Spelling suggestions: "subject:"tour"" "subject:"tror""
111 |
Elabora??o de escore de risco para mediastinite em cirurgia de revasculariza??o do mioc?rdioMagedanz, Ellen Hettwer 31 March 2009 (has links)
Made available in DSpace on 2015-04-14T13:34:44Z (GMT). No. of bitstreams: 1
417207.pdf: 1948874 bytes, checksum: 651353755b706f1fbeaf821f70d302a6 (MD5)
Previous issue date: 2009-03-31 / Introdu??o: A mediastinite ? uma grave complica??o do p?s-operat?rio de cirurgia card?aca, com incid?ncia de 0,4 a 5% e mortalidade entre 14 e 47%. V?rios modelos foram propostos para avaliar risco de mediastinite ap?s cirurgia card?aca. Entretanto, a maioria desses modelos n?o avalia a morbidade p?soperat?ria. Objetivo: desenvolver um modelo de escore de risco para prever mediastinite em pacientes submetidos ? cirurgia de revasculariza??o do mioc?rdio. M?todos: A amostra do estudo inclui dados de 2.809 pacientes adultos que realizaram cirurgia de revasculariza??o do mioc?rdio entre Janeiro de 1996 a Dezembro de 2007 no Hospital S?o Lucas da PUCRS. Regress?o log?stica foi utilizada para examinar a rela??o entre fatores de risco e o desenvolvimento de mediastinite. Dados de 1.889 pacientes foram utilizados para desenvolver o modelo e seu desempenho foi avaliado nos dados restantes (n=920). O modelo final foi criado com a an?lise dos dados de 2.809 pacientes. Resultados: O ?ndice de mediastinite foi de 3,3%, com mortalidade de 26,6%. Na an?lise multivariada, cinco vari?veis permaneceram preditores independentes para o desfecho: doen?a pulmonar obstrutiva cr?nica, obesidade, reinterven??o cir?rgica, politransfus?o no p?s-operat?rio e angina est?vel classe IV ou inst?vel. A ?rea sob a curva ROC foi 0,72 (IC 95%, 0,67-0,78) e p=0,61. Conclus?o: O escore de risco foi costru?do para uso na pr?tica di?ria para calcular a incid?ncia de mediastinite ap?s cirurgia de revasculariza??o do mioc?rdio. O escore inclui vari?veis coletadas rotineiramente e de f?cil utiliza??o.
|
112 |
Origem e distribui??o antim?rica dos nervos do plexo braquial em Macaca mulatta (Zimmermann, 1780) (Cercopithecidae, Primates) / Origin and antimeric distribution of the brachial plexus nerve in Macaca mulatta (Zimmermann, 1780) (Cercopithecidae, Primates).Sousa, Carlos Augusto dos Santos 03 February 2016 (has links)
Submitted by Leticia Schettini (leticia@ufrrj.br) on 2017-04-24T14:23:01Z
No. of bitstreams: 1
2016 - Carlos Augusto dos Santos Sousa.pdf: 2340153 bytes, checksum: 5ef373f242c2c4700a9a9e55280bc62c (MD5) / Made available in DSpace on 2017-04-24T14:23:01Z (GMT). No. of bitstreams: 1
2016 - Carlos Augusto dos Santos Sousa.pdf: 2340153 bytes, checksum: 5ef373f242c2c4700a9a9e55280bc62c (MD5)
Previous issue date: 2016-02-03 / Coordena??o de Aperfei?oamento de Pessoal de N?vel Superior / Morphology studies provide knowledge that allow us to understand how animals interact with
the natural environment or in captivity. In this context, the comparative anatomy of the
formation of the brachial plexus awakens interest since the nineteenth century and remains
one of the most intriguing topics of contemporary anatomy. The aim of this study was to
describe the origin and the antimeric distribution of the brachial plexus nerves in Macaca
mulatta, as well as the innervated muscles. Ten male rhesus monkeys (Macaca mulatta) were
used, from the Non-human Primates? Breeding Department at the Laboratory Animals
Breeding Centre (Cecal/Fiocruz), donated to the Animal Anatomy Department of the Rural
Federal University of Rio de Janeiro (UFRRJ). The specimens were fixed in formaldehyde
solution by infusion of 10% solution. They were subsequently wrapped in a low-density
polythene container with 500 liters of formaldehyde 30% solution over a period of 12 months.
After this period, they were washed in running water and subjected to X-ray examinations of
the neck at the Small Animals Veterinary Hospital of the UFRRJ to characterize the number
of cervical vertebrae. Then, they had both antimeres dissected aiming at the exposure of the
origins and the nerves arising from the brachial plexus. Data were presented both in absolute
frequency and in simple percentage. In 11 (55%) animals the resulting nerves were
constituted by the connections between the ventral spinal branches C5, C6, C7, C8 and T1. In
5 (25%) animals, the participants roots were C4, C5, C6, C7, C8, T1 and T2. In 2 (10%)
animals C5, C6, C7, C8, T1 and T2. In the other 2 (10%) animals the formation of the plexus
was observed from C6, C7, C8, T1 and T2. The ventral branches formed three nerve trunks:
cranial, middle and caudal. The suprascapular nerves, subscapular, axillary,
musculocutaneous, radial, median, ulnar innervated the intrinsic muscles and the subclavian
nerve innervated the thoracodorsal, medial cutaneous arm and forearm, long thoracic, cranial
pectoral and caudal pectoral innervate extrinsic muscles. The results obtained in this study
contribute to the comparative anatomy of primates and to the information for applied
research, serving as basis for clinical and surgical procedures that uses this species as an
animal model. / Estudos morfol?gicos fornecem conhecimentos que permitem entender o modo como os
animais interagem com o ambiente natural ou em cativeiro. O objetivo desse estudo foi
descrever a origem e a distribui??o antim?rica dos nervos do plexo braquial em Macaca
mulatta, assim como dos m?sculos inervados. Foram utilizados 10 cad?veres de Macaca
mulatta do sexo masculino, oriundos do Servi?o de Cria??o de Primatas N?o Humanos do
Centro de Cria??o de Animais de Laborat?rio (Cecal/Fiocruz) doados a ?rea de Anatomia
Animal da Universidade Federal Rural do Rio de Janeiro (UFRRJ). Os esp?cimes foram
fixados com perfus?o de solu??o de formalde?do a 10%. Posteriormente, foram
acondicionados em caixas de polietileno de baixa densidade com capacidade de 500 litros
contendo solu??o de formalde?do a 30% por um per?odo de 12 meses. Ap?s este per?odo,
foram lavados em ?gua corrente e submetidos a exames radiogr?ficos da regi?o cervical no
Hospital Veterin?rio de Pequenos Animais da UFRRJ para a caracteriza??o do n?mero de
v?rtebras cervicais. Em seguida, foram dissecados at? a exposi??o das origens e dos nervos
oriundos do plexo braquial. Os dados foram representados em frequ?ncia absoluta e
percentual simples. Em 11 (55%) os nervos resultantes foram constitu?dos das conex?es entre
os ramos espinhais ventrais de C5, C6, C7, C8 e T1. Em 5 (25%) as ra?zes participantes foram
C4, C5, C6, C7, C8, T1 e T2. Em 2 (10%) de C5, C6, C7, C8, T1 e T2. Em outros 2 (10%)
verificamos a constitui??o do plexo a partir de C6, C7, C8, T1 e T2. Os ramos ventrais
formaram tr?s troncos nervosos: cranial, m?dio e caudal. Os nervos supraescapular,
subescapulares, axilar, musculocut?neo, radial, mediano, ulnar inervaram a musculatura
intr?nseca e os nervos subcl?vios, toracodorsal, tor?cico longo, peitoral cranial e peitoral
caudal inervaram a musculatura extr?nseca. Tamb?m foram registrados os nervos cut?neos
oriundos do plexo braquial, sendo eles o nervo cut?neo medial do bra?o, nervo cut?neo
medial do antebra?o e ramos para a musculatura cut?nea do tronco. Os dados descritos neste
estudo contribuem para a anatomia comparada de primatas e fornecem informa??es para a
pesquisa aplicada, servindo como base para procedimentos cl?nico-cir?rgicos em que venha a
se utilizar esta esp?cie como modelo experimental.
|
113 |
Characterizing Interaction Between PASK and PBP1/ ATXN2 to Regulate Cell Growth and ProliferationChoksi, Nidhi Rajan 01 September 2016 (has links)
Pbp1 is a component of glucose deprivation induced stress granules and is involved in P-body-dependent granule assembly. We have recently shown that Pbp1 plays an important role in the interplay between three sensory protein kinases in yeast: AMP-regulated kinase (Snf1 in yeast), PAS kinase 1 (Psk1 in yeast), and the target of rapamycin complex 1 (TORC1), to regulate glucose allocation during nutrient depletion. This signaling cascade occurs through the SNF1-dependent phosphorylation and activation of Psk1, which phosphorylates and activates poly(A)- binding protein binding protein 1 (Pbp1), which then inhibits TORC1 through sequestration at stress granules. In this study we further characterized the regulation of Pbp1 by PAS kinase through the characterization of the role of the Psk1 homolog (Psk2) in Pbp1 regulation, and the identification of functional Pbp1 binding partners. Human ataxin-2 (ATXN2) is the homolog of yeast Pbp1 and has been shown to play an important role in the development of several ataxias. In this study we have also provided the evidence that human ataxin-2 can complement Pbp1 in yeast, and that human PAS kinase can phosphorylate human ataxin-2. Further characterizing this interplay between PAS kinase and Pbp1/ATXN2 aid in understanding pathways required for proper glucose allocation during nutrient depletion, including reducing cell growth and proliferation when energy is low. In addition, it yields valuable insights into the role of ataxin-2 in the development of devastating ataxias.
|
114 |
Vägen till Valhall : Begravningsriter och eskatologiska föreställningar i Gästrikland under yngre järnåldernEriksson, Christina January 2004 (has links)
<p>The purpose of this investigation is to scrutinise archaeological finds in funeral contexts in the province of Gästrikland, Sweden, and categorize them into one of the three phases in the phenomenological model of “rites de passage”. This method has been applied by the archaeologist Tore Artelius on finds discovered at a grave field in Halland; Sannagård. Following questions are addressed: What happened to the deceased person? Where did he/she go? Which God came to meet him/her? Or did he/she perhaps stay in the grave? To answer these questionst I have used Old Norse written sources and ideas produced in the field of history of religions.</p>
|
115 |
Hammaren och Korset : Hur bilden och kulten av Tor kom att influera kristnandet i SvealandEriksson, Christina January 2005 (has links)
<p>Omkring år 30 sänder Jesus ut sina lärjungar i världen att sprida det kristna budskapet. På sin vandring genom Europas länder förändras synen på Kristus, han blir ”germaniserad” när de germanska stammarna tar Honom till sig och byter tro. Till slut når kristendomen så fram till ”jordens yttersta gräns” för att använda Rimberts ord - Svealand. Där möter missionärerna något som jag ser som de fornnordiska gudarnas sista utpost, nämligen templet i Uppsala. Enligt Adam av Bremen hade svearna ett stort kultcentrum där, dit folk vallfärdade med gåvor vart nionde år då en stor fest ägde rum. Inne i templet satt Tor i högsätet i mitten och på var sin sida om sig hade han Oden och Frej. Tor var alltså enligt Adam av Bremen den högsta Guden som rådde över allt slags väder och som man vände sig till när hungersnöd eller farsot hotade. Jag har i mitt arbete försökt visa att Adam av Bremen har rätt i sitt antagande att Tor var en stor gud och en värdig motståndare till den nya tron. Målsättningen har varit att spåra en religiös kontinuitet från Tor till utformningen av den kristna guden i källorna från den här tiden. De källor jag studerat är:</p><p>• Sagor och legender. En okänd kung Erik, Erik den helige samt Olav den helige visar alla på kopplingar till den fornnordiske guden Tor.</p><p>• Arkeologiska fynd. Fynd av Torshammare och kristna kors visar att de användes under samma tidsperiod.</p><p>• Ikonografi. Bilder på Kristus och helgonen visar att de var segrande vikingakungar och därmed passade in på den fornnordiska härskarmaktens mansideal.</p><p>• Ortnamn. Sankt Olofsåkern i Uppsala som har kopplingar bakåt till en åker där Torskult förekommit.</p><p>• Kultformler. Böner och ord som riktas till gudarna om önskat beskydd. Samma formler har använts både före och efter kristnandet.</p><p>• Runstenar. Bild som kan vittna om att missionärerna ”kristnade” fornnordiska Torsmyter samt texter och symboler som belyser människornas osäkerhet inför den nya guden, för säkerhets skull vände man sig till båda.</p>
|
116 |
Practical Private Information RetrievalOlumofin, Femi George January 2011 (has links)
In recent years, the subject of online privacy has been attracting much interest, especially as more Internet users than ever are beginning to care about the privacy of their online activities. Privacy concerns are even prompting legislators in some countries to demand from service providers a more privacy-friendly Internet experience for their citizens. These are welcomed developments and in stark contrast to the practice of Internet censorship and surveillance that legislators in some nations have been known to promote. The development of Internet systems that are able to protect user privacy requires private information retrieval (PIR) schemes that are practical, because no other efficient techniques exist for preserving the confidentiality of the retrieval requests and responses of a user from an Internet system holding unencrypted data. This thesis studies how PIR schemes can be made more relevant and practical for the development of systems that are protective of users' privacy.
Private information retrieval schemes are cryptographic constructions for retrieving data from a database, without the database (or database administrator) being able to learn any information about the content of the query. PIR can be applied to preserve the confidentiality of queries to online data sources in many domains, such as online patents, real-time stock quotes, Internet domain names, location-based services, online behavioural profiling and advertising, search engines, and so on.
In this thesis, we study private information retrieval and obtain results that seek to make PIR more relevant in practice than all previous treatments of the subject in the literature, which have been mostly theoretical. We also show that PIR is the most computationally efficient known technique for providing access privacy under realistic computation powers and network bandwidths. Our result covers all currently known varieties of PIR schemes. We provide a more detailed summary of our contributions below:
Our first result addresses an existing question regarding the computational practicality of private information retrieval schemes. We show that, unlike previously argued, recent lattice-based computational PIR schemes and multi-server information-theoretic PIR schemes are much more computationally efficient than a trivial transfer of the entire PIR database from the server to the client (i.e., trivial download). Our result shows the end-to-end response times of these schemes are one to three orders of magnitude (10--1000 times) smaller than the trivial download of the database for realistic computation powers and network bandwidths. This result extends and clarifies the well-known result of Sion and Carbunar on the computational practicality of PIR.
Our second result is a novel approach for preserving the privacy of sensitive constants in an SQL query, which improves substantially upon the earlier work. Specifically, we provide an expressive data access model of SQL atop of the existing rudimentary index- and keyword-based data access models of PIR. The expressive SQL-based model developed results in between 7 and 480 times improvement in query throughput than previous work.
We then provide a PIR-based approach for preserving access privacy over large databases. Unlike previously published access privacy approaches, we explore new ideas about privacy-preserving constraint-based query transformations, offline data classification, and privacy-preserving queries to index structures much smaller than the databases. This work addresses an important open problem about how real systems can systematically apply existing PIR schemes for querying large databases.
In terms of applications, we apply PIR to solve user privacy problem in the domains of patent database query and location-based services, user and database privacy problems in the domain of the online sales of digital goods, and a scalability problem for the Tor anonymous communication network.
We develop practical tools for most of our techniques, which can be useful for adding PIR support to existing and new Internet system designs.
|
117 |
Vägen till Valhall : Begravningsriter och eskatologiska föreställningar i Gästrikland under yngre järnåldernEriksson, Christina January 2004 (has links)
The purpose of this investigation is to scrutinise archaeological finds in funeral contexts in the province of Gästrikland, Sweden, and categorize them into one of the three phases in the phenomenological model of “rites de passage”. This method has been applied by the archaeologist Tore Artelius on finds discovered at a grave field in Halland; Sannagård. Following questions are addressed: What happened to the deceased person? Where did he/she go? Which God came to meet him/her? Or did he/she perhaps stay in the grave? To answer these questionst I have used Old Norse written sources and ideas produced in the field of history of religions.
|
118 |
Hammaren och Korset : Hur bilden och kulten av Tor kom att influera kristnandet i SvealandEriksson, Christina January 2005 (has links)
Omkring år 30 sänder Jesus ut sina lärjungar i världen att sprida det kristna budskapet. På sin vandring genom Europas länder förändras synen på Kristus, han blir ”germaniserad” när de germanska stammarna tar Honom till sig och byter tro. Till slut når kristendomen så fram till ”jordens yttersta gräns” för att använda Rimberts ord - Svealand. Där möter missionärerna något som jag ser som de fornnordiska gudarnas sista utpost, nämligen templet i Uppsala. Enligt Adam av Bremen hade svearna ett stort kultcentrum där, dit folk vallfärdade med gåvor vart nionde år då en stor fest ägde rum. Inne i templet satt Tor i högsätet i mitten och på var sin sida om sig hade han Oden och Frej. Tor var alltså enligt Adam av Bremen den högsta Guden som rådde över allt slags väder och som man vände sig till när hungersnöd eller farsot hotade. Jag har i mitt arbete försökt visa att Adam av Bremen har rätt i sitt antagande att Tor var en stor gud och en värdig motståndare till den nya tron. Målsättningen har varit att spåra en religiös kontinuitet från Tor till utformningen av den kristna guden i källorna från den här tiden. De källor jag studerat är: • Sagor och legender. En okänd kung Erik, Erik den helige samt Olav den helige visar alla på kopplingar till den fornnordiske guden Tor. • Arkeologiska fynd. Fynd av Torshammare och kristna kors visar att de användes under samma tidsperiod. • Ikonografi. Bilder på Kristus och helgonen visar att de var segrande vikingakungar och därmed passade in på den fornnordiska härskarmaktens mansideal. • Ortnamn. Sankt Olofsåkern i Uppsala som har kopplingar bakåt till en åker där Torskult förekommit. • Kultformler. Böner och ord som riktas till gudarna om önskat beskydd. Samma formler har använts både före och efter kristnandet. • Runstenar. Bild som kan vittna om att missionärerna ”kristnade” fornnordiska Torsmyter samt texter och symboler som belyser människornas osäkerhet inför den nya guden, för säkerhets skull vände man sig till båda.
|
119 |
Etude de la voie de signalisation et du complexe TOR (Target Of Rapamycin) chez ArabidopsisDobrenel, Thomas 12 December 2012 (has links) (PDF)
La protéine kinase TOR (Target Of Rapamycin) a été identifiée chez la levure et les mammifères comme participant à deux complexes protéiques qui servent de carrefour entre la perception des facteurs endogènes et exogènes et la stimulation de la croissance cellulaire. Depuis la découverte de la kinase AtTOR chez Arabidopsis thaliana, des études ont été menées afin de mieux caractériser son rôle chez les plantes et l'influence de son niveau d'expression sur la régulation du métabolisme et du développement.Au cours de ce travail, j'ai contribué à l'étude de cette kinase en étudiant l'influence de l'inactivation de TOR sur la composition du ribosome au niveau protéique et sur le niveau de phosphorylation de ces protéines, ainsi que sur l'organisation du méristème au niveau moléculaire et cytologique Au cours de cette étude, j'ai montré que certaines protéines constitutives du ribosome pourraient être des cibles de l'activité TOR au niveau de leur abondance et/ou de leur état de phosphorylation. Ainsi, l'inactivation de TOR entraine une diminution du niveau de phosphorylation des protéines RPS6 et pourrait influencer l'abondance des protéines acides constitutives du stalk ribosomal, une structure importante dans la régulation de la traduction. Les résultats obtenus suggèrent également que l'activité TOR est nécessaire au maintien du méristème à l'état fonctionnel en régulant les voies importantes contrôlant la division et la différentiation au sein de cette structure.
|
120 |
Practical Private Information RetrievalOlumofin, Femi George January 2011 (has links)
In recent years, the subject of online privacy has been attracting much interest, especially as more Internet users than ever are beginning to care about the privacy of their online activities. Privacy concerns are even prompting legislators in some countries to demand from service providers a more privacy-friendly Internet experience for their citizens. These are welcomed developments and in stark contrast to the practice of Internet censorship and surveillance that legislators in some nations have been known to promote. The development of Internet systems that are able to protect user privacy requires private information retrieval (PIR) schemes that are practical, because no other efficient techniques exist for preserving the confidentiality of the retrieval requests and responses of a user from an Internet system holding unencrypted data. This thesis studies how PIR schemes can be made more relevant and practical for the development of systems that are protective of users' privacy.
Private information retrieval schemes are cryptographic constructions for retrieving data from a database, without the database (or database administrator) being able to learn any information about the content of the query. PIR can be applied to preserve the confidentiality of queries to online data sources in many domains, such as online patents, real-time stock quotes, Internet domain names, location-based services, online behavioural profiling and advertising, search engines, and so on.
In this thesis, we study private information retrieval and obtain results that seek to make PIR more relevant in practice than all previous treatments of the subject in the literature, which have been mostly theoretical. We also show that PIR is the most computationally efficient known technique for providing access privacy under realistic computation powers and network bandwidths. Our result covers all currently known varieties of PIR schemes. We provide a more detailed summary of our contributions below:
Our first result addresses an existing question regarding the computational practicality of private information retrieval schemes. We show that, unlike previously argued, recent lattice-based computational PIR schemes and multi-server information-theoretic PIR schemes are much more computationally efficient than a trivial transfer of the entire PIR database from the server to the client (i.e., trivial download). Our result shows the end-to-end response times of these schemes are one to three orders of magnitude (10--1000 times) smaller than the trivial download of the database for realistic computation powers and network bandwidths. This result extends and clarifies the well-known result of Sion and Carbunar on the computational practicality of PIR.
Our second result is a novel approach for preserving the privacy of sensitive constants in an SQL query, which improves substantially upon the earlier work. Specifically, we provide an expressive data access model of SQL atop of the existing rudimentary index- and keyword-based data access models of PIR. The expressive SQL-based model developed results in between 7 and 480 times improvement in query throughput than previous work.
We then provide a PIR-based approach for preserving access privacy over large databases. Unlike previously published access privacy approaches, we explore new ideas about privacy-preserving constraint-based query transformations, offline data classification, and privacy-preserving queries to index structures much smaller than the databases. This work addresses an important open problem about how real systems can systematically apply existing PIR schemes for querying large databases.
In terms of applications, we apply PIR to solve user privacy problem in the domains of patent database query and location-based services, user and database privacy problems in the domain of the online sales of digital goods, and a scalability problem for the Tor anonymous communication network.
We develop practical tools for most of our techniques, which can be useful for adding PIR support to existing and new Internet system designs.
|
Page generated in 0.03 seconds