925 resultados para Iris (Eye)
Resumo:
En esta tesis, en su primera parte, se desarrollan modelos matemáticos para tratar de predecir el crecimiento en condiciones normales de cultivo de las siguientes especies: Trucha arco iris (Salmo garidneri), salmón (Salmón salar), tenca (Tinca tinca), anguila (Anguilla anguilla), rodaballo (Scophthalmus maximus), lenguado (Solea solea), lubina (Dicentrarchus labrax), dorada (Sparus aurata) y seriola japonesa (Seriola quinqueradiata). En la segunda parte, en base a postulados fisiológicos, se desarrollan modelos bioenergéticos que tratan de cuantificar la alimentación, crecimiento, respiración, excreción de productos nitrogenados y pérdidas fecales, en función de la tasa de alimentación, para las especies indicadas anteriormente. En la tercera parte se indican posibles utilizaciones de estos modelos para el cálculo del planning de producción, necesidades de agua y necesidades de estanques, para el caso de un cultivo intensivo de estas especies. ABSTRACT In this Doctorate Thesis, the first part is dedicated to the development of mathematical models, in order to estimate the growth, under normal culture conditions, of the following species: Rainbow trout (Salmo gairdneri)/ salmon (Salmo salara, tench (Tinca tinca), eel (Anguilla anguilla), turbot (Scophthalmus maximus), sole (Solea solea), seabass (Dicentrarchus labrax), seabream (Sparus aurata), and yellowtail (Seriola guingueradiata). In the second part, in basis to physiological postulates, bioenergetic models are developed. These models try to quantify the feeding, growth, excretion of nitrogenous and fecal products, according to the feeding rate, for the above mentioned species. In the third part, possible aplications of these models are indicated, including the production planning as well as water pond requirements for an intensive culture of the mentioned species.
Resumo:
The use of Biophotonic Sensing Cells (BICELLs) based on micro-nano pattemed photonic architectures has been recently proven as an efficient methodology for label-free biosensing by using Optical Interrogation [1]. According to this, we have studied the different optical response for a specific typology of BICELL, consisting of structures of SU -8. This material is biocompatible with different types of biomolecules and can be immobilized on its sensing surface. In particular, we have measured the optical response for a biomarker in clinic diagnostic of dry eye. Although different proteins can be enstudied such as: PRDX5, ANXA 1, ANXA 11, CST 4, PLAA Y S 1 OOA6 related with ocular surface (dry eye), for this work PLAA (phospholipase A2) is studied by means of label free biosensing based on BICELLs for analyzing the performance and specificity according with means values of concentration in ROC curves.
Resumo:
El Daño Cerebral Adquirido (DCA) se ha convertido en una de las principales causas de discapacidad neurológica de las sociedades desarrolladas. La alteración de las funciones cognitivas como consecuencia del DCA, limita no sólo la calidad de vida del paciente sino también la de las persona de su entorno. Aunque la neurorrehabilitación permite recuperar algunas de las funciones alteradas aprovechando la naturaleza plástica del sistema nervioso, su práctica siguiendo procesos tradicionales no permiten en muchos casos ajustarse a las necesidades de cada individuo ni, en general, cubrir todos los aspectos necesarios que conviertan al proceso rehabilitador en un tratamiento realmente efectivo. La incorporación al proceso de rehabilitación de las nuevas tecnologías ha permitido aumentar la intensidad del tratamiento, personalizando y prolongándolo en el tiempo de forma sostenible. Los entornos virtuales (EV) apoyados en esta tendencia permiten reproducir Actividades de Vida Diaria (AVD) controladas que incrementan el valor ecológico de las terapias. Este Trabajo Fin de Grado aborda el uso pionero de la tecnología de Vídeo Interactivo (VI) para el desarrollo de dichos entornos en el campo de la rehabilitación cognitiva. En concreto, el objetivo del TFG es la evaluación de un EV de rehabilitación desarrollado mediante tecnología de VI e integrado con un sistema de Eye-Tracking, capaz de capturar y analizar la información referente al comportamiento visual del paciente. Para este fin, se realiza el diseño, implementación y evaluación de un estudio experimental que registre el comportamiento de diferentes sujetos ante dos modalidades de AVD.
Resumo:
El extraordinario auge de las nuevas tecnologías de la información, el desarrollo de la Internet de las Cosas, el comercio electrónico, las redes sociales, la telefonía móvil y la computación y almacenamiento en la nube, han proporcionado grandes beneficios en todos los ámbitos de la sociedad. Junto a éstos, se presentan nuevos retos para la protección y privacidad de la información y su contenido, como la suplantación de personalidad y la pérdida de la confidencialidad e integridad de los documentos o las comunicaciones electrónicas. Este hecho puede verse agravado por la falta de una frontera clara que delimite el mundo personal del mundo laboral en cuanto al acceso de la información. En todos estos campos de la actividad personal y laboral, la Criptografía ha jugado un papel fundamental aportando las herramientas necesarias para garantizar la confidencialidad, integridad y disponibilidad tanto de la privacidad de los datos personales como de la información. Por otro lado, la Biometría ha propuesto y ofrecido diferentes técnicas con el fin de garantizar la autentificación de individuos a través del uso de determinadas características personales como las huellas dáctilares, el iris, la geometría de la mano, la voz, la forma de caminar, etc. Cada una de estas dos ciencias, Criptografía y Biometría, aportan soluciones a campos específicos de la protección de datos y autentificación de usuarios, que se verían enormemente potenciados si determinadas características de ambas ciencias se unieran con vistas a objetivos comunes. Por ello es imperativo intensificar la investigación en estos ámbitos combinando los algoritmos y primitivas matemáticas de la Criptografía con la Biometría para dar respuesta a la demanda creciente de nuevas soluciones más técnicas, seguras y fáciles de usar que potencien de modo simultáneo la protección de datos y la identificacíón de usuarios. En esta combinación el concepto de biometría cancelable ha supuesto una piedra angular en el proceso de autentificación e identificación de usuarios al proporcionar propiedades de revocación y cancelación a los ragos biométricos. La contribución de esta tesis se basa en el principal aspecto de la Biometría, es decir, la autentificación segura y eficiente de usuarios a través de sus rasgos biométricos, utilizando tres aproximaciones distintas: 1. Diseño de un esquema criptobiométrico borroso que implemente los principios de la biometría cancelable para identificar usuarios lidiando con los problemas acaecidos de la variabilidad intra e inter-usuarios. 2. Diseño de una nueva función hash que preserva la similitud (SPHF por sus siglas en inglés). Actualmente estas funciones se usan en el campo del análisis forense digital con el objetivo de buscar similitudes en el contenido de archivos distintos pero similares de modo que se pueda precisar hasta qué punto estos archivos pudieran ser considerados iguales. La función definida en este trabajo de investigación, además de mejorar los resultados de las principales funciones desarrolladas hasta el momento, intenta extender su uso a la comparación entre patrones de iris. 3. Desarrollando un nuevo mecanismo de comparación de patrones de iris que considera tales patrones como si fueran señales para compararlos posteriormente utilizando la transformada de Walsh-Hadarmard. Los resultados obtenidos son excelentes teniendo en cuenta los requerimientos de seguridad y privacidad mencionados anteriormente. Cada uno de los tres esquemas diseñados han sido implementados para poder realizar experimentos y probar su eficacia operativa en escenarios que simulan situaciones reales: El esquema criptobiométrico borroso y la función SPHF han sido implementados en lenguaje Java mientras que el proceso basado en la transformada de Walsh-Hadamard en Matlab. En los experimentos se ha utilizado una base de datos de imágenes de iris (CASIA) para simular una población de usuarios del sistema. En el caso particular de la función de SPHF, además se han realizado experimentos para comprobar su utilidad en el campo de análisis forense comparando archivos e imágenes con contenido similar y distinto. En este sentido, para cada uno de los esquemas se han calculado los ratios de falso negativo y falso positivo. ABSTRACT The extraordinary increase of new information technologies, the development of Internet of Things, the electronic commerce, the social networks, mobile or smart telephony and cloud computing and storage, have provided great benefits in all areas of society. Besides this fact, there are new challenges for the protection and privacy of information and its content, such as the loss of confidentiality and integrity of electronic documents and communications. This is exarcebated by the lack of a clear boundary between the personal world and the business world as their differences are becoming narrower. In both worlds, i.e the personal and the business one, Cryptography has played a key role by providing the necessary tools to ensure the confidentiality, integrity and availability both of the privacy of the personal data and information. On the other hand, Biometrics has offered and proposed different techniques with the aim to assure the authentication of individuals through their biometric traits, such as fingerprints, iris, hand geometry, voice, gait, etc. Each of these sciences, Cryptography and Biometrics, provides tools to specific problems of the data protection and user authentication, which would be widely strengthen if determined characteristics of both sciences would be combined in order to achieve common objectives. Therefore, it is imperative to intensify the research in this area by combining the basics mathematical algorithms and primitives of Cryptography with Biometrics to meet the growing demand for more secure and usability techniques which would improve the data protection and the user authentication. In this combination, the use of cancelable biometrics makes a cornerstone in the user authentication and identification process since it provides revocable or cancelation properties to the biometric traits. The contributions in this thesis involve the main aspect of Biometrics, i.e. the secure and efficient authentication of users through their biometric templates, considered from three different approaches. The first one is designing a fuzzy crypto-biometric scheme using the cancelable biometric principles to take advantage of the fuzziness of the biometric templates at the same time that it deals with the intra- and inter-user variability among users without compromising the biometric templates extracted from the legitimate users. The second one is designing a new Similarity Preserving Hash Function (SPHF), currently widely used in the Digital Forensics field to find similarities among different files to calculate their similarity level. The function designed in this research work, besides the fact of improving the results of the two main functions of this field currently in place, it tries to expand its use to the iris template comparison. Finally, the last approach of this thesis is developing a new mechanism of handling the iris templates, considering them as signals, to use the Walsh-Hadamard transform (complemented with three other algorithms) to compare them. The results obtained are excellent taking into account the security and privacy requirements mentioned previously. Every one of the three schemes designed have been implemented to test their operational efficacy in situations that simulate real scenarios: The fuzzy crypto-biometric scheme and the SPHF have been implemented in Java language, while the process based on the Walsh-Hadamard transform in Matlab. The experiments have been performed using a database of iris templates (CASIA-IrisV2) to simulate a user population. The case of the new SPHF designed is special since previous to be applied i to the Biometrics field, it has been also tested to determine its applicability in the Digital Forensic field comparing similar and dissimilar files and images. The ratios of efficiency and effectiveness regarding user authentication, i.e. False Non Match and False Match Rate, for the schemes designed have been calculated with different parameters and cases to analyse their behaviour.
Resumo:
A pesar de la variedad de sistemas biométricos existentes, los métodos de reconocimiento de usuarios mediante iris son uno de los procedimientos más fiables a la hora de identificar a una persona. Estos implementan un procedimiento secuencial dividido en cuatro etapas: captura de la muestra, pre-procesado, extracción de características y comparación de patrones. Uno de los algoritmos más utilizados es el propuesto por John Daugman, cuyo sistema de reconocimiento de iris se basa en filtros de Gabor en la etapa de extracción de características. El objetivo de este trabajo es proponer y evaluar un sistema de reconocimiento de iris alternativo basado, en este caso, en filtros de Sobel. El sistema se implementa en Matlab, realizándose un estudio comparativo de las tasas de error de ambos sistemas, en la arquitectura de verificación. La base de datos utilizada para la evaluación de la tarea propuesta es la CASIA-IrisV1 formada por un total de 756 muestras tomadas de manera manual y con una iluminación uniforme.
Resumo:
The dynamic characteristics of reflex eye movements were measured in two strains of chronically prepared mice by using an infrared television camera system. The horizontal vestibulo-ocular reflex (HVOR) and horizontal optokinetic response (HOKR) were induced by sinusoidal oscillations of a turntable, in darkness, by 10° (peak to peak) at 0.11–0.50 Hz and of a checked-pattern screen, in light, by 5–20°at 0.11–0.17 Hz, respectively. The gains and phases of the HVOR and HOKR of the C57BL/6 mice were nearly equivalent to those of rabbits and rats, whereas the 129/Sv mice exhibited very low gains in the HVOR and moderate phase lags in the HOKR, suggesting an inherent sensory-motor anomaly. Adaptability of the HOKR was examined in C57BL/6 mice by sustained screen oscillation. When the screen was oscillated by 10° at 0.17 Hz, which induced sufficient retinal slips, the gain of the HOKR increased by 0.08 in 1 h on average, whereas the stimuli that induced relatively small or no retinal slips affected the gain very little. Lesions of the flocculi induced by local applications of 0.1% ibotenic acid and lesions of the inferior olivary nuclei induced by i.p. injection of 3-acetylpyridine in C57BL/6 mice little affected the dynamic characteristics of the HVOR and HOKR, but abolished the adaptation of the HOKR. These results indicate that the olivo-floccular system plays an essential role in the adaptive control of the ocular reflex in mice, as suggested in other animal species. The data presented provide the basis for analyzing the reflex eye movements of genetically engineered mice.
Resumo:
A novel method of P-element mutagenesis is described for the isolation of mutants affecting the development of the Drosophila compound eye. It exploits the interaction between the Bride of Sevenless (Boss) ligand and the Sevenless (Sev) receptor tyrosine kinase that triggers the formation of the UV-sensitive photoreceptor neuron, R7. Transposition of a boss cDNA transgene, in an otherwise boss mutant background, was used as a “phenotypic trap” in live flies to identify enhancers expressed during a narrow time window in eye development. Using a rapid behavioral screen, more than 400,000 flies were tested for restoration of R7. Some 1,800 R7-containing flies were identified. Among these, 21 independent insertions with expression of the boss reporter gene in the R8 cell were identified by a external eye morphology and staining with an antibody against Boss. Among 900 lines with expression of the boss reporter gene in multiple cells assessed for homozygous mutant phenotypes, insertions in the marbles, glass, gap1, and fasciclin II genes were isolated. This phenotypic enhancer-trap facilitates (i) the isolation of enhancer-traps with a specific expression pattern, and (ii) the recovery of mutants disrupting development of specific tissues. Because the temporal and tissue specificity of the phenotypic trap is dependent on the choice of the marker used, this approach can be extended to other tissues and developmental stages.
Resumo:
Insights into the function of a gene can be gained in multiple ways, including loss-of-function phenotype, sequence similarity, expression pattern, and by the consequences of its misexpression. Analysis of the phenotypes produced by expression of a gene at an abnormal time, place, or level may provide clues to a gene’s function when other approaches are not illuminating. Here we report that an eye-specific, enhancer–promoter present in the P element expression vector pGMR is able to drive high level expression in the eye of genes near the site of P element insertion. Cell fate determination, differentiation, proliferation, and death are essential for normal eye development. Thus the ability to carry out eye-specific misexpression of a significant fraction of genes in the genome, given the dispensability of the eye for viability and fertility of the adult, should provide a powerful approach for identifying regulators of these processes. To test this idea we carried out two overexpression screens for genes that function to regulate cell death. We screened for insertion-dependent dominant phenotypes in a wild-type background, and for dominant modifiers of a reaper overexpression-induced small eye phenotype. Multiple chromosomal loci were identified, including an insertion 5′ to hid, a potent inducer of apoptosis, and insertions 5′ to DIAP1, a cell death suppressor. To facilitate the cloning of genes near the P element insertion new misexpression vectors were created. A screen with one of these vectors identified eagle as a suppressor of a rough eye phenotype associated with overexpression of an activated Ras1 gene.
Resumo:
The homozygous disruption of the mouse AP-2 gene yields a complex and lethal phenotype that results from defective development of the neural tube, head, and body wall. The severe and pleiotropic developmental abnormalities observed in the knockout mouse suggested that AP-2 may regulate several morphogenic pathways. To uncouple the individual developmental mechanisms that are dependent on AP-2, we have now analyzed chimeric mice composed of both wild-type and AP-2-null cells. The phenotypes obtained from these chimeras indicate that there is an independent requirement for AP-2 in the formation of the neural tube, body wall, and craniofacial skeleton. In addition, these studies reveal that AP-2 exerts a major influence on eye formation, which is a critical new role for AP-2 that was masked previously in the knockout mice. Furthermore, we also have uncovered an unexpected influence of AP-2 on limb pattern formation; this influence is typified by major limb duplications. The range of phenotypes observed in the chimeras displays a significant overlap with those caused by teratogenic levels of retinoic acid, strongly suggesting that AP-2 is an important component of the mechanism of action of this morphogen.
Resumo:
Pax proteins, characterized by the presence of a paired domain, play key regulatory roles during development. The paired domain is a bipartite DNA-binding domain that contains two helix–turn–helix domains joined by a linker region. Each of the subdomains, the PAI and RED domains, has been shown to be a distinct DNA-binding domain. The PAI domain is the most critical, but in specific circumstances, the RED domain is involved in DNA recognition. We describe a Pax protein, originally called Lune, that is the product of the Drosophila eye gone gene (eyg). It is unique among Pax proteins, because it contains only the RED domain. eyg seems to play a role both in the organogenesis of the salivary gland during embryogenesis and in the development of the eye. A high-affinity binding site for the Eyg RED domain was identified by using systematic evolution of ligands by exponential enrichment techniques. This binding site is related to a binding site previously identified for the RED domain of the Pax-6 5a isoform. Eyg also contains another DNA-binding domain, a Prd-class homeodomain (HD), whose palindromic binding site is similar to other Prd-class HDs. The ability of Pax proteins to use the PAI, RED, and HD, or combinations thereof, may be one mechanism that allows them to be used at different stages of development to regulate various developmental processes through the activation of specific target genes.
Resumo:
The Drosophila fat facets gene encodes a deubiquitinating enzyme that regulates a cell communication pathway essential very early in eye development, prior to facet assembly, to limit the number of photoreceptor cells in each facet of the compound eye to eight. The Fat facets protein facilitates the production of a signal in cells outside the developing facets that inhibits neural development of particular facet precursor cells. Novel gain-of-function mutations in the Drosophila Rap1 and Ras1 genes are described herein that interact genetically with fat facets mutations. Analysis of these genetic interactions reveals that Fat facets has an additional function later in eye development involving Rap1 and Ras1 proteins. Moreover, the results suggest that undifferentiated cells outside the facet continue to influence facet assembly later in eye development.
Resumo:
Using patch-clamp capacitance and amperometric techniques, we have identified an exocytotic phenotype that affects the function of the fusion pore, the molecular structure that connects the lumen of a secretory vesicle with the extracellular environment during exocytosis. Direct observation of individual exocytotic events in mast cells from the ruby-eye mouse (ru/ru) showed a 3-fold increase in the fraction and duration of transient fusion events with respect to wild-type mice. The fraction of the total fusion events that were transient increased from 0.22 ± 0.02 (wild type) to 0.65 ± 0.02 (ru/ru), and the average duration of these events increased from 418 ± 32 ms (wild type) to 1207 ± 89 ms (ru/ru). We also show that this phenotype can reduce and delay an evoked secretory response by causing the fusion of vesicles that have been previously emptied by repeated cycles of transient fusion. The exocytotic phenotype that we describe here may be a cause of diseases like platelet storage pool deficiency and prolonged bleeding times for which the ruby-eye mouse serves as an animal model. Furthermore, the identification of the gene causing the fusion pore phenotype reported here will illuminate the molecular mechanisms regulating exocytotic fusion.
Resumo:
Inclui bibliografia.