Search results for "PROGRAM"

showing 10 items of 5938 documents

Neuronal cell cycle: the neuron itself and its circumstances.

2015

Neurons are usually regarded as postmitotic cells that undergo apoptosis in response to cell cycle reactivation. Nevertheless, recent evidence indicates the existence of a defined developmental program that induces DNA replication in specific populations of neurons, which remain in a tetraploid state for the rest of their adult life. Similarly, de novo neuronal tetraploidization has also been described in the adult brain as an early hallmark of neurodegeneration. The aim of this review is to integrate these recent developments in the context of cell cycle regulation and apoptotic cell death in neurons. We conclude that a variety of mechanisms exists in neuronal cells for G1/S and G2/M check…

ApoptosisBrdU 5-bromo-2′-deoxyuridineReviewp75NTR neurotrophin receptor p75Nervous SystemG0 quiescent stateCKI Cdk-inhibitorNeuronsCell DeathNeurodegenerationCell CycleapoptosisNeurodegenerative DiseasesCell cycleCell biologymedicine.anatomical_structureInk inhibitor of kinaseBDNF brain-derived neurotrophic factorp38MAPK p38 mitogen-activated protein kinaseG2 growth phase 2Programmed cell deathS-phasePD Parkinson diseaseRb RetinoblastomaMcm2 minichromosome maintenance 2PCNA proliferating cell nuclear antigenMitosisContext (language use)BiologyCdk cyclin-dependent kinaseCNS central nervous systemS-phase synthesis phase.Cip/Kip cyclin inhibitor protein/kinase inhibitor proteinmedicineAnimalsHumansMolecular BiologyMitosisTetraploidAD Alzheimer diseasecell cycle re-entryDNA replicationCell BiologyNeuronmedicine.diseaseG1 growth phase 1neuronRGCs retinal ganglion cellsCell cycle re-entrytetraploidnervous systemApoptosisNeuronDevelopmental BiologyCell cycle (Georgetown, Tex.)
researchProduct

Bax-derived membrane-active peptides act as potent and direct inducers of apoptosis in cancer cells.

2011

SUMMARYAlthough many cancer cells are primed for apoptosis, they usually develop resistance to cell death at multiple levels. Permeabilization of the outer mitochondrial membrane, which is mediated by proapoptotic Bcl-2 family members like Bax, is considered as a point-of-no-return for initiating apoptotic cell death. This crucial role has placed Bcl-2 family proteins as recurrent targets for anticancer drug development. Here, we propose and demonstrate a new concept based on using minimal active version of Bax to induce cell death independently of endogenous Bcl-2 proteins. We show that membrane-active segments of Bax can directly induce the release of mitochondria-residing apoptogenic fac…

ApoptosisMitochondrionMiceMESH: Protein Structure Tertiary0302 clinical medicineNeoplasmsgeneticsMESH: AnimalsMESH: Neoplasmsbcl-2-Associated X Protein0303 health sciencesbiologyMESH: PeptidesCytochrome capoptosisCytochromes cMESH: Cytochromes cproapoptotic BaxCell biologyMitochondriadrug therapymitochondria030220 oncology & carcinogenesisBacterial outer membraneProgrammed cell deathMESH: Cell Line TumorMESH: MitochondriaAntineoplastic Agents[SDV.CAN]Life Sciences [q-bio]/Cancerpore-forming peptideschemistryArticle03 medical and health sciencesBcl-2-associated X proteinBcl-2 familyCell Line TumorAnimalsHumansMESH: bcl-2-Associated X ProteinMESH: Mice030304 developmental biologyMESH: HumansMESH: ApoptosisBcl-2 familyCell BiologyProtein Structure Tertiaryanticancer agentantivascular therapyApoptosisdrug effectsCancer cellbiology.proteinMESH: Antineoplastic AgentspharmacologyphysiopathologyPeptidesmetabolism
researchProduct

Scenario optimization asset and liability modelling for individual investors

2006

We develop a scenario optimization model for asset and liability management of individual investors. The individual has a given level of initial wealth and a target goal to be reached within some time horizon. The individual must determine an asset allocation strategy so that the portfolio growth rate will be sufficient to reach the target. A scenario optimization model is formulated which maximizes the upside potential of the portfolio, with limits on the downside risk. Both upside and downside are measured vis- `a-vis the goal. The stochastic behavior of asset returns is captured through bootstrap simulation, and the simulation is embedded in the model to determine the optimal portfolio. …

Application portfolio managementComputer scienceLiabilityDownside riskGeneral Decision SciencesAsset allocationAsset and liability managementTime horizonManagement Science and Operations ResearchAsset returnBlack–Litterman modelMicroeconomicsReplicating portfolioPortfolioCapital asset pricing modelPost-modern portfolio theoryPortfolio optimizationPersonal asset allocation stochastic programmingBeta (finance)Upside potential ratio
researchProduct

Sampling methods for low-frequency electromagnetic imaging

2007

For the detection of hidden objects by low-frequency electromagnetic imaging the linear sampling method works remarkably well despite the fact that the rigorous mathematical justification is still incomplete. In this work, we give an explanation for this good performance by showing that in the low-frequency limit the measurement operator fulfils the assumptions for the fully justified variant of the linear sampling method, the so-called factorization method. We also show how the method has to be modified in the physically relevant case of electromagnetic imaging with divergence-free currents. We present numerical results to illustrate our findings, and to show that similar performance can b…

Applied MathematicsMathematical analysis510 MathematikLow frequencyComputer Science ApplicationsTheoretical Computer ScienceOperator (computer programming)510 MathematicsSignal ProcessingFactorization methodLimit (mathematics)AlgorithmMathematical PhysicsMathematics
researchProduct

The factorization method for real elliptic problems

2006

The Factorization Method localizes inclusions inside a body from mea- surements on its surface. Without a priori knowing the physical parameters inside the inclusions, the points belonging to them can be characterized using the range of an auxiliary operator. The method relies on a range characterization that relates the range of the auxiliary operator to the measurements and is only known for very particular applications. In this work we develop a general framework for the method by considering sym- metric and coercive operators between abstract Hilbert spaces. We show that the important range characterization holds if the difference between the inclusions and the background medium satisfi…

Applied MathematicsMathematical analysisHilbert space510 MathematikInverse problemLenstra elliptic curve factorizationSemi-elliptic operatorRange (mathematics)symbols.namesakeOperator (computer programming)510 MathematicsElliptic partial differential equationMetric (mathematics)symbolsAnalysisMathematics
researchProduct

A Hardware and Secure Pseudorandom Generator for Constrained Devices

2018

Hardware security for an Internet of Things or cyber physical system drives the need for ubiquitous cryptography to different sensing infrastructures in these fields. In particular, generating strong cryptographic keys on such resource-constrained device depends on a lightweight and cryptographically secure random number generator. In this research work, we have introduced a new hardware chaos-based pseudorandom number generator, which is mainly based on the deletion of an Hamilton cycle within the $N$ -cube (or on the vectorial negation), plus one single permutation. We have rigorously proven the chaotic behavior and cryptographically secure property of the whole proposal: the mid-term eff…

Applied cryptography; Chaotic circuits; Constrained devices; Discrete dynamical systems; FPGA; Lightweight Cryptography; Random number generators; Statistical tests; Control and Systems Engineering; Information Systems; Computer Science Applications1707 Computer Vision and Pattern Recognition; Electrical and Electronic EngineeringHardware security moduleComputer scienceRandom number generationCryptography[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]02 engineering and technologyPseudorandom generatorConstrained devicesLightweight CryptographyChaotic circuits[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]PermutationRandom number generatorsStatistical tests0202 electrical engineering electronic engineering information engineeringElectrical and Electronic EngineeringField-programmable gate arrayThroughput (business)FPGAPseudorandom number generatorGenerator (category theory)business.industry020208 electrical & electronic engineeringComputer Science Applications1707 Computer Vision and Pattern Recognition020206 networking & telecommunicationsDiscrete dynamical systems[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationComputer Science ApplicationsApplied cryptography[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Control and Systems EngineeringKey (cryptography)[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessComputer hardwareInformation SystemsIEEE Transactions on Industrial Informatics
researchProduct

Étude sur les réformes curriculaires par l'approche par compétences en Afrique

2009

Cette étude vise trois objectifs : réaliser un état des lieux des processus de réformes curriculaires en éducation de base en Afrique pour identifier les problèmes rencontrés, les résultats positifs et les "bonnes pratiques", aider les responsables des systèmes éducatifs à prendre des mesures pertinentes et accompagner les réformes et enfin aider les bailleurs de fonds à mieux comprendre les effets de leur aide et à mieux cibler les projets de réforme en termes de coût et d'efficacité à tous les niveaux des systèmes éducatifs impliqués.

Approche par les capabilitésAfriqueAcquisition scolaireProgramme de formationÉducation de base[SHS.EDU]Humanities and Social Sciences/Education[SHS.EDU] Humanities and Social Sciences/EducationPolitique éducative[ SHS.EDU ] Humanities and Social Sciences/EducationCurriculumRéforme pédagogiqueProgramme scolaire
researchProduct

Ietvarprogramma Apvārsnis 2020 un jaunākās Open Access nostādnes Eiropā

2012

Ziņojumā, kas sagatavots Open Access nedēļas semināram " Brīvpieejas e-resursu puiblicēšana: iespējas un attīstība" (2012.g. 26.oktobris), sniegta informācija par Eiropas Komisijas 2011. gadā publicētajos ieteikumos un paziņojumos ietvertajām Open Access nostādnēm saistībā ar jauno ES pētniecības un inovāciju finansēšanas programmu 2014.-2020. gadam Apvārsnis 2020. Prezentācijā iekļauts arī programmas Apvārsnis 2020 raksturojums un tajā paredzētās prasības zinātnisko rakstu publicēšanai brīvpieejā.

Apvārsnis 2020Horizon 2020Open AccessES pētniecības un inovāciju finansēšanas programmaEU’s Research & innovation funding programmeEC Open Access nostādnes
researchProduct

External labeling and algorithms for hierarchic networks

1988

Algorithms for generating internal data structures for networks are given. Data bases for networks can be partitioned hierarchically. Nodes of lower class networks may also be in the interior of a higher class arc which will be split if it is included into the final network. Naming is based either on nodes or on arcs.

Arc (geometry)Class (computer programming)Computer scienceHierarchical network modelData structureAlgorithm
researchProduct

A comparison of two different formulations for Arc Routing Problems on Mixed graphs

2006

[EN] Arc routing problems on mixed graphs have been modelled in the literature either using just one variable per edge or associating to each edge two variables, each one representing its traversal in the corresponding direction. In this paper, and using the mixed general routing problem as an example, we compare theoretical and computationally both formulations as well as the lower bounds obtained from them using Linear Programming based methods. Extensive computational experiments, including some big and newly generated random instances, are presented.

Arc routingGeneral Computer ScienceLinear programmingMixed Chinese postman problemMixed graphMixed rural postman problemManagement Science and Operations ResearchRoute inspection problemTree traversalModeling and SimulationEnhanced Data Rates for GSM EvolutionRouting (electronic design automation)Mixed general routing problemMATEMATICA APLICADAAlgorithmArc routingMathematicsVariable (mathematics)
researchProduct