939 resultados para GGDEF domain
Resumo:
Trypanosoma cruzi is a protozoan parasite that infects vertebrates, causing in humans a pathological condition known as Chagas` disease. The infection of host cells by T. cruzi involves a vast collection of molecules, including a family of 85 kDa GPI-anchored glycoproteins belonging to the gp85/trans-sialidase superfamily, which contains a conserved cell-binding sequence (VTVXNVFLYNR) known as FLY, for short. Herein, it is shown that BALB/c mice administered with a single dose (1 mu g/animal, intraperitoneally) of FLY-synthetic peptide are more susceptible to infection by T. cruzi, with increased systemic parasitaemia (2-fold) and mortality. Higher tissue parasitism was observed in bladder (7.6-fold), heart (3-fold) and small intestine (3.6-fold). Moreover, an intense inflammatory response and increment of CD4(+) T cells (1.7-fold) were detected in the heart of FLY-primed and infected animals, with a 5-fold relative increase of CD4(+)CD25(+)FoxP3(+) T (Treg) cells. Mice treated with anti-CD25 antibodies prior to infection, showed a decrease in parasitaemia in the FLY model employed. In conclusion, the results suggest that FLY facilitates in vivo infection by T. cruzi and concurs with other factors to improve parasite survival to such an extent that might influence the progression of pathology in Chagas` disease.
Resumo:
The rapid development of data transfer through internet made it easier to send the data accurate and faster to the destination. There are many transmission media to transfer the data to destination like e-mails; at the same time it is may be easier to modify and misuse the valuable information through hacking. So, in order to transfer the data securely to the destination without any modifications, there are many approaches like cryptography and steganography. This paper deals with the image steganography as well as with the different security issues, general overview of cryptography, steganography and digital watermarking approaches. The problem of copyright violation of multimedia data has increased due to the enormous growth of computer networks that provides fast and error free transmission of any unauthorized duplicate and possibly manipulated copy of multimedia information. In order to be effective for copyright protection, digital watermark must be robust which are difficult to remove from the object in which they are embedded despite a variety of possible attacks. The message to be send safe and secure, we use watermarking. We use invisible watermarking to embed the message using LSB (Least Significant Bit) steganographic technique. The standard LSB technique embed the message in every pixel, but my contribution for this proposed watermarking, works with the hint for embedding the message only on the image edges alone. If the hacker knows that the system uses LSB technique also, it cannot decrypt correct message. To make my system robust and secure, we added cryptography algorithm as Vigenere square. Whereas the message is transmitted in cipher text and its added advantage to the proposed system. The standard Vigenere square algorithm works with either lower case or upper case. The proposed cryptography algorithm is Vigenere square with extension of numbers also. We can keep the crypto key with combination of characters and numbers. So by using these modifications and updating in this existing algorithm and combination of cryptography and steganography method we develop a secure and strong watermarking method. Performance of this watermarking scheme has been analyzed by evaluating the robustness of the algorithm with PSNR (Peak Signal to Noise Ratio) and MSE (Mean Square Error) against the quality of the image for large amount of data. While coming to see results of the proposed encryption, higher value of 89dB of PSNR with small value of MSE is 0.0017. Then it seems the proposed watermarking system is secure and robust for hiding secure information in any digital system, because this system collect the properties of both steganography and cryptography sciences.
Resumo:
First-order temporal logic is a concise and powerful notation, with many potential applications in both Computer Science and Artificial Intelligence. While the full logic is highly complex, recent work on monodic first-order temporal logics has identified important enumerable and even decidable fragments. In this paper, we develop a clausal resolution method for the monodic fragment of first-order temporal logic over expanding domains. We first define a normal form for monodic formulae and then introduce novel resolution calculi that can be applied to formulae in this normal form. We state correctness and completeness results for the method. We illustrate the method on a comprehensive example. The method is based on classical first-order resolution and can, thus, be efficiently implemented.
Resumo:
In the domain of aerospace aftermarkets, which often has long supply chains that feed into the maintenance of aircraft, contracts are used to establish agreements between aircraft operators and maintenance suppliers. However, violations at the bottom of the supply chain (part suppliers) can easily cascade to the top (aircraft operators), making it difficult to determine the source of the violation, and seek to address it. In this context, we have developed a global monitoring architecture that ensures the detection of norm violations and generates explanations for the origin of violations. In this paper, we describe the implementation and deployment of a global monitor in the aerospace domain of [8] and show how it generates explanations for violations within the maintenance supply chain. We show how these explanations can be used not only to detect violations at runtime, but also to uncover potential problems in contracts before their deployment, thus improving them.
Resumo:
In industrial polymer and synthetic rubber production facilities, workers are exposed to 1,3-butadiene. This compound is converted in vivo to 1,2,3,4-diepoxybutane (DEB) and has been linked to increased incidences of cancer in these individuals. Carcinogenesis has been attributed to formation of DEB induced DNA interstrand cross-links. Previous studies have demonstrated that DEB cross-links deoxyguanosine residues within 5'-GNC sequences in synthetic DNA, in restriction fragments, and in defined sequence nucleosomes. The current study utilized the polymerase chain reaction (PCR) to examine DEB damage frequencies within nuclear genes, found within "open" regions of chromatin, as compared to regions of unexpressed sequence that reside in tightly packed, "closed" chromatin, to more closely model DEB reactivity in vivo. These initial studies have been performed in chicken liver homogenates. Preliminarily, we have found a dose-dependent DEB lesion-forming response within "open" chromatin. DEB appears to have little-to-no effect upon regions of "closed" chromatin.
Resumo:
Diepoxybutane (DEB), a known industrial carcinogen, reacts with DNA primarily at the N7 position of deoxyguanosine residues and creates interstrand cross-links at the sequence 5'-GNC. Since N7-N7 cross-links cause DNA to fragment upon heating, quantative polymerase chain reaction (QPCR) is being used in this experiment to measure the amount of DEB damage (lesion frequency) with three different targets-mitochondrial (unpackaged), open chromatin region, and closed chromatin region. Initial measurements of DEB damage within these three targets were not consistent because the template DNA was not the limiting reagent in the PCR. Follow-up PCR trials using a limiting amount of DNA are still in progress although initial experimentation looks promising. Sequencing of these three targets to confirm the primer targets has only been successfully performed for the closed chromatin target and does not match the sequence from NIH used to design that primer pair. Further sequencing trials need to be conducted on all three targets to assure that a mitochondrial, open chromatin, and closed chromatin region are actually being amplified in this experimental series.
Resumo:
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)
Resumo:
Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)
Resumo:
Conselho Nacional de Desenvolvimento Científico e Tecnológico (CNPq)
Resumo:
In this work, a boundary element formulation to analyse plates reinforced by rectangular beams, with columns defined in the domain is proposed. The model is based on Kirchhoff hypothesis and the beams are not required to be displayed over the plate surface, therefore eccentricity effects are taken into account. The presented boundary element method formulation is derived by applying the reciprocity theorem to zoned plates, where beams are treated as thin sub-regions with larger rigidities. The integral representations derived for this complex structural element consider the bending and stretching effects of both structural elements working together. The standard equilibrium and compatibility conditions along interface are naturally imposed, being the bending tractions eliminated along interfaces. The in-plane tractions and the bending and in-plane displacements are approximated along the beam width, reducing the number of degrees of freedom. The columns are introduced into the formulation by considering domain points where tractions can be prescribed. Some examples are then shown to illustrate the accuracy of the formulation, comparing the obtained results with other numerical solutions.
Resumo:
Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)
Resumo:
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)