525 resultados para shadow
Resumo:
Incluye Bibliografía
Resumo:
Includes bibliography
Resumo:
Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)
Resumo:
Abstract Background Nectar reabsorption is a widely known phenomenon, related to the strategy of resource-recovery and also to maintain the nectar homeostasis at the nectary. The method currently performed to demonstrate nectar being reabsorbed involves the use of radioactive tracers applied to the nectary. Although this method works perfectly, it is complex and requires specific supplies and equipment. Therefore, here we propose an efficient method to obtain a visual demonstration of nectar reabsorption, adapting the use of Lucifer Yellow CH (LYCH), a fluorescent membrane-impermeable dye that can enter the vacuole by endocytosis. Results We applied a LYCH solution to the floral nectary (FN) of Cucurbita pepo L., which is a species known for its ability of nectar reabsorption, and to the extrafloral nectary (EFN) of Passiflora edulis Sims which does not reabsorb the secreted nectar. In all tests performed, we observed that LYCH stained the nectary tissues differentially according to the reabsorption ability of the nectary. The treated FN of C. pepo presented a concentrated fluorescence at the epidermis that decreased at the deeper nectary parenchyma, until reaching the vascular bundles, indicating nectar reabsorption in the flowers of the species. In contrast, treated EFN of P. edulis presented fluorescence only at the cuticle surface, indicating that nectar is not reabsorbed by that particular tissue. Conclusion LYCH is an efficient marker to demonstrate nectar reabsorption.
Resumo:
L’obiettivo che si pone questa tesi è quello di analizzare alcune soluzioni esistenti riguardo i problemi riguardanti privacy e sicurezza informatica. Nello specifico sarà illustrato il programma Tor, un sistema di comunicazione grazie al quale si garantisce l’anonimato in Internet. Sponsorizzato inizialmente dall’US Naval Research Laboratory, all’origine veniva utilizzato per poter effettuare comunicazioni militari criptate; è stato successivamente un progetto della Electronic Frontier Foundation ed ora è gestito da The Tor Project, un’associazione senza scopo di lucro che si occupa del relativo sviluppo. Le ricerche e gli sviluppi riguardanti questa tecnologia vengono tuttavia resi difficili da problemi di scalabilità e dalla difficoltà di riprodurre risultati affidabili. Nel corso della tesi saranno illustrati gli studi riguardanti il simulatore Shadow, un progetto Open Source gestito da The Tor Project, che permette la simulazione del protocollo Tor. I risultati ottenuti dai test effettuati sul simulatore, possono essere riapplicati in seguito alla rete reale Tor, poiché grazie a Shadow è possibile testare ed ottenere risultati attendibili circa il comportamento e la corretta esecuzione del software Tor.
Resumo:
It is tempting to extrapolate research findings regarding the intensively studied Toxoplasma gondii to Neospora caninum. This is based on morphological and ultrastructural studies, the molecular phylogeny of both parasites, their wide host ranges in nature, their ability to invade many different cell types in vitro and the occurrence of homologous proteins in both species. However, as Innes and Mattsson point out, T. gondii is the most successful parasite worldwide, whereas N. caninum has a more limited host range. Thus, some of the most challenging questions are: (i) what is T. gondii doing that N. caninum is not doing, or is doing differently, that renders the former so much more successful? And (ii) can some of these features be exploited for the development of interventional tools to limit infection and pathology caused by N. caninum?