76 research outputs found

    Assessing mitochondrial dysfunction in cells

    Get PDF
    Assessing mitochondrial dysfunction requires definition of the dysfunction to be investigated. Usually, it is the ability of the mitochondria to make ATP appropriately in response to energy demands. Where other functions are of interest, tailored solutions are required. Dysfunction can be assessed in isolated mitochondria, in cells or in vivo, with different balances between precise experimental control and physiological relevance. There are many methods to measure mitochondrial function and dysfunction in these systems. Generally, measurements of fluxes give more information about the ability to make ATP than do measurements of intermediates and potentials. For isolated mitochondria, the best assay is mitochondrial respiratory control: the increase in respiration rate in response to ADP. For intact cells, the best assay is the equivalent measurement of cell respiratory control, which reports the rate of ATP production, the proton leak rate, the coupling efficiency, the maximum respiratory rate, the respiratory control ratio and the spare respiratory capacity. Measurements of membrane potential provide useful additional information. Measurement of both respiration and potential during appropriate titrations enables the identification of the primary sites of effectors and the distribution of control, allowing deeper quantitative analyses. Many other measurements in current use can be more problematic, as discussed in the present review

    Primjena i kompozicija individualiziranih zaštitnih elemenata linijske grafike u projektiranju novčanica

    Get PDF
    Proces stvaranja novčanica je dugotrajan i složen, što rezultira kompleksnim rješenjima koja predstavljaju pravo remek djelo grafike. Novčanice su prožete brojnim detaljima i prenose različite informacije koje se analiziraju u teorijskom dijelu rada. Prvotno se postavljaju kriteriji po kojima se izrađuje detaljna analiza velikog broja zaštitnih i konceptualnih elemenata na primjerima novčanica. Time je prikazan okvirni povijesni pregled razvoja novčanica i utjecaji kojima je bio izložen. Analizira se međuovisnost dizajna o sigurnosnim značajkama, te se ispituje razina informiranosti javnosti o zaštitama na novčanicama. Zaključuje se koje metode zaštite su najučinkovitije, te kako šira javnost najčešće provjerava autentičnost novčanica. U eksperimentalnom dijelu rada se na temelju donesenih zaključaka iz teorijskog dijela izrađuje prototip novčanice koja je u najvećoj mjeri prožeta individualiziranim PostScript programskim rješenjima elemenata linijske grafike (rozete, mikrotekst, zaštitne linije, brojevi apoena), a od ostalih zaštita modeliran je individualizirani raster transformacijom matematičkog izraza u PostScript programski kod. Sve ostale zaštite tipične za novčanice simulirane su alatima za rastersku i vektorsku grafiku. U radu se ispituje utjecaj kompozicije zaštitnih elemenata na prepoznavanje autentičnosti novčanica, te efikasnost samih individualiziranih programskih rješenja

    Experimenting with a trace-driven simulator of a batch computing system

    No full text

    Die Methode der Ausgewogenen Abweichung; Ein Hilfsmittel zur Zielstrebigen Leistungsverbesserung von Rechensystemen

    No full text

    Temperature, fluid content and rheology of localized ductile shear zones in subsolidus cooling plutons

    No full text
    Temperature and fluid content are critical parameters that control rock rheology and strain localization in the continental crust. Here, we determine by thermodynamic modelling the (Formula presented.) of localized ductile shearing during cooling of three different granitoid plutons: the Rieserferner and the Adamello plutons in the Italian Alps, and the Lake Edison pluton in the Sierra Nevada\u2014USA. Shear zones exploited precursor joints, associated veins and alteration zones. (Formula presented.) and P 12T phase diagram sections were computed with Perple_X in the system MnO 12Na2O 12CaO\ua0 12K2O 12FeO 12MgO 12Al2O3 12SiO2 12H2O 12Fe2O3. The phase diagram sections show that the nucleation of the brittle precursors (joints, veins) occurred at T\ubb 450\ub0C at fluid-saturated conditions. Localized ductile shearing likely occurred at temperature ranging between 420 and 460\ub0C evolving from initially fluid-saturated to fluid-undersaturated conditions in a closed system. In this temperature range, granitoid rocks are potentially subject to a series of retrograde metamorphic reactions replacing the load-bearing feldspars with weaker phyllosilicates. Metamorphic reactions occurred in spatial association with the precursory structures, leading to localized shearing. Decreasing temperature and fluid-undersaturated conditions likely hampered progressive strain accommodation in shear zones by slowing down metamorphic reactions, thermally activated dislocation creep processes, fluid-mediated deformation mechanisms and weakening mechanisms. Polyphase granitoid ultramylonite and mylonitic quartz veins have been affected differently by the fluid-undersaturated conditions of the system, as consequence of different dominant deformation mechanisms and syn-kinematic paragenesis during localized shearing. Localized ductile shearing in cooling plutons effectively occurs in a limited temperature range (420\u2013460\ub0C) in which the strain accommodation capacity of the shear zone is controlled by the negative feedback between the cooling rate, the kinetics of metamorphic reactions and deformation mechanisms, and the consumption of the limited amount of available fluids

    Cryptographic

    No full text
    methods of data protection have taken on new importance as computers have become faster and as strong cryptographic algorithms, such as the Data Encryption Standard (DES), have become available. But standard a encipherment technique is only the jrst step in applying cryptography in a computing center. This paper discusses the Information Protection System (IPS), a set of cryptographic application programs designed to use the DES algorithm in a working computing center. In designing IPS, several important augmentations of DES were formulated. IPS was first implemented to help increase computing-center security at the IBM Thomas J. Watson Research Center and is now widely installed at other IBM locations. IPS is not an IBM product and is not available for use outside IBM, but many cryptographic techniques in IPS were incorporated into the IBM cryptographic products announced in 1977
    corecore