3,695 research outputs found
Resina bulk fill : relato de caso clínico
Atualmente, as resinas convencionais necessitam de incrementos de no máximo 2mm para realizar uma restauração posterior. Isso faz com que esta técnica incremental seja um desafio para o profissional e ainda necessita de um maior tempo clínico para a execução. Assim, foi introduzida no mercado a resina bulk-fill que se apresenta em três viscosidades diferentes: baixa, variada e média. A vantagem desta resina é que ela pode ser inserida na cavidade em incrementos de 4-5mm sem influenciar na contração de polimerização, grau de conversão ou na adaptação da cavidade.Currently, conventional resins require increments of at most 2mm to perform a subsequent restoration. This makes this incremental technique a challenge for the professional and still requires a longer clinical time for execution. Thus, bulk-fill resin was introduced in the market, which presents itself in three different viscosities: low, varied and average. The advantage of this resin is that it can be inserted into the cavity in 4-5mm increments without influencing polymerization contraction, degree of conversion or cavity adaptation
Recommended from our members
Leaky scanning translation generates a second A49 protein that contributes to vaccinia virus virulence.
Vaccinia virus (VACV) strain Western Reserve gene A49L encodes a small intracellular protein with a Bcl-2 fold that is expressed early during infection and has multiple functions. A49 co-precipitates with the E3 ubiquitin ligase β-TrCP and thereby prevents ubiquitylation and proteasomal degradation of IκBα, and consequently blocks activation of NF-κB. In a similar way, A49 stabilizes β-catenin, leading to activation of the wnt signalling pathway. However, a VACV strain expressing a mutant A49 that neither co-precipitates with β-TrCP nor inhibits NF-κB activation, is more virulent than a virus lacking A49, indicating that A49 has another function that also contributes to virulence. Here we demonstrate that gene A49L encodes a second, smaller polypeptide that is expressed via leaky scanning translation from methionine 20 and is unable to block NF-κB activation. Viruses engineered to express either only the large protein or only the small A49 protein both have lower virulence than wild-type virus and greater virulence than an A49L deletion mutant. This demonstrates that the small protein contributes to virulence by an unknown mechanism that is independent of NF-κB inhibition. Despite having a large genome with about 200 genes, this study illustrates how VACV makes efficient use of its coding potential and from gene A49L expresses a protein with multiple functions and multiple proteins with different functions
Recommended from our members
NF-κB activation is a turn on for vaccinia virus phosphoprotein A49 to turn off NF-κB activation.
Vaccinia virus protein A49 inhibits NF-κB activation by molecular mimicry and has a motif near the N terminus that is conserved in IκBα, β-catenin, HIV Vpu, and some other proteins. This motif contains two serines, and for IκBα and β-catenin, phosphorylation of these serines enables recognition by the E3 ubiquitin ligase β-TrCP. Binding of IκBα and β-catenin by β-TrCP causes their ubiquitylation and thereafter proteasome-mediated degradation. In contrast, HIV Vpu and VACV A49 are not degraded. This paper shows that A49 is phosphorylated at serine 7 but not serine 12 and that this is necessary and sufficient for binding β-TrCP and antagonism of NF-κB. Phosphorylation of A49 S7 occurs when NF-κB signaling is activated by addition of IL-1β or overexpression of TRAF6 or IKKβ, the kinase needed for IκBα phosphorylation. Thus, A49 shows beautiful biological regulation, for it becomes an NF-κB antagonist upon activation of NF-κB signaling. The virulence of viruses expressing mutant A49 proteins or lacking A49 (vΔA49) was tested. vΔA49 was attenuated compared with WT, but viruses expressing A49 that cannot bind β-TrCP or bind β-TrCP constitutively had intermediate virulence. So A49 promotes virulence by inhibiting NF-κB activation and by another mechanism independent of S7 phosphorylation and NF-κB antagonism. Last, a virus lacking A49 was more immunogenic than the WT virus.Wellcome Trus
Violencia íntima de pareja y embarazo no deseado en mujeres peruanas: análisis de la Encuesta Demográfica y de Salud Familiar, 2022
Establece la asociación entre la violencia íntima de pareja y el
embarazo no deseado en mujeres peruanas según la Encuesta Demográfica
y de Salud Familiar (ENDES).
El estudio es observacional, analítico, de corte transversal y
retrospectivo, de enfoque cuantitativo. Basado en un análisis de datos
secundarios sobre la base de la ENDES del año 2022, donde participan 747
mujeres gestantes peruanas que cumplieron los criterios de selección.
En los resultados se muestran que, en el Perú, el 39.8% de mujeres reportó ser víctima de violencia
psicológica, seguido de la violencia de tipo física y sexual con 7.9% y 1.7%,
respectivamente. El 60.4% de mujeres menciona que su actual embarazo era no
deseado; además, de este grupo el 43.9% había sufrido algún tipo de violencia
psicológica, el 9.5% de violencia física y el 1.7% de violencia sexual. Se halla
asociación significativa entre la violencia de tipo psicológica (p=0.004) y tipo
física (p=0.04) y el embarazo no deseado utilizando la prueba de Chi cuadrado.
Tras realizar el análisis multivariado, solo se encontró asociación significativa
entre las mujeres víctimas de violencia psicológica y el embarazo no deseado
(p=0.021).
Se concluye que la violencia íntima de pareja de tipo psicológica se asoció al
embarazo no deseado en mujeres del Perú durante el año 2022
Crimes cibernéticos: as limitações da resposta estatal a criminalidade informática
The present study aims to punctuate the historical beginning of the internet, it's relations with
today's society and it's development, as well as the triggering of cybercrimes and Brazil's legislative pertinence to fight these threats. To study the dark web, the deepest side of the internet, a criminal environment of differentiated cryptography that best keeps it's user's anonymity, outlining it's access mode. To analyze the limits that stand against the legal order, as it
treats these cybercrimes, and which are the possible measures to be taken to best restrain these
illicit acts. To comprehend that the increase of cybercrimes backing into the real world becomes everytime more evident and today's legislation is not effective enough to inhibit the
acts of virtual criminals. The application or typification of crime by analogy is not admissible,
because it interferes with the principle of specificity. Therefore, the State's actions before this
impass becomes difficult, because of the absence of a specific cybercrimes regulatory law.
This way, it is necessary to adopt preemptive and repressive measures by the State, together
with the creation of a regulatory law for cybernetics, and also fixates punishment for virtual
illicit acts, to better protect society from these digital threats.O presente estudo visa pontuar o surgimento histórico da internet, a sua relação com a sociedade atual e o seu desenvolvimento, bem como o desencadeamento dos crimes cibernéticos e
a pertinência legislativa do Brasil para combater essas ameaças. Estudar a Darkweb, o lado
mais profundo da internet, ambiente criminoso de criptografia diferenciada que melhor resguarda o anonimato de seus usuários, pontuando o seu modo de acesso. Analisar os limites
que o ordenamento jurídico enfrenta ao tratar dos crimes cibernéticos e quais são as possíveis
medidas a serem tomadas para melhor coibir esses atos ilícitos. Compreender que o aumento
do respaldo dos crimes cibernéticos no mundo real se torna cada vez mais evidente e a legislação atual não é suficientemente efetiva para inibir a atuação dos criminosos virtuais. Não é
admissível a aplicação ou tipificação de um crime por analogia, pois feriria o princípio da
taxatividade. Portanto, se torna difícil a atuação do Estado perante esse impasse, visto que não
existe uma lei específica regulamentadora dos crimes cibernéticos. Desse modo, é necessária
a adoção de medidas preventivas e repressivas por parte do Estado, juntamente com a criação
de uma lei que regulamente a cibernética e dê as punições cabíveis aos atos ilícitos virtuais
para melhor proteger a sociedade dessas ameaças digitais
Multiple Bcl-2 family immunomodulators from vaccinia virus regulate MAPK/AP-1 activation.
Vaccinia virus (VACV) is a poxvirus and encodes many proteins that modify the host cell metabolism or inhibit the host response to infection. For instance, it is known that VACV infection can activate the mitogen-activated protein kinase (MAPK)/activator protein 1 (AP-1) pathway and inhibit activation of the pro-inflammatory transcription factor NF-κB. Since NF-κB and MAPK/AP-1 share common upstream activators we investigated whether six different VACV Bcl-2-like NF-κB inhibitors can also influence MAPK/AP-1 activation. Data presented show that proteins A52, B14 and K7 each contribute to AP-1 activation during VACV infection, and when expressed individually outwith infection. B14 induced the greatest stimulation of AP-1 and further investigation showed B14 activated mainly the MAPKs ERK (extracellular signal-regulated kinase) and JNK (Jun N-terminal kinase), and their substrate c-Jun (a component of AP-1). These data indicate that the same viral protein can have different effects on distinct signalling pathways, in blocking NF-κB activation whilst leading to MAPK/AP-1 activation.This work was funded by grants from the Medical Research Council, the Wellcome Trust, the Minas Gerais State’s Foundation for Research Support (FAPEMIG) and the National Council for Scientific and Technological Development (CNPq - Brazil).This is the author accepted manuscript. The final version is available from the Microbiology Society via http://dx.doi.org/10.1099/jgv.0.00052
Machine translation for language learners
Machine Translation (MT) has been controversial in second and foreign language learning, but the strategic integration of MT might be beneficial to language learning in certain contexts. In this chapter we discuss the conditions in which MT can be useful in language learning, set out digital alternatives to MT, and provide examples of how MT can support language learners
Application of sonic tests and modal identification in the characterization of masonry walls
This work contemplates the application of non‐destructive techniques, sonic and environ‐
mental vibration tests, on a set of soil‐cement compressed earth blocks reinforced masonry walls,
which were built in laboratory, under the project SHS‐Multirisk. The present work constitutes a
comparative study that aimed at verifying the reliability of the sonic test method in masonry char‐
acterization and in testing a methodology of combined tests for structural assessment. For that pur‐
pose, a numerical model of the walls was developed and calibrated with the mechanical properties
that were calculated from the sonic tests data. The results of the simulation of the numerical model
were compared with the results of the environmental vibration tests, which enabled to reach a cor‐
relation between the frequencies, as well as enabling the indirect sonic tests, which were performed
in the vertical direction, to result in an accurate prediction of the Young modulus to be used in the
numerical models.publishe
Discurso tentativo sobre o anonimato
This essay inquiries about the current forms of social classification used to organize interventions towards the so-called "excluded". It analyzes the social production of the anonymous, emphasizing the social meanings of the focused strategic actions that characterize public policies and the competitiveness between economic actors. Philosophical and sociological frameworks and a heterogeneous collection of documents orient the discussion. This work alerts to the contemporary limits of the social relationships and the authoritarianism, hidden in the current forms of categorizing the "no-one".Le text interroge l'actuelle crise sociétaire, considérent ses liaisons avec les formes de nomméation et de classification social que organizent les interventions dirigéés aux "exclus". Se dirige, particulièrement, à la production sociale du anonymat et aux résultantes sociaux de l'action stratégique focalisée, caracteristique des politiques publiques et de la compe titivité entre des agents économiques. Avec ces objectives, le text s'appuie sur oriéntations reflexives de la philosoplie et de la sociologie et un ensemble de documents divers. L'article fait appel de l'attention pour les limites contemporains de la socialité et l'autoritarisme que se cachent sous les formes courrentes de noméation de le "non-autre".O artigo interroga, associando-as à crise societária, as formas atuais de nomeação e classificação social que procuram organizar intervenções referidas aos denominados excluídos. Trata, com especial ênfase, a produção social do anonimato, enfatizando sentidos sociais da ação estratégica focalizada, que caracteriza políticas públicas e a competitividade entre agentes econômicos. Para tal, recorre a orientações reflexivas da filosofia e da sociologia e a um conjunto heterogêneo de fontes documentais. O artigo alerta para os limites contemporâneos da socialidade e do autoritarismo, que se ocultam nas formas correntes de nomeação do não-outro
Detection of Sharp Symmetric Features in the Circumbinary Disk Around AK Sco
The Search for Planets Orbiting Two Stars (SPOTS) survey aims to study the
formation and distribution of planets in binary systems by detecting and
characterizing circumbinary planets and their formation environments through
direct imaging. With the SPHERE Extreme Adaptive Optics instrument, a good
contrast can be achieved even at small (<300 mas) separations from bright
stars, which enables studies of planets and disks in a separation range that
was previously inaccessible. Here, we report the discovery of resolved
scattered light emission from the circumbinary disk around the well-studied
young double star AK Sco, at projected separations in the ~13--40 AU range. The
sharp morphology of the imaged feature is surprising, given the smooth
appearance of the disk in its spectral energy distribution. We show that the
observed morphology can be represented either as a highly eccentric ring around
AK Sco, or as two separate spiral arms in the disk, wound in opposite
directions. The relative merits of these interpretations are discussed, as well
as whether these features may have been caused by one or several circumbinary
planets interacting with the disk.Comment: 10 pages, 3 figures, accepted for publication in ApJ Letters. Minor
(proof-level) corrections implemented in this versio
- …