the finding that LLEqthr correlated poorly and nonsignificantly with QTvi. These findings suggest an increase in relative cardiac sympathetic activity and a decrease in certain aspects of cardiac vagal function in patients with anxiety as well as depression. The lack of correlation between QTvi and LLEqthr suggests that this nonlinear index is a valuable addition to the linear measures. These findings may also help to explain the higher incidence of cardiovascular mortality in patients with anxiety and depressive disorders. (C) 2002 Elsevier Science Ireland Ltd. All rights reserved.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We present a sound and complete decision procedure for the bounded process cryptographic protocol insecurity problem, based on the notion of normal proofs [2] and classical unification. We also show a result about the existence of attacks with “high” normal cuts. Our proof of correctness provides an alternate proof and new insights into the fundamental result of Rusinowitch and Turuani [9] for the same setting.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We present a technique for irreversible watermarking approach robust to affine transform attacks in camera, biomedical and satellite images stored in the form of monochrome bitmap images. The watermarking approach is based on image normalisation in which both watermark embedding and extraction are carried out with respect to an image normalised to meet a set of predefined moment criteria. The normalisation procedure is invariant to affine transform attacks. The result of watermarking scheme is suitable for public watermarking applications, where the original image is not available for watermark extraction. Here, direct-sequence code division multiple access approach is used to embed multibit text information in DCT and DWT transform domains. The proposed watermarking schemes are robust against various types of attacks such as Gaussian noise, shearing, scaling, rotation, flipping, affine transform, signal processing and JPEG compression. Performance analysis results are measured using image processing metrics.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We examine a natural, but non-tight, reductionist security proof for deterministic message authentication code (MAC) schemes in the multi-user setting. If security parameters for the MAC scheme are selected without accounting for the non-tightness in the reduction, then the MAC scheme is shown to provide a level of security that is less than desirable in the multi-user setting. We find similar deficiencies in the security assurances provided by non-tight proofs when we analyze some protocols in the literature including ones for network authentication and aggregate MACs. Our observations call into question the practical value of non-tight reductionist security proofs. We also exhibit attacks on authenticated encryption schemes, disk encryption schemes, and stream ciphers in the multi-user setting.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Network Intrusion Detection Systems (NIDS) intercept the traffic at an organization's network periphery to thwart intrusion attempts. Signature-based NIDS compares the intercepted packets against its database of known vulnerabilities and malware signatures to detect such cyber attacks. These signatures are represented using Regular Expressions (REs) and strings. Regular Expressions, because of their higher expressive power, are preferred over simple strings to write these signatures. We present Cascaded Automata Architecture to perform memory efficient Regular Expression pattern matching using existing string matching solutions. The proposed architecture performs two stage Regular Expression pattern matching. We replace the substring and character class components of the Regular Expression with new symbols. We address the challenges involved in this approach. We augment the Word-based Automata, obtained from the re-written Regular Expressions, with counter-based states and length bound transitions to perform Regular Expression pattern matching. We evaluated our architecture on Regular Expressions taken from Snort rulesets. We were able to reduce the number of automata states between 50% to 85%. Additionally, we could reduce the number of transitions by a factor of 3 leading to further reduction in the memory requirements.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

TCP attacks are the major problem faced by Mobile Ad hoc Networks (MANETs) due to its limited network and host resources. Attacker traceback is a promising solution which allows a victim to identify the exact location of the attacker and hence enables the victim to take proper countermeasure near attack origins, for forensics and to discourage attackers from launching the attacks. However, attacker traceback in MANET is a challenging problem due to dynamic network topology, limited network and host resources such as memory, bandwidth and battery life. We introduce a novel method of TCP attacker Identification in MANET using the Traffic History - MAITH. Based on the comprehensive evaluation based on simulations, we showed that MAITH can successfully track down the attacker under diverse mobile multi-hop network environment with low communication, computation, and memory overhead.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Mobile ad hoc networks (MANETs) is one of the successful wireless network paradigms which offers unrestricted mobility without depending on any underlying infrastructure. MANETs have become an exciting and im- portant technology in recent years because of the rapid proliferation of variety of wireless devices, and increased use of ad hoc networks in various applications. Like any other networks, MANETs are also prone to variety of attacks majorly in routing side, most of the proposed secured routing solutions based on cryptography and authentication methods have greater overhead, which results in latency problems and resource crunch problems, especially in energy side. The successful working of these mechanisms also depends on secured key management involving a trusted third authority, which is generally difficult to implement in MANET environ-ment due to volatile topology. Designing a secured routing algorithm for MANETs which incorporates the notion of trust without maintaining any trusted third entity is an interesting research problem in recent years. This paper propose a new trust model based on cognitive reasoning,which associates the notion of trust with all the member nodes of MANETs using a novel Behaviors-Observations- Beliefs(BOB) model. These trust values are used for detec- tion and prevention of malicious and dishonest nodes while routing the data. The proposed trust model works with the DTM-DSR protocol, which involves computation of direct trust between any two nodes using cognitive knowledge. We have taken care of trust fading over time, rewards, and penalties while computing the trustworthiness of a node and also route. A simulator is developed for testing the proposed algorithm, the results of experiments shows incorporation of cognitive reasoning for computation of trust in routing effectively detects intrusions in MANET environment, and generates more reliable routes for secured routing of data.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Mobile Ad hoc Networks (MANETs) having strikingly superior features also come with notable disadvantage and troubles and the most exigent amongst all being security related issues. Such an ringent network dexterously pave approach for the malicious nodes. Hence providing security is a tedious task. For such a dynamic environment, a security system which dynamically observes the attacker's plans and protect the highly sophisticated resources is in high demand. In this paper we present a method of providing security against wormhole attacks to a MANET by learning about the environment dynamically and adapting itself to avoid malicious nodes. We accomplish this with the assistance of Honeypot. Our method predicts the wormhole attack that may take place and protect the resources well-in advance. Also it cleverly deal with the attacker by using previous history and different type of messages to locate the attacker. Several experiments suggest that the system is accurate in handling wormhole attack.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Several anuran species use multimodal signals to communicate in diverse social contexts. Our study describes acoustic and visual behaviours of the Small Torrent Frog (Micrixalus aff. saxicola), a diurnal frog endemic to the Western Ghats of India. During agonistic interactions males display advertisement calls, foot-flagging and tapping (foot lifting) behaviours to signal the readiness to defend perching sites in perennial streams. Results from a quantitative video analysis of male–male interactions indicate that footflagging displays were used as directional signals toward the opponent male, but were less abundant than calls. The acoustic and visual signals were not functionally linked. The call of Micrixalus aff. saxicola thereby did not act as an alert signal. Analysis of behavioural transitions revealed that kicking behaviours (physical attacks) significantly elicited kicks from interacting males. We suggest that foot-flagging displays ritualized from this frequently observed fighting technique to reduce physical attacks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Several anuran species use multimodal signals to communicate in diverse social contexts. Our study describes acoustic and visual behaviours of the Small Torrent Frog (Micrixalus aff. saxicola), a diurnal frog endemic to the Western Ghats of India. During agonistic interactions males display advertisement calls, foot-flagging and tapping (foot lifting) behaviours to signal the readiness to defend perching sites in perennial streams. Results from a quantitative video analysis of male-male interactions indicate that foot-flagging displays were used as directional signals toward the opponent male, but were less abundant than calls. The acoustic and visual signals were not functionally linked. The call of Micrixalus aff. saxicola thereby did not act as an alert signal. Analysis of behavioural transitions revealed that kicking behaviours (physical attacks) significantly elicited kicks from interacting males. We suggest that foot-flagging displays ritualized from this frequently observed fighting technique to reduce physical attacks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We present a multipartite protocol in a counterfactual paradigm. In counterfactual quantum cryptography, secure information is transmitted between two spatially separated parties even when there is no physical travel of particles transferring the information between them. We propose here a tripartite counterfactual quantum protocol for the task of certificate authorization. Here a trusted third party, Alice, authenticates an entity Bob (e.g., a bank) that a client Charlie wishes to securely transact with. The protocol is counterfactual with respect to either Bob or Charlie. We prove its security against a general incoherent attack, where Eve attacks single particles.