676 resultados para Anaphoric Encapsulation
Resumo:
We report on the use of the hydrogen bond accepting properties of neutral nitrone moieties to prepare benzylic-amide-macrocycle-containing [2]rotaxanes in yields as high as 70 %. X-Ray crystallography shows the presence of up to four intercomponent hydrogen bonds between the amide groups of the macrocycle and the two nitrone groups of the thread. Dynamic 1H NMR studies of the rates of macrocycle pirouetting in nonpolar solutions indicate that amide-nitrone hydrogen bonds are particularly strong, ~1.3 and ~0.2 kcal mol-1 stronger than similar amide-ester and amide-amide interactions, respectively. In addition to polarizing the N-O bond through hydrogen bonding, the rotaxane structure affects the chemistry of the nitrone groups in two significant ways: The intercomponent hydrogen bonding activates the nitrone groups to electrochemical reduction, a one electron reduction of the rotaxane being stablized by a remarkable 400 mV (8.1 kcal mol-1) with respect to the same process in the thread; encapsulation, however, protects the same functional groups from chemical reduction with an external reagent (and slows down electron transfer to and from the electroactive groups in cyclicvoltammetry experiments). Mechanical interlocking with a hydrogen bonding molecular sheath thus provides a route to an encapsulated polarized functional group and radical anions of significant kinetic and thermodynamic stability.
Resumo:
Existing secure software development principles tend to focus on coding vulnerabilities, such as buffer or integer overflows, that apply to individual program statements, or issues associated with the run-time environment, such as component isolation. Here we instead consider software security from the perspective of potential information flow through a program’s object-oriented module structure. In particular, we define a set of quantifiable "security metrics" which allow programmers to quickly and easily assess the overall security of a given source code program or object-oriented design. Although measuring quality attributes of object-oriented programs for properties such as maintainability and performance has been well-covered in the literature, metrics which measure the quality of information security have received little attention. Moreover, existing securityrelevant metrics assess a system either at a very high level, i.e., the whole system, or at a fine level of granularity, i.e., with respect to individual statements. These approaches make it hard and expensive to recognise a secure system from an early stage of development. Instead, our security metrics are based on well-established compositional properties of object-oriented programs (i.e., data encapsulation, cohesion, coupling, composition, extensibility, inheritance and design size), combined with data flow analysis principles that trace potential information flow between high- and low-security system variables. We first define a set of metrics to assess the security quality of a given object-oriented system based on its design artifacts, allowing defects to be detected at an early stage of development. We then extend these metrics to produce a second set applicable to object-oriented program source code. The resulting metrics make it easy to compare the relative security of functionallyequivalent system designs or source code programs so that, for instance, the security of two different revisions of the same system can be compared directly. This capability is further used to study the impact of specific refactoring rules on system security more generally, at both the design and code levels. By measuring the relative security of various programs refactored using different rules, we thus provide guidelines for the safe application of refactoring steps to security-critical programs. Finally, to make it easy and efficient to measure a system design or program’s security, we have also developed a stand-alone software tool which automatically analyses and measures the security of UML designs and Java program code. The tool’s capabilities are demonstrated by applying it to a number of security-critical system designs and Java programs. Notably, the validity of the metrics is demonstrated empirically through measurements that confirm our expectation that program security typically improves as bugs are fixed, but worsens as new functionality is added.
Resumo:
In many applications, where encrypted traffic flows from an open (public) domain to a protected (private) domain, there exists a gateway that bridges the two domains and faithfully forwards the incoming traffic to the receiver. We observe that indistringuishability against (adaptive) chosen-ciphertext attacks (IND-CCA), which is a mandatory goal in face of active attacks in a public domain, can be essentially relaxed to indistinguishability against chosen-plaintext attacks (IND-CPA) for ciphertexts once they pass the gateway that acts as an IND-CCA/CPA filter by first checking the validity of an incoming IND-CCA ciphertext, then transforming it (if valid) into an IND-CPA ciphertext, and forwarding the latter to the receipient in the private domain. "Non-trivial filtering" can result in reduced decryption costs on the receivers' side. We identify a class of encryption schemes with publicaly verifiable ciphertexts that admit generic constructions of (non-trivial) IND-CCA/CPA filters. These schemes are characterized by existence of public algorithms that can distinguish between valid and invalid ciphertexts. To this end, we formally define (non-trivial) public verifiability of ciphertexts for general encryption schemes, key encapsulation mechanisms, and hybrid encryption schemes, encompassing public-key, identity-based, and tag-based encryption flavours. We further analyze the security impact of public verifiability and discuss generic transformations and concrete constructions that enjoy this property.
Resumo:
This paper describes how a team from a large company, when faced with a challenge to develop new customers in fast growing international markets, carried out the exploration of the needs of new clients in the largely unexplored market space of a developing country. This team used design methods and processes to identify the latent needs of new customers in situations of major economic, geographical, cultural and financial constraints. This encapsulation of the life experiences of potential customers is used extensively in some new product development, but is largely novel to business practices and in processes of developing new services. This research links with the sub-theme of discovering creativity in necessity and highlights the potential benefits of design methodologies to create new possibilities for better accessibility of the company’s products to new clients, with future implications for organizational strategy. The overall theme of Design for the Colloquium encourages exploration of the ways and means of developing new ideas for new business with better outcomes, using design concepts and design technologies.
Resumo:
There remains a substantial shortfall in treatment of severe skeletal injuries. The current gold standard of autologous bone grafting from the same patient, has many undesirable side effects associated such as donor site morbidity. Tissue engineering seeks to offer a solution to this problem. The primary requirements for tissue engineered scaffolds have already been well established, and many materials, such as polyesters, present themselves as potential candidates for bone defects; they have comparable structural features, but they often lack the required osteoconductivity to promote adequate bone regeneration. By combining these materials with biological growth factors; which promote the infiltration of cells into the scaffold as well as the differentiation into the specific cell and tissue type, it is possible to increase the formation of new bone. However cost and potential complications associated with growth factors means controlled release is an important consideration in the design of new bone tissue engineering strategies. This review will cover recent research in the area of encapsulation and release of growth factors within a variety of different polymeric scaffolds.
Resumo:
Availability has become a primary goal of information security and is as significant as other goals, in particular, confidentiality and integrity. Maintaining availability of essential services on the public Internet is an increasingly difficult task in the presence of sophisticated attackers. Attackers may abuse limited computational resources of a service provider and thus managing computational costs is a key strategy for achieving the goal of availability. In this thesis we focus on cryptographic approaches for managing computational costs, in particular computational effort. We focus on two cryptographic techniques: computational puzzles in cryptographic protocols and secure outsourcing of cryptographic computations. This thesis contributes to the area of cryptographic protocols in the following ways. First we propose the most efficient puzzle scheme based on modular exponentiations which, unlike previous schemes of the same type, involves only a few modular multiplications for solution verification; our scheme is provably secure. We then introduce a new efficient gradual authentication protocol by integrating a puzzle into a specific signature scheme. Our software implementation results for the new authentication protocol show that our approach is more efficient and effective than the traditional RSA signature-based one and improves the DoSresilience of Secure Socket Layer (SSL) protocol, the most widely used security protocol on the Internet. Our next contributions are related to capturing a specific property that enables secure outsourcing of cryptographic tasks in partial-decryption. We formally define the property of (non-trivial) public verifiability for general encryption schemes, key encapsulation mechanisms (KEMs), and hybrid encryption schemes, encompassing public-key, identity-based, and tag-based encryption avors. We show that some generic transformations and concrete constructions enjoy this property and then present a new public-key encryption (PKE) scheme having this property and proof of security under the standard assumptions. Finally, we combine puzzles with PKE schemes for enabling delayed decryption in applications such as e-auctions and e-voting. For this we first introduce the notion of effort-release PKE (ER-PKE), encompassing the well-known timedrelease encryption and encapsulated key escrow techniques. We then present a security model for ER-PKE and a generic construction of ER-PKE complying with our security notion.
Resumo:
The encapsulation and release of bioactive molecules from polymeric vehicles represents the holy grail of drug and growth factor delivery therapies, whereby sustained and controlled release is crucial in eliciting a positive therapeutic effect. To this end, electrospraying is rapidly emerging as a popular technology for the production of polymeric particles containing bioactive molecules. Compared with traditional emulsion fabrication techniques, electrospraying has the potential to reduce denaturation of protein drugs and affords tighter regulation over particle size distribution and morphology. In this article, we review the importance of the electrospraying parameters that enable reproducible tailoring of the particles' physical and in vitro drug release characteristics, along with discussion of existing in vivo data. Controlled morphology and monodispersity of particles can be achieved with electrospraying, with high encapsulation efficiencies and without unfavorable denaturation of bioactive molecules throughout the process. Finally, the combination of electrospraying with electrospun scaffolds, with an emphasis on tissue regeneration is reviewed, depicting a technique in its relative infancy but holding great promise for the future of regenerative medicine.
Resumo:
This study investigates the impact of polystyrene sodium sulfonate (PolyNaSS) grafting onto the osseo-integration of a polyethylene terephthalate artificial ligament (Ligament Advanced Reinforcement System, LARS™) used for Anterior Cruciate Ligament (ACL). The performance of grafted and non-grafted ligaments was assessed in vitro by culturing human osteoblasts under osteogenic induction and this demonstrated that the surface modification was capable of up-regulating the secretion of ALP and induced higher level of mineralisation as measured 6 weeks post-seeding by Micro-Computed Tomography. Grafted and non-grafted LARS™ were subsequently implanted in an ovine model for ACL reconstruction and the ligament-to-bone interface was evaluated by histology and biomechanical testings 3 and 12 months post-implantation. The grafted ligaments exhibited more frequent direct ligament-to-bone contact and bone formation in the core of the ligament at the later time point than the non-grafted specimens, the grafting also significantly reduced the fibrous encapsulation of the ligament 12 months post-implantation. However, this improved osseo-integration was not translated into a significant increase in the biomechanical pull-out loads. These results provide evidences that PolyNaSS grafting improved the osseo-integration of the artificial ligament within the bone tunnels. This might positively influence the outcome of the surgical reconstructions, as higher ligament stability is believed to limit micro-movement and therefore permits earlier and enhanced healing.
Resumo:
Electrostatic spinning or electrospinning is a fiber spinning technique driven by a high-voltage electric field that produces fibers with diameters in a submicrometer to nanometer range.1 Nanofibers are typical one-dimensional colloidal objects with an increased tensile strength, whose length can achieve a few kilometers and the specific surface area can be 100 m2 g–1 or higher.2 Nano- and microfibers from biocompatible polymers and biopolymers have received much attention in medical applications3 including biomedical structural elements (scaffolding used in tissue engineering,2,4–6 wound dressing,7 artificial organs and vascular grafts8), drug and vaccine delivery,9–11 protective shields in speciality fabrics, multifunctional membranes, etc. Other applications concern superhydrophobic coatings,12 encapsulation of solid materials,13 filter media for submicron particles in separation industry, composite reinforcement and structures for nano-electronic machines.
Resumo:
Immune reactions play important roles in determining the in vivo fate of bone substitute materials, either in new bone formation or inflammatory fibrous tissue encapsulation. The paradigm for the development of bone substitute materials has been shifted from inert to immunomodulatory materials, emphasizing the importance of immune cells in the material evaluation. Macrophages, the major effector cells in the immune reaction to implants, are indispensable for osteogenesis and their heterogeneity and plasticity render macrophages a primer target for immune system modulation. However, there are very few reports about the effects of macrophages on biomaterial-regulated osteogenesis. In this study, we used b-tricalcium phosphate (b-TCP) as a model biomaterial to investigate the role of macrophages on the material stimulated osteogenesis. The macrophage phenotype switched to M2 extreme in response to b-TCP extracts, which was related to the activation of calcium-sensing receptor (CaSR) pathway. Bone morphogenetic protein 2 (BMP2) was also significantly upregulated by the b-TCP stimulation, indicating that macrophage may participate in the b-TCP stimulated osteogenesis. Interestingly, when macrophageconditioned b-TCP extracts were applied to bone marrow mesenchymal stem cells (BMSCs), the osteogenic differentiation of BMSCs was significantly enhanced, indicating the important role of macrophages in biomaterial-induced osteogenesis. These findings provided valuable insights into the mechanism of material-stimulated osteogenesis, and a strategy to optimize the evaluation system for the in vitro osteogenesis capacity of bone substitute materials.
Resumo:
In many applications, where encrypted traffic flows from an open (public) domain to a protected (private) domain, there exists a gateway that bridges the two domains and faithfully forwards the incoming traffic to the receiver. We observe that indistinguishability against (adaptive) chosen-ciphertext attacks (IND-CCA), which is a mandatory goal in face of active attacks in a public domain, can be essentially relaxed to indistinguishability against chosen-plaintext attacks (IND-CPA) for ciphertexts once they pass the gateway that acts as an IND-CCA/CPA filter by first checking the validity of an incoming IND-CCA ciphertext, then transforming it (if valid) into an IND-CPA ciphertext, and forwarding the latter to the recipient in the private domain. “Non-trivial filtering'' can result in reduced decryption costs on the receivers' side. We identify a class of encryption schemes with publicly verifiable ciphertexts that admit generic constructions of (non-trivial) IND-CCA/CPA filters. These schemes are characterized by existence of public algorithms that can distinguish between valid and invalid ciphertexts. To this end, we formally define (non-trivial) public verifiability of ciphertexts for general encryption schemes, key encapsulation mechanisms, and hybrid encryption schemes, encompassing public-key, identity-based, and tag-based encryption flavours. We further analyze the security impact of public verifiability and discuss generic transformations and concrete constructions that enjoy this property.
Resumo:
This paper describes a generic and integrated solar powered remote Unmanned Air Vehicles (UAV) and Wireless Sensor Network (WSN) gas sensing system. The system uses a generic gas sensing system for CH4 and CO2 concentrations using metal oxide (MoX) and non-dispersive infrared sensors, and a new solar cell encapsulation method to power the UASs as well as a data management platform to store, analyse and share the information with operators and external users. The system was successfully field tested at ground and low altitudes, collecting, storing and transmitting data in real time to a central node for analysis and 3D mapping. The system can be used in a wide range of outdoor applications, especially in agriculture, bushfires, mining studies, opening the way to a ubiquitous low cost environmental monitoring. A video of the bench and flight test performed can be seen in the following link https://www.youtube.com/watch?v=Bwas7stYIxQ.
Resumo:
Cancer-associated proteases promote peritoneal dissemination and chemoresistance in malignant progression. In this study, kallikrein-related peptidases 4, 5, 6, and 7 (KLK4-7)-cotransfected OV-MZ-6 ovarian cancer cells were embedded in a bioengineered three-dimensional (3D) microenvironment that contains RGD motifs for integrin engagement to analyze their spheroid growth and survival after chemotreatment. KLK4-7-cotransfected cells formed larger spheroids and proliferated more than controls in 3D, particularly within RGD-functionalized matrices, which was reduced upon integrin inhibition. In contrast, KLK4-7-expressing cell monolayers proliferated less than controls, emphasizing the relevance of the 3D microenvironment and integrin engagement. In a spheroid-based animal model, KLK4-7-overexpression induced tumor growth after 4 weeks and intraperitoneal spread after 8 weeks. Upon paclitaxel administration, KLK4-7-expressing tumors declined in size by 91% (controls: 87%) and showed 90% less metastatic outgrowth (controls: 33%, P<0.001). KLK4-7-expressing spheroids showed 53% survival upon paclitaxel treatment (controls: 51%), accompanied by enhanced chemoresistance-related factors, and their survival was further reduced by combination treatment of paclitaxel with KLK4/5/7 (22%, P=0.007) or MAPK (6%, P=0.006) inhibition. The concomitant presence of KLK4-7 in ovarian cancer cells together with integrin activation drives spheroid formation and proliferation. Combinatorial approaches of paclitaxel and KLK/MAPK inhibition may be more efficient for late-stage disease than chemotherapeutics alone as these inhibitory regimens reduced cancer spheroid growth to a greater extent than paclitaxel alone.
Resumo:
Modern cancer research requires physiological, three-dimensional (3-D) cell culture platforms, wherein the physical and chemical characteristics of the extracellular matrix (ECM) can be modified. In this study, gelatine methacrylamide (GelMA)-based hydrogels were characterized and established as in vitro and in vivo spheroid-based models for ovarian cancer, reflecting the advanced disease stage of patients, with accumulation of multicellular spheroids in the tumour fluid (ascites). Polymer concentration (2.5-7% w/v) strongly influenced hydrogel stiffness (0.5±0.2kPa to 9.0±1.8kPa) but had little effect on solute diffusion. The diffusion coefficient of 70kDa fluorescein isothiocyanate (FITC)-labelled dextran in 7% GelMA-based hydrogels was only 2.3 times slower compared to water. Hydrogels of medium concentration (5% w/v GelMA) and stiffness (3.4kPa) allowed spheroid formation and high proliferation and metabolic rates. The inhibition of matrix metalloproteinases and consequently ECM degradability reduced spheroid formation and proliferation rates. The incorporation of the ECM components laminin-411 and hyaluronic acid further stimulated spheroid growth within GelMA-based hydrogels. The feasibility of pre-cultured GelMA-based hydrogels as spheroid carriers within an ovarian cancer animal model was proven and led to tumour development and metastasis. These tumours were sensitive to treatment with the anti-cancer drug paclitaxel, but not the integrin antagonist ATN-161. While paclitaxel and its combination with ATN-161 resulted in a treatment response of 33-37.8%, ATN-161 alone had no effect on tumour growth and peritoneal spread. The semi-synthetic biomaterial GelMA combines relevant natural cues with tunable properties, providing an alternative, bioengineered 3-D cancer cell culture in in vitro and in vivo model systems.