6,752 research outputs found

    Metabolism and Metabolic Inhibition of Xanthotoxol in Human Liver Microsomes

    Get PDF
    Cytochrome p450 (CYP450) enzymes are predominantly involved in Phase I metabolism of xenobiotics. In this study, the CYP450 isoforms involved in xanthotoxol metabolism were identified using recombinant CYP450s. In addition, the inhibitory effects of xanthotoxol on eight CYP450 isoforms and its pharmacokinetic parameters were determined using human liver microsomes. CYP1A2, one of CYP450s, played a key role in the metabolism of xanthotoxol compared to other CYP450s. Xanthotoxol showed stronger inhibition on CYP3A4 and CYP1A2 compared to other isoenzymes with the IC50 of 7.43 μM for CYP3A4 and 27.82 μM for CYP1A2. The values of inhibition kinetic parameters (Ki) were 21.15 μM and 2.22 μM for CYP1A2 and CYP3A4, respectively. The metabolism of xanthotoxol obeyed the typical monophasic Michaelis-Menten kinetics and Vmax, Km, and CLint values were calculated as 0.55 nmol·min−1·mg−1, 8.46 μM, and 0.06 mL·min−1·mg−1. In addition, the results of molecular docking showed that xanthotoxol was bound to CYP1A2 with hydrophobic and π-π bond and CYP3A4 with hydrogen and hydrophobic bond. We predicted the hepatic clearance (CLh) and the CLh value was 15.91 mL·min−1·kg−1 body weight. These data were significant for the application of xanthotoxol and xanthotoxol-containing herbs

    Poly[[tetra­aquadi-μ3-oxalato-μ2-oxalato-diprasedymium(III)] dihydrate]

    Get PDF
    In the title compound, {[Pr2(C2O4)3(H2O)4]·2H2O}n, the three-dimensional network structure has the PrIII ion coordinated by nine O atoms in a distorted tricapped trigonal-prismatic geometry. The coordinated and uncoordinated water mol­ecules inter­act with the carboxyl­ate O atoms to consolidate the network via O—H⋯O hydrogen bonds

    An Optimal Energy Efficient Design of Artificial Noise for Preventing Power Leakage based Side-Channel Attacks

    Full text link
    Side-channel attacks (SCAs), which infer secret information (for example secret keys) by exploiting information that leaks from the implementation (such as power consumption), have been shown to be a non-negligible threat to modern cryptographic implementations and devices in recent years. Hence, how to prevent side-channel attacks on cryptographic devices has become an important problem. One of the widely used countermeasures to against power SCAs is the injection of random noise sequences into the raw leakage traces. However, the indiscriminate injection of random noise can lead to significant increases in energy consumption in device, and ways must be found to reduce the amount of energy in noise generation while keeping the side-channel invisible. In this paper, we propose an optimal energy-efficient design for artificial noise generation to prevent side-channel attacks. This approach exploits the sparsity among the leakage traces. We model the side-channel as a communication channel, which allows us to use channel capacity to measure the mutual information between the secret and the leakage traces. For a given energy budget in the noise generation, we obtain the optimal design of the artificial noise injection by solving the side-channel's channel capacity minimization problem. The experimental results also validate the effectiveness of our proposed scheme

    Charmless Two-body B(Bs)VPB(B_s)\to VP decays In Soft-Collinear-Effective-Theory

    Full text link
    We provide the analysis of charmless two-body BVPB\to VP decays under the framework of the soft-collinear-effective-theory (SCET), where V(P)V(P) denotes a light vector (pseudoscalar) meson. Besides the leading power contributions, some power corrections (chiraly enhanced penguins) are also taken into account. Using the current available BPPB\to PP and BVPB\to VP experimental data on branching fractions and CP asymmetry variables, we find two kinds of solutions in χ2\chi^2 fit for the 16 non-perturbative inputs which are essential in the 87 BPPB\to PP and BVPB\to VP decay channels. Chiraly enhanced penguins can change several charming penguins sizably, since they share the same topology. However, most of the other non-perturbative inputs and predictions on branching ratios and CP asymmetries are not changed too much. With the two sets of inputs, we predict the branching fractions and CP asymmetries of other modes especially BsVPB_s\to VP decays. The agreements and differences with results in QCD factorization and perturbative QCD approach are analyzed. We also study the time-dependent CP asymmetries in channels with CP eigenstates in the final states and some other channels such as Bˉ0/B0π±ρ\bar B^0/B^0\to\pi^\pm\rho^\mp and Bˉs0/Bs0K±K\bar B_s^0/B_s^0\to K^\pm K^{*\mp}. In the perturbative QCD approach, the (SP)(S+P)(S-P)(S+P) penguins in annihilation diagrams play an important role. Although they have the same topology with charming penguins in SCET, there are many differences between the two objects in weak phases, magnitudes, strong phases and factorization properties.Comment: 34 pages, revtex, 2 figures, published at PR
    corecore