scholarly journals The zebrafish operculum: A powerful system to assess osteogenic bioactivities of molecules with pharmacological and toxicological relevance

Author(s):  
Marco Tarasco ◽  
Vincent Laizé ◽  
João Cardeira ◽  
M. Leonor Cancela ◽  
Paulo J. Gavaia
Keyword(s):  
2021 ◽  
pp. 096372142110095
Author(s):  
Steven L. Franconeri

The visual system evolved and develops to process the scenes, faces, and objects of the natural world, but people adapt this powerful system to process data within an artificial world of visualizations. To extract patterns in data from these artificial displays, viewers appear to use at least three perceptual tools, including a tool that extracts global statistics, one that extracts shapes within the data, and one that produces sentence-like comparisons. A better understanding of the power, limits, and deployment of these tools would lead to better guidelines for designing effective data displays.


Author(s):  
Uche Ogbuji

Akara is an open-source XML/Web mashup platform supporting XML processing in an environment of RESTful data services. It includes “Web triggers”, which build on REST architecture to support orchestration of Web events. This is a powerful system for integrating services and components across the Web in a declarative way, so that perhaps a Web request could access information from a service running on Amazon EC2 to analyze information gathered from social networks, run through a remote spam detector service. Akara is designed from ground up to support such rich interactions, using the latest conventions and standards of the Web 2.0 era. It's also designed for performance, modern processor conventions and architectures, and for ready integration with other tools and components.


1974 ◽  
Vol 116 (1) ◽  
pp. 17-19 ◽  
Author(s):  
J. Berschin ◽  
K. Johnson ◽  
P.J. Krause ◽  
H. Ströbele

PeerJ ◽  
2016 ◽  
Vol 4 ◽  
pp. e2731
Author(s):  
José M. Zamudio-Arroyo ◽  
Juan R. Riesgo-Escovar

Drosophila embryogenesis has proven to be an extremely powerful system for developmental gene discovery and characterization. We isolated five new EMS-induced alleles that do not complement thel(3R)5G83lethal line isolated in the Nüsslein-Volhard and Wieschaus screens. We have named this locuschem. Lethality of the new alleles as homozygous zygotic mutants is not completely penetrant, and they have an extended phenocritical period. Like the original allele, a fraction of mutant embryos die with cuticular defects, notably head involution and dorsal closure defects. Embryonic defects are much more extreme in germline clones, where the majority of mutant embryos die during embryogenesis and do not form cuticle, implying a strongchemmaternal contribution.chemmutations genetically interact with mutations in cytoskeletal genes (arm) and with mutations in the epithelial polarity genescoracle, crumbs,andyurt.chemmutants dorsal open defects are similar to those present inyurtmutants, and, likewise, they have epithelial polarity defects.chem1andchem3mutations suppressyurt3, andchem3mutants suppresscrumbs1mutations. In contrast,chem1andcoracle2mutations enhance each other. Compared to controls, inchemmutants in embryonic lateral epithelia Crumbs expression is mislocalized and reduced, Coracle is increased and mislocalized basally at embryonic stages 13–14, then reduced at stage 16. Arm expression has a similar pattern but levels are reduced.


Author(s):  
B. A. Kobrinskii ◽  
A. I. Khavkin ◽  
G. V. Volynets

The lecture is devoted to a new direction in clinical medicine — the possibility of using artificial intelligence — the field of computer science, which is engaged in modeling the method of acquiring and using knowledge specific to humans. The basis for a correct diagnosis is a combination of experience, the ability to think and act non-standard in difficult cases. A powerful system of generalization and classification, implemented in intelligent systems, allows you to reduce a huge number of possible situations to a small number of typical situations by which decisions or hypotheses are formed.


1985 ◽  
Vol 111 ◽  
pp. 17-29
Author(s):  
R. F. Garrison

Most systems of classification or quantitative measurement depend on standards. It is of the greatest importance for the user to be aware of the mandate of a particular system. If the mandate is not understood by casual users, a system can be either underutilized or abused.In the particular case of the MK system of spectral classification, types are defined by the standard stars. They can be calibrated, and the calibration may evolve with time, but the types are relatively stable because they are defined by the standards. The autonomy of this powerful system is crucial to its success, but some astronomers do not understand the importance of this distinction. Recent suggestions to change the spectral type of the Sun show an ignorance of the way the system works.Precautions in the use of standard stars and the frequency of their use depend on the particular system and on its mandate.


Informatics ◽  
2018 ◽  
Vol 5 (4) ◽  
pp. 46
Author(s):  
Adam Rapley ◽  
Xavier Bellekens ◽  
Lynsay Shepherd ◽  
Colin McLean

Writing desktop applications in JavaScript offers developers the opportunity to create cross-platform applications with cutting-edge capabilities. However, in doing so, they are potentially submitting their code to a number of unsanctioned modifications from malicious actors. Electron is one such JavaScript application framework which facilitates this multi-platform out-the-box paradigm and is based upon the Node.js JavaScript runtime—an increasingly popular server-side technology. By bringing this technology to the client-side environment, previously unrealized risks are exposed to users due to the powerful system programming interface that Node.js exposes. In a concerted effort to highlight previously unexposed risks in these rapidly expanding frameworks, this paper presents the Mayall Framework, an extensible toolkit aimed at JavaScript security auditing and post-exploitation analysis. This paper also exposes fifteen highly popular Electron applications and demonstrates that two-thirds of applications were found to be using known vulnerable elements with high CVSS (Common Vulnerability Scoring System) scores. Moreover, this paper discloses a wide-reaching and overlooked vulnerability within the Electron Framework which is a direct byproduct of shipping the runtime unaltered with each application, allowing malicious actors to modify source code and inject covert malware inside verified and signed applications without restriction. Finally, a number of injection vectors are explored and appropriate remediations are proposed.


2006 ◽  
Vol 74 (11) ◽  
pp. 6501-6504 ◽  
Author(s):  
Yasemin H. K. Congleton ◽  
Christine R. Wulff ◽  
Edward J. Kerschen ◽  
Susan C. Straley

ABSTRACT We report that females of some substrains of inbred mouse strain 129 are resistant to systemic plague due to conditionally virulent Δpgm strains of Yersinia pestis; however, fully virulent Y. pestis is not attenuated in these mice. Therefore, these mice offer a powerful system in which to map in parallel host resistance traits and opposing bacterial virulence properties for plague.


Sign in / Sign up

Export Citation Format

Share Document