scholarly journals Physiological Basis of Smut Infectivity in the Early Stages of Sugar Cane Colonization

2021 ◽  
Vol 7 (1) ◽  
pp. 44
Author(s):  
Carlos Vicente ◽  
María-Estrella Legaz ◽  
Elena Sánchez-Elordi

Sugar cane smut (Sporisorium scitamineum) interactions have been traditionally considered from the plant’s point of view: How can resistant sugar cane plants defend themselves against smut disease? Resistant plants induce several defensive mechanisms that oppose fungal attacks. Herein, an overall view of Sporisorium scitamineum’s mechanisms of infection and the defense mechanisms of plants are presented. Quorum sensing effects and a continuous reorganization of cytoskeletal components, where actin, myosin, and microtubules are required to work together, seem to be some of the keys to a successful attack.

1982 ◽  
Vol 11 ◽  
pp. 74-86 ◽  
Author(s):  
Kaj Björkqvist

The biological study of man is one of today's most rapidly advancing sciences. There is no reason for not utilizing these methodologies of research and the knowledge already gained when studying ecstasy and other similar religious phenomena. Drugs have been used in all parts of the world as an ecstasy technique. Since mental states and physiological correlates always accompany each other, it is obvious that the human mind can be affected by external means, for instance by drugs. But the opposite is also true; mental changes affect the body, as they do in the case of psychosomatic diseases. Ecstasy is often described as an extremely joyful experience; this pleasure must necessarily also have a physiological basis. It is of course too early to say anything for certain, but the discovery of pleasure centres in the brain might offer an explanation. It is not far-fetched to suggest that when a person experiences euphoric ecstasy, it might, in some way or other, be connected with a cerebral pleasure center. Can it be, for example, that religious ecstasy is attained only by some mechanism triggering off changes in the balance of the transmitter substances? Or is it reached only via a change in the hormonal balance, or only by a slowing down of the brain waves, or is a pleasure centre activated? When a person is using an ecstasy technique, he usually does so within a religious tradition. When he reaches an experience, a traditional interpretation of it already exists.


2021 ◽  
Author(s):  
Michail Shaldybin

Abstract Vast deposits of anhydrite and magnesite widely distributed in Ediacaran strata of East Siberia near the Riphean unconformity. Anhydrite-rich rocks are not look like of evaporitic origin find mostly nodules and the layers of chicken-wire structure otherwise disseminated as tiny sulfate forms amongst the terrigenous rocks. Here we propose an alternative point of view for anhydrite appearance – the enrichment of Sulphur because of the slashing increase the content of sulfur in the Ediacaran atmosphere due to high volcanic activity. It is suggested that the ancient Earth's atmosphere could have also been influenced by powerful sulfuric acid rains that eroded the Precambrian dolomites causing their aggressive degradation. Chemical reactions with dolomite and sulfuric acid showed that in the early stages an unstable phase of bassanite occur which later stabilized as anhydrite after its heating as an analogue of aging. Aggressive acids have caused global process of dolomite karstification of the Siberian craton with appearance in Ediacaran strata in addition to the sulfate phases, including magnesite and sulphurous phases of pyrite and barite.


2013 ◽  
pp. 489-501 ◽  
Author(s):  
M. CAGALINEC ◽  
I. WACZULÍKOVÁ ◽  
O. ULIČNÁ ◽  
D. CHORVAT

Diabetic cardiomyopathy is the leading cause of mortality in type 1 diabetes. Thus study of cardiomyocyte morphology and function during early stages of diabetes using modern analytical methods is of critical importance. Therefore, using confocal microscopy, we determined metric parameters, volumes and contractility, with calcium transients in isolated left-ventricular myocytes at one week after induction of diabetes in rats. Myocyte volume analysis from 3D confocal scans was performed using an automated contour detection algorithm that took the actual shape of the myocytes into account. We showed a significant reduction in myocyte volume in diabetic animals. We also showed a significant reduction in length and width but not in thickness of the myocytes, which suggests disproportional reorganization of the structure of the heart tissue during short-term diabetes. From a functional point of view, we observed a significant decrease in cell shortening at a stimulation frequency of 0.5 Hz. This was accompanied by a decrease in calcium transient amplitude. Together, these data suggest that impaired calcium handling is one of the factors that contributes to the observed decrease in myocyte shortening during early stages of streptozotocin-induced diabetes in rats.


2022 ◽  
Vol 54 (9) ◽  
pp. 1-33
Author(s):  
Meriem Guerar ◽  
Luca Verderame ◽  
Mauro Migliardi ◽  
Francesco Palmieri ◽  
Alessio Merlo

A recent study has found that malicious bots generated nearly a quarter of overall website traffic in 2019 [102]. These malicious bots perform activities such as price and content scraping, account creation and takeover, credit card fraud, denial of service, and so on. Thus, they represent a serious threat to all businesses in general, but are especially troublesome for e-commerce, travel, and financial services. One of the most common defense mechanisms against bots abusing online services is the introduction of Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA), so it is extremely important to understand which CAPTCHA schemes have been designed and their actual effectiveness against the ever-evolving bots. To this end, this work provides an overview of the current state-of-the-art in the field of CAPTCHA schemes and defines a new classification that includes all the emerging schemes. In addition, for each identified CAPTCHA category, the most successful attack methods are summarized by also describing how CAPTCHA schemes evolved to resist bot attacks, and discussing the limitations of different CAPTCHA schemes from the security, usability, and compatibility point of view. Finally, an assessment of the open issues, challenges, and opportunities for further study is provided, paving the road toward the design of the next-generation secure and user-friendly CAPTCHA schemes.


2021 ◽  
Vol 13 (2) ◽  
pp. 41-48
Author(s):  
Eduardo DE-CARLI ◽  
◽  
Andréa Paula SEGATTO ◽  
Ananda Silva SINGH ◽  
◽  
...  

This study aims at promoting an analysis of the process of technology transfer undertaken by Federal University of Paraná (UFPR), by means of the activities developed in the Genetic Improvement Program of Sugar Cane for the development of new technologies, new varieties of sugar cane. To do so, a single case study performed at the UFPR is held, aiming at identifying the main aspects that involve this process from the point of view of an institution. It was possible to notice that it creates a stimulus to the development of knowledge about a particular variety of the sugar cane plant by means of the interaction between the ten universities and also with its partners, in order to develop a variety more genetically developed that allows, for example, increased productivity. The technology transfer in the course of the process allows the development of several new varieties of sugar cane, in addition to providing expertise to members of the project. It is of fundamental importance for the activities and varieties to be carried out in a better way every time.


2020 ◽  
Author(s):  
Anca-Livia Panfil ◽  
Mirela Frandes ◽  
Aurel Nirestean ◽  
Marinela Hurmuz ◽  
Diana Lungeanu ◽  
...  

Abstract Background: The challenges that a professional face when working in the field of psychiatry require the development of adequate defensive and coping styles. Our study aimed to explore both the coping strategies and defense mechanisms and their relationship among psychiatry trainees in Romania.Methods: A cross-sectional study was conducted to determine and to evaluate both defensive and coping styles of Romanian psychiatry trainees. DSQ-60 and COPE scales were applied to psychiatry trainees from five training centers in Romania. By applying structural equation modeling, we studied models that presumed the existence of relationships between coping strategies and defensive mechanisms. Results: The results of the study indicate that superior defense mechanisms and task-oriented coping style were the commonly used approach by trainees in psychiatry. Also, our findings show significantly consistent correlations (ranging from 0.2 to 0.5) between adaptive defense mechanisms and coping styles focused on the problem or the emotion. Similarly, the avoidant coping strategies correlated with non-adaptative defense styles (correlations between 0.3 and 0.5). Our model presented good fit indices, X2(34) = 64.324, p < 0.001; GFI = 0.93; RMSE = 0.08. Moreover, the results indicated a weak association, r = 0.07, p < 0.001, between the two types of adaptive processes.Conclusion: Our findings suggest that trainees in psychiatry present a profile based on two independent groups of adaptation processes, namely, adaptive defenses and problem-oriented coping scales, and non-adaptive defenses and avoidant coping scales.


Author(s):  
Carlo Belletini

The chapter introduces and describes representative defense mechanisms to protect from both basic and advanced exploitation of low-level coding vulnerabilities. Exploitation of low-level coding vulnerabilities has evolved from a basic stack-based buffer overflow with code injection to highly sophisticated attack techniques. In addition, pure-data attacks were demonstrated to be as efficient as control-data attacks and quite realistic. On the other hand research on assessment of the robustness of proposed mitigation techniques revealed various weaknesses in them leading to design and implementation of evasion techniques. Most of the defensive techniques protect only from a limited set of attack techniques, thus a defense employment requires multiple complementary mitigation techniques. Furthermore, there are few mitigation techniques designed to counter pure-data attacks. In response to these limitations, current research proposes better defensive mechanisms such as pointer taintedness detection and attack data burning capable of countering any kind of control-data or pure-data attack.


2021 ◽  
Author(s):  
Anjali Warrier ◽  
Kapaettu Satyamoorthy ◽  
Thokur Sreepathy Murali

Chronic polymicrobial wound infections are often characterized by the presence of bacterial biofilms. They show considerable structural and functional heterogeneity, which influences the choice of antimicrobial therapy and wound healing dynamics. The hallmarks of biofilm-associated bacterial infections include elevated antibiotic resistance and extreme pathogenicity. Biofilm helps bacteria to evade the host defense mechanisms and persist longer in the host. Quorum-sensing (QS)-mediated cell signaling primarily regulates biofilm formation in chronic infections and plays a major role in eliciting virulence. This review focuses on the QS mechanisms of two major bacterial pathogens, Staphylococcus aureus and Pseudomonas aeruginosa and explains how they interact in the wound microenvironment to regulate biofilm development and virulence. The review also provides an insight into the treatment modalities aimed at eradicating polymicrobial biofilms. This information will help us develop better diagnostic modalities and devise effective treatment regimens to successfully manage and overcome severe life-threatening bacterial infections.


Sign in / Sign up

Export Citation Format

Share Document