898 resultados para SOFT-GAMMA REPEATERS


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The prion protein (PrP(C)) is highly expressed in the nervous system, and its abnormal conformer is associated with prion diseases. PrP(C) is anchored to cell membranes by glycosylphosphatidylinositol, and transmembrane proteins are likely required for PrP(C)-mediated intracellular signaling. Binding of laminin (Ln) to PrP(C) modulates neuronal plasticity and memory. We addressed signaling pathways triggered by PrP(C)-Ln interaction in order to identify transmembrane proteins involved in the transduction of PrP(C)-Ln signals. The Ln gamma 1-chain peptide, which contains the Ln binding site for PrP(C), induced neuritogenesis through activation of phospholipase C (PLC), Ca(2+) mobilization from intracellular stores, and protein kinase C and extracellular signal-regulated kinase (ERK1/2) activation in primary cultures of neurons from wild-type, but not PrP(C)-null mice. Phage display, coimmunoprecipitation, and colocalization experiments showed that group I metabotropic glutamate receptors (mGluR1/5) associate with PrP(C). Expression of either mGluR1 or mGluR5 in HEK293 cells reconstituted the signaling pathways mediated by PrP(C)-Ln gamma 1 peptide interaction. Specific inhibitors of these receptors impaired PrP(C)-Ln gamma 1 peptide-induced signaling and neuritogenesis. These data show that group I mGluRs are involved in the transduction of cellular signals triggered by PrP(C)-Ln, and they support the notion that PrP(C) participates in the assembly of multiprotein complexes with physiological functions on neurons.-Beraldo, F. H., Arantes, C. P., Santos, T. G., Machado, C. F., Roffe, M., Hajj, G. N., Lee, K. S., Magalhaes, A. C., Caetano, F. A., Mancini, G. L., Lopes, M. H., Americo, T. A., Magdesian, M. H., Ferguson, S. S. G., Linden, R., Prado, M. A. M., Martins, V. R. Metabotropic glutamate receptors trans-duce signals for neurite outgrowth after binding of the prion protein to laminin gamma 1 chain. FASEB J. 25, 265-279 (2011). www.fasebj.org

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cobalt catalysts were prepared on supports of SiO(2) and gamma-Al(2)O(3) by the impregnation method, using a solution of Co precursor in methanol. The samples were characterized by XRD, TPR, and Raman spectroscopy and tested in ethanol steam reforming. According to the XRD results, impregnation with the methanolic solution led to smaller metal crystallites than with aqueous solution, on the SiO(2) support. On gamma-Al(2)O(3), all the samples exhibited small crystallites, with either solvent, due to a higher Co-support interaction that inhibits the reduction of Co species. The TPR results were consistent with XRD results and the samples supported on gamma-Al(2)O(3) showed a lower degree of reduction. In the steam reforming of ethanol, catalysts supported on SiO(2) and prepared with the methanolic solution showed the best H(2), CO(2) and CO selectivity. Those supported on gamma-Al(2)O(3) showed lower H(2) selectivity. (C) 2011 Elsevier Ltd. All rights reserved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Alachlor has been widely used in agriculture all over the world. It is suggested that it may be a carcinogen and an environmental estrogen. The aim of this work was to verify the degradation the alachlor by gamma radiation. Gamma radiation from (60)Co was used to degrade the alachlor herbicide in water and methanol solution. The alachlor in water and alcohol solution in the concentration of 100 mgL(-1) was irradiated with doses of 0.25-50 kGy, at dose rate 5-6 and 2.7 kGyh(-1). High performance liquid chromatography was used as an analytical technique to determine the degradation rate of herbicide studied.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The ever increasing spurt in digital crimes such as image manipulation, image tampering, signature forgery, image forgery, illegal transaction, etc. have hard pressed the demand to combat these forms of criminal activities. In this direction, biometrics - the computer-based validation of a persons' identity is becoming more and more essential particularly for high security systems. The essence of biometrics is the measurement of person’s physiological or behavioral characteristics, it enables authentication of a person’s identity. Biometric-based authentication is also becoming increasingly important in computer-based applications because the amount of sensitive data stored in such systems is growing. The new demands of biometric systems are robustness, high recognition rates, capability to handle imprecision, uncertainties of non-statistical kind and magnanimous flexibility. It is exactly here that, the role of soft computing techniques comes to play. The main aim of this write-up is to present a pragmatic view on applications of soft computing techniques in biometrics and to analyze its impact. It is found that soft computing has already made inroads in terms of individual methods or in combination. Applications of varieties of neural networks top the list followed by fuzzy logic and evolutionary algorithms. In a nutshell, the soft computing paradigms are used for biometric tasks such as feature extraction, dimensionality reduction, pattern identification, pattern mapping and the like.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the area of campaign financing in federal elections, one of the most controversial issues is that of soft money. Soft money refers to those funds raised by the national party organizations for use on various grassroots and party-building activities. but which are not subject to the restraints of federal campaign finance law. Critics contend that these party-building activitie, such as generic television advertising, voter registration and get-out-the vote drives, provide ancillary benefits to federal candidates and should, therefore, be subject to federal contribution and expenditure limits. Critics further argue that because these funds are not subject to federal law and do benefit federal candidates, the national parties raise monies in amounts and from sources, such as corporations and unions, that are prohibited under federal law. Efforts to gain a better understanding of soft money have been hampered by a lack of data, as the national parties were not required to disclose their soft money receipts and transactions until 1991. The purpose of this study is to analyze data recently made available in an attempt to add the import of empirical evidence to the debate over soft money. The nature, size and timing of soft money contributions are investigated and national party soft money disbursements are examined. The findings suggest that any attempts to reform the soft money system must first consider its compensatory benefits. Most prominently, this includes the extent to which soft money has promoted the resurgence of the national party organizations in the context of election politics.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A criptografia assumiu papel de destaque no cotidiano das pessoas, em virtude da necessidade de segurança em inúmeras transações eletrônicas. Em determinadas áreas, a utilização de hardware dedicado à tarefa de criptografia apresenta vantagens em relação à implementação em software, devido principalmente ao ganho de desempenho. Recentemente, o National Institute of Standards and Technology (NIST) publicou o novo padrão norte-americano de criptografia simétrica, chamado de Advanced Encryption Standard (AES). Após um período de aproximadamente 3 anos, no qual várias alternativas foram analisadas, adotou-se o algoritmo Rijndael. Assim, este trabalho apresenta um Soft IP do padrão AES, codificado em VHDL, visando a implementação em FPGA Altera. Todo o projeto foi construído com funções e bibliotecas genéricas, a fim de permitir a posterior implementação sobre outras tecnologias. Foram geradas duas versões: uma priorizando desempenho e outra priorizando a área ocupada nos componentes. Para cada uma das versões, produziu-se um circuito para encriptar e outro para decriptar. O desempenho alcançado em termos de velocidade de processamento superou todos os outros trabalhos publicados na área, sobre a mesma tecnologia. São apresentados os detalhes de implementação, arquiteturas envolvidas e decisões de projeto, bem como todos os resultados. A dissertação contém ainda conceitos básicos de criptografia e uma descrição do algoritmo Rijndael.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

As empresas e instituições estão num ambiente que oferece oportunidades e ameaças, o que exige um conjunto de informações voltado tanto a processos e decisões táticas, operacionais e estratégicos. No entanto, conseguir informações com rapidez e qualidade não se trata apenas de adquirir pacotes de sistemas de informações ou mesmo desenvolvê-los nas organizações. Infelizmente, isto é o que mais tem ocorrido. Desta forma, a fim de ultrapassar esse amadorismo, faz-se necessário um diagnóstico sistêmico da organização, com objetivo de identificar os requisitos informacionais necessários à construção de um sistema de apoio às decisões. Destarte, este estudo realiza um diagnóstico sistêmico numa farmácia com a utilização da “Soft Systems Methodology”, a qual a partir de ampla interação entre pesquisador e as pessoas envolvidas , identifica e estrutura a situação problemática de forma encadeada, analisando-a sob duas preocupações: uma relacionada ao mundo real e outra ao pensamento sistêmico. Com este processo, desenvolve uma aprendizagem que permite não só a identificação dos requisitos informacionais necessários à construção de um sistema de informações como também reunir e organizar visões muitas vezes divergentes a respeito de uma realidade complexa, a fim de propor um rol de atividades e ações que possam contribuir para o processo de melhoria da situação problemática.

Relevância:

20.00% 20.00%

Publicador: