Search results for "Mechanism"
showing 10 items of 1835 documents
The hedgehog receptor patched is involved in cholesterol transport.
2011
International audience; BACKGROUND: Sonic hedgehog (Shh) signaling plays a crucial role in growth and patterning during embryonic development, and also in stem cell maintenance and tissue regeneration in adults. Aberrant Shh pathway activation is involved in the development of many tumors, and one of the most affected Shh signaling steps found in these tumors is the regulation of the signaling receptor Smoothened by the Shh receptor Patched. In the present work, we investigated Patched activity and the mechanism by which Patched inhibits Smoothened. METHODOLOGY/PRINCIPAL FINDINGS: Using the well-known Shh-responding cell line of mouse fibroblasts NIH 3T3, we first observed that enhancement …
Voluntary Imitation in Alzheimer’s Disease Patients
2016
International audience; Although Alzheimer's disease (AD) primarily manifests as cognitive deficits, the implicit sensorimotor processes that underlie social interactions, such as automatic imitation, seem to be preserved in mild and moderate stages of the disease, as is the ability to communicate with other persons. Nevertheless, when AD patients face more challenging tasks, which do not rely on automatic processes but on explicit voluntary mechanisms and require the patient to pay attention to external events, the cognitive deficits resulting from the disease might negatively affect patients' behavior. The aim of the present study was to investigate whether voluntary motor imitation, i.e.…
Incentive Mechanism for Edge Computing-Based Blockchain: A Sequential Game Approach
2022
The development of the blockchain framework is able to provide feasible solutions for a wide range of Industrial Internet of Things (IIoT) applications. While the IIoT devices are usually resource-limited, how to make sure the acquisition of computational resources and participation of the devices will be the driving force to realize blockchain. In this work, an edge computing-based blockchain framework is considered, where multiple edge service providers (ESPs) can provide computational resources to the IIoT devices. We focus on investigating the trading between the devices and ESPs, where ESPs are the sellers and devices are the buyers. A sequential game is formulated and by exploring the…
Effects of electrical stimulation pattern on quadriceps isometric force and fatigue in individuals with spinal cord injury
2015
Introduction Variable frequency trains (VFT) or train combinations have been suggested as useful strategies to offset the rapid fatigue induced by constant frequency trains (CFT) during electrical stimulation. However, most studies have been of short duration with limited functional application in those with spinal cord injury (SCI). We therefore tested force and fatigue in response to VFT, CFT, and combined patterns in strength training-like conditions (6-s contractions). Methods Ten SCI individuals underwent either CFT or VFT patterns until target torque was no longer produced and then switched immediately to the other pattern. Results Target torque was reached more times when VFT was use…
An Overview on the Performance of 1,2,3-Triazole Derivatives as Corrosion Inhibitors for Metal Surfaces
2021
This review accounts for the most recent and significant research results from the literature on the design and synthesis of 1,2,3-triazole compounds and their usefulness as molecular well-defined corrosion inhibitors for steels, copper, iron, aluminum, and their alloys in several aggressive media. Of particular interest are the 1,4-disubstituted 1,2,3-triazole derivatives prepared in a regioselective manner under copper-catalyzed azide-alkyne cycloaddition (CuAAC) click reactions. They are easily and straightforwardly prepared compounds, non-toxic, environmentally friendly, and stable products to the hydrolysis under acidic conditions. Moreover, they have shown a good efficiency as corrosi…
On the mechanistic behavior of highly efficient palladium-tetraphosphine catalytic systems for cross-coupling reactions: first spectroscopic and elec…
2008
Electrochemical studies carried out in conjunction with 31P NMR spectroscopy on the palladium(II)/palladium(0) halogeno complexes of the tetraphosphine 1,1′,2,2′-tetrakis(diphenylphosphino)-4,4′-di...
Misunderstanding Situations in Culture and Cultural Care
2017
This article focuses on cultural misunderstanding in care relations, starting from the analysis of the effects misunderstanding causes in the relation between doctor and migrant patient. The Western medical model tends to be based on objective data, which can be diagnosed through more and more precise and detailed techniques, but it excludes human and cultural aspects of subjectivity and relation from care. This exclusion creates distance, which increases when doctor and patient do not share a cultural homogeneity but differ for their language and the way they conceive their body, health, and disease. By showing some clinical examples, this contribution points out how specialized competence…
Taxonomy of generative adversarial networks for digital immunity of Industry 4.0 systems
2021
Abstract Industry 4.0 systems are extensively using artificial intelligence (AI) to enable smartness, automation and flexibility within variety of processes. Due to the importance of the systems, they are potential targets for attackers trying to take control over the critical processes. Attackers use various vulnerabilities of such systems including specific vulnerabilities of AI components. It is important to make sure that inappropriate adversarial content will not break the security walls and will not harm the decision logic of critical systems. We believe that the corresponding security toolset must be organized as a trainable self-protection mechanism similar to immunity. We found cer…
Adversarial Attack’s Impact on Machine Learning Model in Cyber-Physical Systems
2020
Deficiency of correctly implemented and robust defence leaves Internet of Things devices vulnerable to cyber threats, such as adversarial attacks. A perpetrator can utilize adversarial examples when attacking Machine Learning models used in a cloud data platform service. Adversarial examples are malicious inputs to ML-models that provide erroneous model outputs while appearing to be unmodified. This kind of attack can fool the classifier and can prevent ML-models from generalizing well and from learning high-level representation; instead, the ML-model learns superficial dataset regularity. This study focuses on investigating, detecting, and preventing adversarial attacks towards a cloud dat…
Il defense mechanisms inventory
2015
Il Defense Mechanisms Inventory (DMI) (Gleser e Ihilevich, 1969; Gleser e Ihilevich, 1986) è un questionario semiproiettivo per la valutazione degli stili difensivi. Creato alla fine degli anni sessanta da Gleser e Ihilevich, si è diffuso nella pratica clinica e nella ricerca, godendo di buona considerazione nella letteratura scientifica (Davidson e McGregor, 1998). Soltanto la forma per adulti è stata validata in Italia, ma esistono sia la forma per adolescenti sia quella per anziani. La forma per adolescenti prevede una versione breve risultata piuttosto affidabile sia nella clinica sia nelal ricerca (Recklitis et al. 1995).