832 resultados para role-based access control


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Previous studies have indicated that AMP-activated protein kinase (AMPK) plays a critical role in the control of cardiac hypertrophy mediated by different stimuli such as thyroid hormone (TH). Although the classical effects of TH mediating cardiac hypertrophy occur by transcriptional mechanisms, recent studies have identified other responses to TH, which are more rapid and take place in seconds or minutes evidencing that TH rapidly modulates distinct signaling pathway, which might contribute to the regulation of cardiomyocyte growth. Here, we evaluated the rapid effects of TH on AMPK signaling pathway in cultured cardiomyocytes and determined the involvement of AMPK in T3-induced cardiomyocyte growth. We found for the first time that T3 rapidly activated AMPK signaling pathway. The use of small interfering RNA against AMPK resulted in increased cardiomyocyte hypertrophy while the pharmacological stimulation of AMPK attenuated this process, demonstrating that AMPK contributes to regulation of T3-induced cardiomyocyte growth.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

[EN]The Azorean barnacle, Megabalanus azoricus (Pilsbry, 1916), is a Macaronesian endemic whose obscure taxonomy and the unknown relationships among forms inhabiting isolated Northern Atlantic oceanic islands is investigated by means of molecular analysis herein. Mitochondrial data from the 16S rRNA and COX1 genes support its current species status, tropical ancestry, and the taxonomic homogeneity throughout its distribution range. In contrast, at the intraspecific level and based on control region sequences, we detected an overall low level of genetic diversity and three divergent lineages. The haplogroups α and γ were sampled in the Azores, Madeira, Canary, and Cabo Verde archipelagos; whereas haplogroup β was absent from Cabo Verde

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Il lavoro è stato suddiviso in tre macro-aree. Una prima riguardante un'analisi teorica di come funzionano le intrusioni, di quali software vengono utilizzati per compierle, e di come proteggersi (usando i dispositivi che in termine generico si possono riconoscere come i firewall). Una seconda macro-area che analizza un'intrusione avvenuta dall'esterno verso dei server sensibili di una rete LAN. Questa analisi viene condotta sui file catturati dalle due interfacce di rete configurate in modalità promiscua su una sonda presente nella LAN. Le interfacce sono due per potersi interfacciare a due segmenti di LAN aventi due maschere di sotto-rete differenti. L'attacco viene analizzato mediante vari software. Si può infatti definire una terza parte del lavoro, la parte dove vengono analizzati i file catturati dalle due interfacce con i software che prima si occupano di analizzare i dati di contenuto completo, come Wireshark, poi dei software che si occupano di analizzare i dati di sessione che sono stati trattati con Argus, e infine i dati di tipo statistico che sono stati trattati con Ntop. Il penultimo capitolo, quello prima delle conclusioni, invece tratta l'installazione di Nagios, e la sua configurazione per il monitoraggio attraverso plugin dello spazio di disco rimanente su una macchina agent remota, e sui servizi MySql e DNS. Ovviamente Nagios può essere configurato per monitorare ogni tipo di servizio offerto sulla rete.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Grape berry is considered a non climacteric fruit, but there are some evidences that ethylene plays a role in the control of berry ripening. This PhD thesis aimed to give insights in the role of ethylene and ethylene-related genes in the regulation of grape berry ripening. During this study a small increase in ethylene concentration one week before véraison has been measured in Vitis vinifera L. ‘Pinot Noir’ grapes confirming previous findings in ‘Cabernet Sauvignon’. In addition, ethylene-related genes have been identified in the grapevine genome sequence. Similarly to other species, biosynthesis and ethylene receptor genes are present in grapevine as multi-gene families and their expression appeared tissue or developmental specific. All the other elements of the ethylene signal transduction cascade were also identified in the grape genome. Among them, there were ethylene response factors (ERF) which modulate the transcription of many effector genes in response to ethylene. In this study seven grapevine ERFs have been characterized and they showed tissue and berry development specific expression profiles. Two sequences, VvERF045 and VvERF063, seemed likely involved in berry ripening control due to their expression profiles and their sequence annotation. VvERF045 was induced before véraison and was specific of the ripe berry, by sequence similarity it was likely a transcription activator. VvERF063 displayed high sequence similarity to repressors of transcription and its expression, very high in green berries, was lowest at véraison and during ripening. To functionally characterize VvERF045 and VvERF063, a stable transformation strategy was chosen. Both sequences were cloned in vectors for over-expression and silencing and transferred in grape by Agrobacterium-mediated or biolistic-mediated gene transfer. In vitro, transgenic VvERF045 over-expressing plants displayed an epinastic phenotype whose extent was correlated to the transgene expression level. Four pathogen stress response genes were significantly induced in the transgenic plants, suggesting a putative function of VvERF045 in biotic stress defense during berry ripening. Further molecular analysis on the transgenic plants will help in identifying the actual VvERF045 target genes and together with the phenotypic characterization of the adult transgenic plants, will allow to extensively define the role of VvERF045 in berry ripening.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Die Induktion regulatorischer T-Zellen (Treg) spielt im Zusammenhang mit der Kontrolle allergenspezifischer Reaktionen, insbesondere auch im Rahmen einer erfolgreichen Hyposensibilisierung mit hohen Allergendosen, eine zentrale Rolle. In der vorliegenden Arbeit wurden die Mechanismen der Rekrutierung allergenspezifischer Treg daher in einem Mausmodell untersucht, in dem analog zur spezifischen Immuntherapie (SIT) die repetitive Verabreichung von hohen Antigendosen einen IgE-spezifischen Suppressionsmechanismus aktiviert, während die Injektion niedriger Antigendosen eine potente IgE-Antwort induziert. Th1-Zellen sowie konventionelle CD4+CD25+ oder CD8+CD28- Treg konnten als Vermittlerpopulationen des suppressiven Effektes in hochdosig immunisierten Mäusen ausgeschlossen werden. Mittels Transferexperimenten wurden erstmals CD4-CD8- doppelt negative Treg als eine die IgE-Suppression vermittelnde Zellpopulation identifiziert. Desweiteren wurden DNA-Transferexperimente durchgeführt, mit dem Ziel, adaptive Treg zum Zwecke der Inhibition allergenspezifischer Immunreaktionen zu induzieren. Dazu wurden IL-10- bzw. TGF-ß-kodierende Plasmide (pCMV-IL-10, pCMV-TGF-ß) hergestellt und in Kombination mit einem Plasmid, welches das Modellallergen ß-Galaktosidase (ßGal) unter der Kontrolle des DC-spezifischen Fascin-Promotors (pFascin-ßGal) kodierte, Mäusen mit der Genpistole appliziert. Die Expression des Modellallergens in Verbindung mit der konstitutiven Produktion von immunsuppressiven Zytokinen sollte bei den mit den transfizierten DC interagierenden antigenspezifischen T-Zellen zu einer verstärkten Differenzierung von Treg führen. Die Experimente zeigten, dass die Koapplikation von IL-10-kodierenden Plasmiden eine Immunsuppression induziert, die sich in einer verminderten antigenspezifischen Antikörperproduktion, Zytokinproduktion und CTL-Induktion zeigt, die jedoch bei nachfolgender Sensibilisierung mit ßGal-Protein nicht aufrechterhalten werden kann. Dahingegen führte die Koapplikation von TGF-ß-kodierenden Plasmiden verbunden mit einer nachfolgenden Sensibilisierung zu einer leichten Inhibition der IgG1- und IgG2a-Produktion verglichen mit der Vakzinierung mit pFascin-ßGal allein. Dieser inhibitorische Effekt von pCMV-TGF-ß wurde interessanterweise nicht bereits nach der DNA-Immunisierung, sondern erst nach Sensibilisierung mit dem Protein beobachtet.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Diese Arbeit analysiert den Alltag in einem gymnasialen Jungeninternat in der Upper West Region in Ghana und setzt diese Analyse in eine anthropologische Perspektive zum Staat. Angeregt durch die Überlegungen von Michel Foucault zu Disziplinarmechanismen und „Technologien des Selbst“ steht die alltägliche Disziplinierung der Schüler im Mittelpunkt dieser Arbeit. Dabei wird Disziplin nicht als restriktiv, übergeordnet und allgegenwärtig gedacht, sondern als etwas, das die Schüler aktiv mitgestalten. Einerseits sind die Schüler der Nandom Secondary School Disziplinartechniken ausgesetzt, die sich auf die Kontrolle ihrer Körper beziehen: Sie werden vereinheitlicht, klassifiziert, hierarchisiert, überwacht, geprüft und bestraft. Andererseits sind die Schüler keine übermächtigten Objekte einer totalen Institution, sondern sie wirken kreativ mit beim Flechten des Netzes aus Kontrolle und Freiräumen in ihrer Schule: Sie spielen eine wichtige Rolle bei der Kontrolle der Lehrer; sie erkennen und nutzen Freiräume, deren Rahmen sie mit den Lehrern aushandeln. Auch ihr Selbst bekommen die Schüler nicht von den Lehrern einfach diktiert. Zwar wird ihnen durch das Bild des guten Schülers eine bestimmte Sicht auf sich selbst nahe gelegt, doch wie sie dieses Bild aufnehmen, ablehnen oder umdeuten liegt in ihren eigenen Händen.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Progress in miniaturization of electronic components and design of wireless systems paved the way towards ubiquitous and pervasive communications, enabling anywhere and anytime connectivity. Wireless devices present on, inside, around the human body are becoming commonly used, leading to the class of body-centric communications. The presence of the body with all its peculiar characteristics has to be properly taken into account in the development and design of wireless networks in this context. This thesis addresses various aspects of body-centric communications, with the aim of investigating network performance achievable in different scenarios. The main original contributions pertain to the performance evaluation for Wireless Body Area Networks (WBANs) at the Medium Access Control layer: the application of Link Adaptation to these networks is proposed, Carrier Sense Multiple Access with Collision Avoidance algorithms used for WBAN are extensively investigated, coexistence with other wireless systems is examined. Then, an analytical model for interference in wireless access network is developed, which can be applied to the study of communication between devices located on humans and fixed nodes of an external infrastructure. Finally, results on experimental activities regarding the investigation of human mobility and sociality are presented.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The Internet of Things (IoT) is the next industrial revolution: we will interact naturally with real and virtual devices as a key part of our daily life. This technology shift is expected to be greater than the Web and Mobile combined. As extremely different technologies are needed to build connected devices, the Internet of Things field is a junction between electronics, telecommunications and software engineering. Internet of Things application development happens in silos, often using proprietary and closed communication protocols. There is the common belief that only if we can solve the interoperability problem we can have a real Internet of Things. After a deep analysis of the IoT protocols, we identified a set of primitives for IoT applications. We argue that each IoT protocol can be expressed in term of those primitives, thus solving the interoperability problem at the application protocol level. Moreover, the primitives are network and transport independent and make no assumption in that regard. This dissertation presents our implementation of an IoT platform: the Ponte project. Privacy issues follows the rise of the Internet of Things: it is clear that the IoT must ensure resilience to attacks, data authentication, access control and client privacy. We argue that it is not possible to solve the privacy issue without solving the interoperability problem: enforcing privacy rules implies the need to limit and filter the data delivery process. However, filtering data require knowledge of how the format and the semantics of the data: after an analysis of the possible data formats and representations for the IoT, we identify JSON-LD and the Semantic Web as the best solution for IoT applications. Then, this dissertation present our approach to increase the throughput of filtering semantic data by a factor of ten.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The complex process of gait is rendered partially automatic by central pattern generators (CPGs). To further our understanding of their role in gait control in healthy subjects, we applied a paradigm of anti-phase, or syncopated, movement to gait. To provide a context for our results, we reviewed the literature on in-phase, or synchronized, gait. The review results are as follows. Auditory cueing increased step/stride rate for older subjects, but not younger. Stride rate variability decreased for younger subjects, perhaps because the metronome’s cue acted as a temporal ‘anchor point’ for each step. Step width increased in half of the treadmill studies, but none of the overground ones, suggesting a cumulative effect of the attentional demands of synchronizing gait while on a treadmill. Time series analysis revealed that the α exponent was the most sensitive parameter reported, decreasing toward anti-persistence in almost all cued-gait studies. This project compares in-phase (IN) and anti-phase gait (ANTI) in young and old healthy subjects. We expected gait to be less disrupted during ANTI trials at preferred speed, when the facilitating effect of CPGs would be strongest. The measures step time variability, jerk index, and harmonic ratio quantified gait perturbation: none indicated that ANTI was easiest at preferred walking speed. Surprisingly, the gait of older subjects was no more perturbed than that of younger subjects. When they successfully matched the pace of the beat, they unwittingly synchronized to it. The temporal relationship of their steps to the beat was the same in the IN and ANTI conditions. Younger subjects, visibly struggling during ANTI trials, were able to walk in syncopation. This result suggests that cognitive resources available only to the younger group are required to resist synchronizing to the beat.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This doctoral thesis describes the extension of the resonance ionization laser ion source RILIS at CERN/ISOLDE by the addition of an all-solid state tunable titanium:sapphire (Ti:Sa) laser system to complement the well-established system of dye lasers. Synchronous operation of the so called Dual RILIS system of Ti:Sa and dye lasers was investigated and the potential for increased ion beam intensity, reliability, and reduced setup time has been demonstrated. In-source resonance ionization spectroscopy was performed at ISOLDE/CERN and at ISAC/TRIUMF radioactive ion beam facilities to develop an efficient and selective three-colour ionization scheme for the purely radioactive element astatine. A LabVIEW based monitoring, control and measurement system was conceived which enabled, in conjunction with Dual RILIS operation, the spectroscopy of high lying Rydberg states, from which the ionization potential of the astatine atom was determined for the first time experimentally.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Dall'analisi dei big data si possono trarre degli enormi benefici in svariati ambiti applicativi. Uno dei fattori principali che contribuisce alla ricchezza dei big data, consiste nell'uso non previsto a priori di dati immagazzinati in precedenza, anche in congiunzione con altri dataset eterogenei: questo permette di trovare correlazioni significative e inaspettate tra i dati. Proprio per questo, il Valore, che il dato potenzialmente porta con sè, stimola le organizzazioni a raccogliere e immagazzinare sempre più dati e a ricercare approcci innovativi e originali per effettuare analisi su di essi. L’uso fortemente innovativo che viene fatto dei big data in questo senso e i requisiti tecnologici richiesti per gestirli hanno aperto importanti problematiche in materia di sicurezza e privacy, tali da rendere inadeguati o difficilmente gestibili, gli strumenti di sicurezza utilizzati finora nei sistemi tradizionali. Con questo lavoro di tesi si intende analizzare molteplici aspetti della sicurezza in ambito big data e offrire un possibile approccio alla sicurezza dei dati. In primo luogo, la tesi si occupa di comprendere quali sono le principali minacce introdotte dai big data in ambito di privacy, valutando la fattibilità delle contromisure presenti all’attuale stato dell’arte. Tra queste anche il controllo dell’accesso ha riscontrato notevoli sfide causate dalle necessità richieste dai big data: questo elaborato analizza pregi e difetti del controllo dell’accesso basato su attributi (ABAC), un modello attualmente oggetto di discussione nel dibattito inerente sicurezza e privacy nei big data. Per rendere attuabile ABAC in un contesto big data, risulta necessario l’ausilio di un supporto per assegnare gli attributi di visibilità alle informazioni da proteggere. L’obiettivo di questa tesi consiste nel valutare fattibilità, caratteristiche significative e limiti del machine learning come possibile approccio di utilizzo.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Increased body mass index (BMI), as an approximation of body adiposity, is a risk factor for developing several adult malignancies. To quantify these risks, we reported a comprehensive systematic review (Lancet 2008; 371: 569-78) of prospective observational studies determining associations between BMI and risk of incident cancer for 20 cancer types. We demonstrated that associations are: (i) sex-specific; (ii) exist for a wider range of malignancies than previously thought; and (iii) are broadly consistent across geographic populations. In the present paper, we tested these data against the Bradford-Hill criteria of causal association, and argue that the available data support strength of association, consistency, specificity, temporality, biological gradient, plausibility, coherence and probably analogy. However, the experimental evidence supporting reversibility is currently lacking, though indirect evidence from longitudinal data in cohort studies and long-term follow-up post-bariatric surgery is emerging. We additionally assessed these data against appropriate adjustment for available confounding factors; measurement error and study design; and residual confounding; and found lack of alternative explanations. We conclude that there is considerable evidence to support a causal association between BMI and risk for many cancer types, but in order to establish the role of weight control in cancer prevention, there is a need to develop trial frameworks in which to better test reversibility.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Dimensional modeling, GT-Power in particular, has been used for two related purposes-to quantify and understand the inaccuracies of transient engine flow estimates that cause transient smoke spikes and to improve empirical models of opacity or particulate matter used for engine calibration. It has been proposed by dimensional modeling that exhaust gas recirculation flow rate was significantly underestimated and volumetric efficiency was overestimated by the electronic control module during the turbocharger lag period of an electronically controlled heavy duty diesel engine. Factoring in cylinder-to-cylinder variation, it has been shown that the electronic control module estimated fuel-Oxygen ratio was lower than actual by up to 35% during the turbocharger lag period but within 2% of actual elsewhere, thus hindering fuel-Oxygen ratio limit-based smoke control. The dimensional modeling of transient flow was enabled with a new method of simulating transient data in which the manifold pressures and exhaust gas recirculation system flow resistance, characterized as a function of exhaust gas recirculation valve position at each measured transient data point, were replicated by quasi-static or transient simulation to predict engine flows. Dimensional modeling was also used to transform the engine operating parameter model input space to a more fundamental lower dimensional space so that a nearest neighbor approach could be used to predict smoke emissions. This new approach, intended for engine calibration and control modeling, was termed the "nonparametric reduced dimensionality" approach. It was used to predict federal test procedure cumulative particulate matter within 7% of measured value, based solely on steady-state training data. Very little correlation between the model inputs in the transformed space was observed as compared to the engine operating parameter space. This more uniform, smaller, shrunken model input space might explain how the nonparametric reduced dimensionality approach model could successfully predict federal test procedure emissions when roughly 40% of all transient points were classified as outliers as per the steady-state training data.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

BACKGROUND: As chondrosarcomas are resistant to chemotherapy and ionizing radiation, therapeutic options are limited. Radical surgery often cannot be performed. Therefore, additional therapies such as antiangiogenesis represent a promising strategy for overcoming limitations in chondrosarcoma therapy. There is strong experimental evidence that SU6668, an inhibitor of the angiogenic tyrosine kinases Flk-1/KDR, PDGFRbeta and FGFR1 can induce growth inhibition of various primary tumors. However, the effectiveness of SU6668 on malignant primary bone tumors such as chondrosarcomas has been rarely investigated. Therefore, the aim of this study was to investigate the effects of SU6668 on chondrosarcoma growth, angiogenesis and microcirculation in vivo. METHODS: In 10 male severe combined immunodeficient (SCID) mice, pieces of SW1353 chondrosarcomas were implanted into a cranial window preparation where the calvaria serves as the site for the orthotopic implantation of bone tumors. From day 7 after tumor implantation, five animals were treated with SU6668 (250 mg/kg body weight, s.c.) at intervals of 48 hours (SU6668), and five animals with the equivalent amount of the CMC-based vehicle (Control). Angiogenesis, microcirculation, and growth of SW 1353 tumors were analyzed by means of intravital microscopy. RESULTS: SU6668 induced a growth arrest of chondrosarcomas within 7 days after the initiation of the treatment. Compared to Controls, SU6668 decreased functional vessel density and tumor size, respectively, by 37% and 53% on day 28 after tumor implantation. The time course of the experiments demonstrated that the impact on angiogenesis preceded the anti-tumor effect. Histological and immunohistochemical results confirmed the intravital microscopy findings. CONCLUSION: SU6668 is a potent inhibitor of chondrosarcoma tumor growth in vivo. This effect appears to be induced by the antiangiogenic effects of SU6668, which are mediated by the inhibition of the key angiogenic receptor tyrosine kinases Flk-1/KDR, PDGFRbeta and FGFR1. The experimental data obtained provide rationale to further develop the strategy of the use of the angiogenesis inhibitor SU6668 in the treatment of chondrosarcomas in addition to established therapies such as surgery.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

With today's prevalence of Internet-connected systems storing sensitive data and the omnipresent threat of technically skilled malicious users, computer security remains a critically important field. Because of today's multitude of vulnerable systems and security threats, it is vital that computer science students be taught techniques for programming secure systems, especially since many of them will work on systems with sensitive data after graduation. Teaching computer science students proper design, implementation, and maintenance of secure systems is a challenging task that calls for the use of novel pedagogical tools. This report describes the implementation of a compiler that converts mandatory access control specification Domain-Type Enforcement Language to the Java Security Manager, primarily for pedagogical purposes. The implementation of the Java Security Manager was explored in depth, and various techniques to work around its inherent limitations were explored and partially implemented, although some of these workarounds do not appear in the current version of the compiler because they would have compromised cross-platform compatibility. The current version of the compiler and implementation details of the Java Security Manager are discussed in depth.