6,752 research outputs found
Metabolism and Metabolic Inhibition of Xanthotoxol in Human Liver Microsomes
Cytochrome p450 (CYP450) enzymes are predominantly involved in Phase I metabolism of xenobiotics. In this study, the CYP450 isoforms involved in xanthotoxol metabolism were identified using recombinant CYP450s. In addition, the inhibitory effects of xanthotoxol on eight CYP450 isoforms and its pharmacokinetic parameters were determined using human liver microsomes. CYP1A2, one of CYP450s, played a key role in the metabolism of xanthotoxol compared to other CYP450s. Xanthotoxol showed stronger inhibition on CYP3A4 and CYP1A2 compared to other isoenzymes with the IC50 of 7.43 μM for CYP3A4 and 27.82 μM for CYP1A2. The values of inhibition kinetic parameters (Ki) were 21.15 μM and 2.22 μM for CYP1A2 and CYP3A4, respectively. The metabolism of xanthotoxol obeyed the typical monophasic Michaelis-Menten kinetics and Vmax, Km, and CLint values were calculated as 0.55 nmol·min−1·mg−1, 8.46 μM, and 0.06 mL·min−1·mg−1. In addition, the results of molecular docking showed that xanthotoxol was bound to CYP1A2 with hydrophobic and π-π bond and CYP3A4 with hydrogen and hydrophobic bond. We predicted the hepatic clearance (CLh) and the CLh value was 15.91 mL·min−1·kg−1 body weight. These data were significant for the application of xanthotoxol and xanthotoxol-containing herbs
Poly[[tetraaquadi-μ3-oxalato-μ2-oxalato-diprasedymium(III)] dihydrate]
In the title compound, {[Pr2(C2O4)3(H2O)4]·2H2O}n, the three-dimensional network structure has the PrIII ion coordinated by nine O atoms in a distorted tricapped trigonal-prismatic geometry. The coordinated and uncoordinated water molecules interact with the carboxylate O atoms to consolidate the network via O—H⋯O hydrogen bonds
An Optimal Energy Efficient Design of Artificial Noise for Preventing Power Leakage based Side-Channel Attacks
Side-channel attacks (SCAs), which infer secret information (for example
secret keys) by exploiting information that leaks from the implementation (such
as power consumption), have been shown to be a non-negligible threat to modern
cryptographic implementations and devices in recent years. Hence, how to
prevent side-channel attacks on cryptographic devices has become an important
problem. One of the widely used countermeasures to against power SCAs is the
injection of random noise sequences into the raw leakage traces. However, the
indiscriminate injection of random noise can lead to significant increases in
energy consumption in device, and ways must be found to reduce the amount of
energy in noise generation while keeping the side-channel invisible. In this
paper, we propose an optimal energy-efficient design for artificial noise
generation to prevent side-channel attacks. This approach exploits the sparsity
among the leakage traces. We model the side-channel as a communication channel,
which allows us to use channel capacity to measure the mutual information
between the secret and the leakage traces. For a given energy budget in the
noise generation, we obtain the optimal design of the artificial noise
injection by solving the side-channel's channel capacity minimization problem.
The experimental results also validate the effectiveness of our proposed
scheme
Charmless Two-body decays In Soft-Collinear-Effective-Theory
We provide the analysis of charmless two-body decays under the
framework of the soft-collinear-effective-theory (SCET), where denotes a
light vector (pseudoscalar) meson. Besides the leading power contributions,
some power corrections (chiraly enhanced penguins) are also taken into account.
Using the current available and experimental data on
branching fractions and CP asymmetry variables, we find two kinds of solutions
in fit for the 16 non-perturbative inputs which are essential in the
87 and decay channels. Chiraly enhanced penguins can change
several charming penguins sizably, since they share the same topology. However,
most of the other non-perturbative inputs and predictions on branching ratios
and CP asymmetries are not changed too much. With the two sets of inputs, we
predict the branching fractions and CP asymmetries of other modes especially
decays. The agreements and differences with results in QCD
factorization and perturbative QCD approach are analyzed. We also study the
time-dependent CP asymmetries in channels with CP eigenstates in the final
states and some other channels such as and
. In the perturbative QCD approach, the
penguins in annihilation diagrams play an important role. Although
they have the same topology with charming penguins in SCET, there are many
differences between the two objects in weak phases, magnitudes, strong phases
and factorization properties.Comment: 34 pages, revtex, 2 figures, published at PR
- …