WorldWideScience

Sample records for attack synthetic polymers

  1. Synthetic approaches to uniform polymers.

    Science.gov (United States)

    Ali, Monzur; Brocchini, Steve

    2006-12-30

    Uniform polymers are characterised by a narrow molecular weight distribution (MWD). Uniformity is also defined by chemical structure in respect of (1) monomer orientation, sequence and stereo-regularity, (2) polymer shape and morphology and (3) chemical functionality. The function of natural polymers such as polypeptides and polynucleotides is related to their conformational structure (e.g. folded tertiary structure). This is only possible because of their high degree of uniformity. While completely uniform synthetic polymers are rare, polymers with broad structure and MWD are widely used in medicine and the biomedical sciences. They are integral components in final dosage forms, drug delivery systems (DDS) and in implantable devices. Increasingly uniform polymers are being used to develop more complex medicines (e.g. delivery of biopharmaceuticals, enhanced formulations or DDS's for existing actives). In addition to the function imparted by any new polymer it will be required to meet stringent specifications in terms of cost containment, scalability, biocompatibility and performance. Synthetic polymers with therapeutic activity are also being developed to exploit their polyvalent properties, which is not possible with low molecular weight molecules. There is need to utilise uniform polymers for applications where the polymer may interact with the systemic circulation, tissues or cellular environment. There are also potential applications (e.g. stimuli responsive coatings) where uniform polymers may be used for their more defined property profile. While it is not yet practical to prepare synthetic polymers to the same high degree of uniformity as proteins, nature also effectively utilises many polymers with lower degrees of uniformity (e.g. polysaccharides, poly(amino acids), polyhydroxyalkanoates). In recent years it has become possible to prepare with practical experimental protocols sufficient quantities of polymers that display many aspects of uniformity. This

  2. Potential of Thermophilic microorganisms for the degradation of synthetic polymers

    Energy Technology Data Exchange (ETDEWEB)

    Dominguez, A.; Deive, F. J.; Sanroman, M. A.; Longo, M. A.

    2009-07-01

    Nowadays, synthetic polymers are used in all areas of human activity, mainly due to their high stability against environmental conditions and microbial attack. However, these properties are also a problem from an environmental point of view, and thus it is necessary to find biodegradable synthetic polymers that can be easily removed in nature after disposal, and decomposed into biomass, CO{sub 2} and water. (Author)

  3. Polymer dynamics from synthetic polymers to proteins

    Indian Academy of Sciences (India)

    Keywords. Polymer dynamics; reptation; domain dynamics biomolecules. Abstract. Starting from the standard model of polymer motion - the Rouse model - we briefly present some key experimental results on the mesoscopic dynamics of polymer systems. We touch the role of topological confinement as expressed in the ...

  4. Polymer dynamics from synthetic polymers to proteins

    Indian Academy of Sciences (India)

    Abstract. Starting from the standard model of polymer motion – the Rouse model – .... reptation and the escape processes (creep motion) from the tube. .... scattering curves from an arrangement of small mesoscopic spheres also allows a.

  5. Synthetic biodegradable functional polymers for tissue engineering: a brief review

    OpenAIRE

    BaoLin, GUO; MA, Peter X.

    2014-01-01

    Scaffolds play a crucial role in tissue engineering. Biodegradable polymers with great processing flexibility are the predominant scaffolding materials. Synthetic biodegradable polymers with well-defined structure and without immunological concerns associated with naturally derived polymers are widely used in tissue engineering. The synthetic biodegradable polymers that are widely used in tissue engineering, including polyesters, polyanhydrides, polyphosphazenes, polyurethane, and poly (glyce...

  6. Comparing the effect of bioflocculant with synthetic polymers on ...

    African Journals Online (AJOL)

    This study was aimed at introducing a novel bioflocculant to enhance anaerobic granulation in a UASB reactor for lowstrength synthetic wastewater and comparing the effect with synthetic polymers. A laboratory-scale study was undertaken to achieve this goal. Four identical UASB reactors were operated in parallel in the ...

  7. Energy and charge control in mass spectrometry of synthetic polymers

    NARCIS (Netherlands)

    Nasioudis, A.

    2011-01-01

    Synthetic polymers are the products of humans’ attempts to imitate nature’s gigantic molecular chain architectures. The extended variety of building blocks and reaction mechanisms resulted in a plethora of different polymeric architectures. The biggest challenge for polymer chemists is to develop an

  8. High-density polymer microarrays: identifying synthetic polymers that control human embryonic stem cell growth.

    Science.gov (United States)

    Hansen, Anne; Mjoseng, Heidi K; Zhang, Rong; Kalloudis, Michail; Koutsos, Vasileios; de Sousa, Paul A; Bradley, Mark

    2014-06-01

    The fabrication of high-density polymer microarray is described, allowing the simultaneous and efficient evaluation of more than 7000 different polymers in a single-cellular-based screen. These high-density polymer arrays are applied in the search for synthetic substrates for hESCs culture. Up-scaling of the identified hit polymers enables long-term cellular cultivation and promoted successful stem-cell maintenance. © 2013 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  9. Molecular weight characterisation of synthetic polymers

    CERN Document Server

    Holding, Steve R

    1995-01-01

    The report comprises a state-of-the-art overview of the subject of molecular weight characterisation, supported by an extensive, indexed bibliography. The bibliography contains over 400 references and abstracts, compiled from the Polymer Library.

  10. Biocompatible Synthetic and Semi-synthetic Polymers - A Patent Analysis.

    Science.gov (United States)

    Ranganathan, Balu; Miller, Charles; Sinskey, Anthony

    2018-01-01

    Bioengineering has come of ages by setting up spare parts manufacturing units to be used in human body such as invasive implants and interventional controlled drug delivery in vivo systems. As a matter of fact patients on basis of their fiscal strength have the option to undergo prophylactic tactical manoeuvre for longer life spans. In this sphere of invasive implants, biocompatible polymer implants are a state of the art cutting edge technology with outstanding innovations leading to number of very successful start-up companies with a plethora of patent portfolios. From 2000 onwards, patent filings and grants for biocompatible polymers are expanding. Currently definition of biocompatibility is quite ambiguous with respect to the use of FDA approved polymeric materials. This article analysed patent portfolios for the trend patterns of prolific biocompatible polymers for capitalization and commercialization in the forthcoming years. Pair Bulk Data (PBD) portal was used to mine patent portfolios. In this patent preliminary analysis report, patents from 2000 to 2015 were evaluated using 317(c) filings, grants and classifications data for poly(vinyl alcohol) (PVA), poly(glycolic acid) (PGA), poly(hydroxyalkanoates) (PHAs) and poly(lactic acid) (PLA). This patent portfolio preliminary analysis embarks into patent analysis for New Product Development (NPD) for corporate R&D investment managerial decisions and on government advocacy for federal funding which is decisive for developmental advances. An in-depth patent portfolio investigation with return of investment (RoI) is in the pipeline. Copyright© Bentham Science Publishers; For any queries, please email at epub@benthamscience.org.

  11. [New polymer-drug systems based on natural and synthetic polymers].

    Science.gov (United States)

    Racoviţă, Stefania; Vasiliu, Silvia; Foia, Liliana

    2010-01-01

    The great versatility of polymers makes them very useful in the biomedical and pharmaceutical fields. The combination of natural and synthetic polymers leads to new materials with tailored functional properties. The aim of this work consists in the preparation of new drug delivery system based on chitosan (natural polymer) and polybetaines (synthetic polymers), by a simple process, well known in the literature as complex coacervation methods. Also, the adsorption and release studies of two antibiotics as well as the preservation of their bactericidal capacities were performed.

  12. Controlled polymer synthesis--from biomimicry towards synthetic biology.

    Science.gov (United States)

    Pasparakis, George; Krasnogor, Natalio; Cronin, Leroy; Davis, Benjamin G; Alexander, Cameron

    2010-01-01

    The controlled assembly of synthetic polymer structures is now possible with an unprecedented range of functional groups and molecular architectures. In this critical review we consider how the ability to create artificial materials over lengthscales ranging from a few nm to several microns is generating systems that not only begin to mimic those in nature but also may lead to exciting applications in synthetic biology (139 references).

  13. Hybrid protein-synthetic polymer nanoparticles for drug delivery.

    Science.gov (United States)

    Koseva, Neli S; Rydz, Joanna; Stoyanova, Ekaterina V; Mitova, Violeta A

    2015-01-01

    Among the most common nanoparticulate systems, the polymeric nanocarriers have a number of key benefits, which give a great choice of delivery platforms. Nevertheless, polymeric nanoparticles possess some limitations that include use of toxic solvents in the production process, polymer degradation, drug leakage outside the diseased tissue, and polymer cytotoxicity. The combination of polymers of biological and synthetic origin is an appealing modern strategy for the production of novel nanocarriers with unprecedented properties. Proteins' interface can play an important role in determining bioactivity and toxicity and gives perspective for future development of the polymer-based nanoparticles. The design of hybrid constructs composed of synthetic polymer and biological molecules such as proteins can be considered as a straightforward tool to integrate a broad spectrum of properties and biofunctions into a single device. This review discusses hybrid protein-synthetic polymer nanoparticles with different structures and levels in complexity and functionality, in view of their applications as drug delivery systems. © 2015 Elsevier Inc. All rights reserved.

  14. Natural and Synthetic Polymers as Inhibitors of Drug Efflux Pumps

    Science.gov (United States)

    2007-01-01

    Inhibition of efflux pumps is an emerging approach in cancer therapy and drug delivery. Since it has been discovered that polymeric pharmaceutical excipients such as Tweens® or Pluronics® can inhibit efflux pumps, various other polymers have been investigated regarding their potential efflux pump inhibitory activity. Among them are polysaccharides, polyethylene glycols and derivatives, amphiphilic block copolymers, dendrimers and thiolated polymers. In the current review article, natural and synthetic polymers that are capable of inhibiting efflux pumps as well as their application in cancer therapy and drug delivery are discussed. PMID:17896100

  15. Peptide/protein-polymer conjugates: synthetic strategies and design concepts.

    Science.gov (United States)

    Gauthier, Marc A; Klok, Harm-Anton

    2008-06-21

    This feature article provides a compilation of tools available for preparing well-defined peptide/protein-polymer conjugates, which are defined as hybrid constructs combining (i) a defined number of peptide/protein segments with uniform chain lengths and defined monomer sequences (primary structure) with (ii) a defined number of synthetic polymer chains. The first section describes methods for post-translational, or direct, introduction of chemoselective handles onto natural or synthetic peptides/proteins. Addressed topics include the residue- and/or site-specific modification of peptides/proteins at Arg, Asp, Cys, Gln, Glu, Gly, His, Lys, Met, Phe, Ser, Thr, Trp, Tyr and Val residues and methods for producing peptides/proteins containing non-canonical amino acids by peptide synthesis and protein engineering. In the second section, methods for introducing chemoselective groups onto the side-chain or chain-end of synthetic polymers produced by radical, anionic, cationic, metathesis and ring-opening polymerization are described. The final section discusses convergent and divergent strategies for covalently assembling polymers and peptides/proteins. An overview of the use of chemoselective reactions such as Heck, Sonogashira and Suzuki coupling, Diels-Alder cycloaddition, Click chemistry, Staudinger ligation, Michael's addition, reductive alkylation and oxime/hydrazone chemistry for the convergent synthesis of peptide/protein-polymer conjugates is given. Divergent approaches for preparing peptide/protein-polymer conjugates which are discussed include peptide synthesis from synthetic polymer supports, polymerization from peptide/protein macroinitiators or chain transfer agents and the polymerization of peptide side-chain monomers.

  16. Co-pyrolysis of wood biomass and synthetic polymers mixtures

    Energy Technology Data Exchange (ETDEWEB)

    Sharypov, V.I.; Beregovtsova, N.G.; Kuznetsov, B.N.; Baryshnikov, S.V. [Institute of Chemistry and Chemical Technology SB RAS, K. Marx Str., Krasnoyarsk 660049 (Russian Federation); Cebolla, V.L. [Instituto de Carboquimica, CSIC, Zaragoza (Spain); Weber, J.V.; Collura, S.; Finqueneisel, G.; Zimny, T. [Laboratoire de Chimie et Applications, Universite de Metz, IUT, rue V. Demange, 57500 Saint Avold (France)

    2006-06-01

    The pyrolysis in a hydrogen atmosphere of pine wood and synthetic polymers (polyethylene and polypropylene) mixtures was studied in a rotating autoclave. The effects of reaction temperature, wood/polymers mixture composition and catalysts, on the mixtures conversion into liquids and gases were established and discussed. The used catalysts were pyrrhotite and haematite materials activated by mechanochemical treatment. In the co-liquefaction processes the interaction between fragments of wood and polymers thermal decomposition took place. This results in non-additive increase of the wood/polymers conversion degree by 10-15wt.% and of the yield of distillate fractions by 14-19wt.%. Iron ore materials were found catalytically active in the process of hydropyrolysis of wood/polymers mixtures. By using these catalysts a significant increase of the distillable liquids amounts (by 14-21wt.%) and a sharp decrease of olefins and cycloparaffins content (by approximately two to three times) were observed. (author)

  17. Biodegradation of Synthetic Polymers by Composting and Fungal Treatment

    Czech Academy of Sciences Publication Activity Database

    Šašek, Václav; Vitásek, J.; Chromcová, D.; Prokopová, I.; Brožek, J.; Náhlík, J.

    2006-01-01

    Roč. 51, č. 5 (2006), s. 425-430 ISSN 0015-5632 R&D Projects: GA ČR GA203/03/0508 Institutional research plan: CEZ:AV0Z50200510 Keywords : biodegradation * composting * synthetic polymers Subject RIV: EE - Microbiology, Virology Impact factor: 0.963, year: 2006

  18. 21 CFR 874.3620 - Ear, nose, and throat synthetic polymer material.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 8 2010-04-01 2010-04-01 false Ear, nose, and throat synthetic polymer material. 874.3620 Section 874.3620 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN..., and throat synthetic polymer material. (a) Identification. Ear, nose, and throat synthetic polymer...

  19. Immunomodulating activities of soluble synthetic polymer-bound drugs.

    Science.gov (United States)

    Ríhová, Blanka

    2002-09-13

    The introduction of a synthetic material into the body always affects different body systems, including the defense system. Synthetic polymers are usually thymus-independent antigens with only a limited ability to elicit antibody formation or to induce a cellular immune response against them. However, there are many other ways that they influence or can be used to influence the immune system of the host. Low-immunogenic water-soluble synthetic polymers sometimes exhibit significant immunomodulating activity, mainly concerning the activation/suppression of NK cells, LAK cells and macrophages. Some of them, such as poly(ethylene glycol) and poly[N-(2-hydroxypropyl)methacrylamide], can be used as effective protein carriers, as they are able to reduce the immunogenicity of conjugated proteins and/or to reduce non-specific uptake of liposome/nanoparticle-entrapped drugs and other therapeutic agents. Recently, the development of vaccine delivery systems prepared from biodegradable and biocompatible water-soluble synthetic polymers, microspheres, liposomes and/or nanoparticles has received considerable attention, as they can be tailored to meet the specific physical, chemical, and immunogenic requirements of a particular antigen and some of them can also act as adjuvants. Copyright 2002 Elsevier Science B.V.

  20. Natural and synthetic polymers in fabric and home care applications

    Science.gov (United States)

    Paderes, Monissa; Ahirwal, Deepak; Fernández Prieto, Susana

    2017-07-01

    Polymers can be tailored to provide different benefits in Fabric & Home Care formulations depending on the monomers and modifications used, such as avoiding dye transfer inhibition in the wash, modifying the surface of tiles or increasing the viscosity and providing suspension properties to consumer products. Specifically, the rheology modification properties of synthetic and natural polymers are discussed in this chapter. The choice of a polymeric rheology modifier will depend on the formulation ingredients (charges, functional groups), the type and the amount of surfactants, the pH and the desired rheology modification. Natural polymeric rheology modifiers have been traditionally used in the food industry, being xanthan gum one of the most well-known ones. On the contrary, synthetic rheology modifiers are preferably used in paints & coats, textile printing and cleaning products.

  1. Natural and synthetic polymers for wounds and burns dressing.

    Science.gov (United States)

    Mogoşanu, George Dan; Grumezescu, Alexandru Mihai

    2014-03-25

    In the last years, health care professionals faced with an increasing number of patients suffering from wounds and burns difficult to treat and heal. During the wound healing process, the dressing protects the injury and contributes to the recovery of dermal and epidermal tissues. Because their biocompatibility, biodegradability and similarity to macromolecules recognized by the human body, some natural polymers such as polysaccharides (alginates, chitin, chitosan, heparin, chondroitin), proteoglycans and proteins (collagen, gelatin, fibrin, keratin, silk fibroin, eggshell membrane) are extensively used in wounds and burns management. Obtained by electrospinning technique, some synthetic polymers like biomimetic extracellular matrix micro/nanoscale fibers based on polyglycolic acid, polylactic acid, polyacrylic acid, poly-ɛ-caprolactone, polyvinylpyrrolidone, polyvinyl alcohol, polyethylene glycol, exhibit in vivo and in vitro wound healing properties and enhance re-epithelialization. They provide an optimal microenvironment for cell proliferation, migration and differentiation, due to their biocompatibility, biodegradability, peculiar structure and good mechanical properties. Thus, synthetic polymers are used also in regenerative medicine for cartilage, bone, vascular, nerve and ligament repair and restoration. Biocompatible with fibroblasts and keratinocytes, tissue engineered skin is indicated for regeneration and remodeling of human epidermis and wound healing improving the treatment of severe skin defects or partial-thickness burn injuries. Copyright © 2013 Elsevier B.V. All rights reserved.

  2. Inelastic neutron scattering from synthetic and biological polymers

    International Nuclear Information System (INIS)

    White, J.W.

    1976-01-01

    Neutron elastic and inelastic scattering measurements have provided many unique insights into structure, and by reviewing progress on synthetics, important differences likely to arise in biological systems are identified and a direction for studies of the latter is suggested. By neutron inelastic scattering it is possible to measure the frequency of thermally excited interatomic and intermolecular vibrations in crystals. With perfect organic and inorganic crystals the technique is now classical and has given great insight into the crystal forces responsible for the observed structures as well as the phase transitions they undergo. The study of polymer crystals immediately presents two problems of disorder: (1) Macroscopic disorder arises because the sample is a mixture of amorphous and crystalline fractions, and it may be acute enough to inhibit growth of a single crystal large enough for neutron studies. (2) Microscopic disorder in the packing of polymer chains in the ''crystalline'' regions is indicated by broadening of Bragg peaks. Both types of disorder problem arise in biological systems. The methods by which they were partially overcome to allow neutron measurements with synthetic polymers are described but first a classical example of the determination of interatomic forces by inelastic neutron scattering is given

  3. Application of natural and synthetic polymers in a production of paper

    Directory of Open Access Journals (Sweden)

    Jovanović Slobodan

    2007-01-01

    Full Text Available This work gives the review of most frequently used natural and synthetic polymers in production of paper, board and cardboard. Physical and chemical interaction of natural and synthetic polymers with cellulose fibers, and thus the way these polymers influence the improvement of both production process and the paper characteristics, have been presented.

  4. DESIGN AND EVALUATION OF LOSARTAN POTASSIUM MATRIX TABLETS WITH NATURAL AND SYNTHETIC POLYMERS

    OpenAIRE

    R. L. C. Sasidhar et al.

    2012-01-01

    The objective of the study was to formulate controlled release matrix tablets of losartan Potassium by using a combination of hydrophilic synthetic polymer like poly (ethylene oxides) and natural gums like xanthan gum, karaya gum and guar gum. A combination of synthetic hydrophobic polymers like methacrylates with synthetic hydrophilic polymer like poly (ethylene oxide) was also used in the preparation of matrix tablets and evaluated for their influence on controlled drug release. The matrix ...

  5. The Mediterranean Plastic Soup: synthetic polymers in Mediterranean surface waters

    Science.gov (United States)

    Suaria, Giuseppe; Avio, Carlo G.; Mineo, Annabella; Lattin, Gwendolyn L.; Magaldi, Marcello G.; Belmonte, Genuario; Moore, Charles J.; Regoli, Francesco; Aliani, Stefano

    2016-11-01

    The Mediterranean Sea has been recently proposed as one of the most impacted regions of the world with regards to microplastics, however the polymeric composition of these floating particles is still largely unknown. Here we present the results of a large-scale survey of neustonic micro- and meso-plastics floating in Mediterranean waters, providing the first extensive characterization of their chemical identity as well as detailed information on their abundance and geographical distribution. All particles >700 μm collected in our samples were identified through FT-IR analysis (n = 4050 particles), shedding for the first time light on the polymeric diversity of this emerging pollutant. Sixteen different classes of synthetic materials were identified. Low-density polymers such as polyethylene and polypropylene were the most abundant compounds, followed by polyamides, plastic-based paints, polyvinyl chloride, polystyrene and polyvinyl alcohol. Less frequent polymers included polyethylene terephthalate, polyisoprene, poly(vinyl stearate), ethylene-vinyl acetate, polyepoxide, paraffin wax and polycaprolactone, a biodegradable polyester reported for the first time floating in off-shore waters. Geographical differences in sample composition were also observed, demonstrating sub-basin scale heterogeneity in plastics distribution and likely reflecting a complex interplay between pollution sources, sinks and residence times of different polymers at sea.

  6. Ferritin nanocontainers that self-direct in synthetic polymer systems

    Science.gov (United States)

    Sengonul, Merih C.

    Currently, there are many approaches to introduce functionality into synthetic polymers. Among these, for example, are copolymerization, grafting, and blending methods. However, modifications made by such methods also change the thermodynamics and rheological properties of the polymer system of interest, and each new modification often requires a costly reoptimization of polymer processing. Such a reoptimalization would not be necessary if new functionality could be introduced via a container whose external surface is chemically and physically tuned to interact with the parent polymer. The contents of the container could then be changed without changing other important properties of the parent polymer. In this context this thesis project explores an innovative nanocontainer platform which can be introduced into phase-separating homopolymer blends. Ferritin is a naturally existing nanocontainer that can be used synthetically to package and selectively transport functional moieties to a particular phase that is either in the bulk or on the surface of a homopolymer blend system. The principal focus of this work centers on modifying the surface of wild ferritin to: (1) render modified ferritin soluble in a non-aqueous solvent; and (2) impart it with self-directing properties when exposed to a homopolymer blend surface or incorporated into the bulk of a homopolymer blend. Wild ferritin is water soluble, and this research project successfully modified wild ferritin by grafting either amine-functional poly(ethylene glycol) (PEG) or short-chain alkanes to carbodiimide activated carboxylate groups on ferritin's surface. Such modified ferritin is soluble in dichloromethane (DCM). Modification was confirmed by ion-exchange chromatography, zeta-potential measurements, and electrospray mass spectroscopy. FT-IR was used to quantify the extent of PEGylation of the reaction products through area ratios of the -C-O-C asymmetric stretching vibration of the grafted PEG chains to the

  7. Identification of Synthetic Polymers and Copolymers by Analytical Pyrolysis-Gas Chromatography/Mass Spectrometry

    Science.gov (United States)

    Kusch, Peter

    2014-01-01

    An experiment for the identification of synthetic polymers and copolymers by analytical pyrolysis-gas chromatography/mass spectrometry (Py-GC/MS) was developed and performed in the polymer analysis courses for third-year undergraduate students of chemistry with material sciences, and for first-year postgraduate students of polymer sciences. In…

  8. A study of porosity of synthetic polymer nanoparticles using PALS

    Energy Technology Data Exchange (ETDEWEB)

    Pham, B; Smith, S V [Centre for Antimatter-Matter Studies, Australian Nuclear Science and Technology Organisation (ANSTO) NSW 2232 (Australia); Guagliardo, P; Williams, J; Samarin, S, E-mail: binh.pham@ansto.gov.au, E-mail: svs@ansto.gov.au [Centre for Antimatter-Matter Studies, School of Physics, University of Western Australia, WA 6009 (Australia)

    2011-01-01

    Positron annihilation lifetime spectroscopy (PALS) has been used to study the free volume in dry synthetic polymer nanoparticles of various sizes. A series of poly(styrene/divinyl benzene) particles with diameters in the range of 100 to 500 nm were synthesized and then carefully chemically treated using the sulfonation process, to increase their porosity. The particles were characterised by Scanning Electron Microscopy (SEM), light scattering and PALS. Light scattering gave larger size for the treated particles, reflecting the hydration effect and therefore the increase in porosity. PALS spectra of untreated and treated particles gave four and three life-time components, respectively. Analysis by PAScual version 1.3.0 program indicated there was a reduction in the intensity and the type of the micropores in the treated particles. The data suggest PALS is a sensitive tool for detecting changes in microporosity in particles. The conflicting results obtained for light scattering compared to PALS for chemically treated particles is difficult to resolve and suggests sample preparation of polymeric materials for PALS is the critical factor.

  9. Synthetic polymers and methods of making and using the same

    Science.gov (United States)

    Daily, Michael D.; Grate, Jay W.; Mo, Kai-For

    2016-06-14

    Monomer embodiments that can be used to make polymers, such as homopolymers, heteropolymers, and that can be used in particular embodiments to make sequence-defined polymers are described. Also described are methods of making polymers using such monomer embodiments. Methods of using the polymers also are described.

  10. Radiation luminescence of polymers - emission behaviour of aromatic compounds incorporated in synthetic rubbers

    International Nuclear Information System (INIS)

    Kawanishi, Shunichi; Hagiwara, Miyuki

    1986-01-01

    For a deep understanding of a radiation protection mechanism of some aromatic compounds on synthetic polymers, their optical emission behavior under electron irradiation was studied. The fluorescence light was led out of an irradiation room through a wave guide and detected by a photomultiplier so that less noisy spectrum was obtained. Acenaphthene or acenaphthylene was added to the synthetic rubbers such as ethylene propylene diene terpolymer, styrene butadiene rubber and cis-1,4-polybutadiene. The intensities of optical emission induced by electron beams changed from polymer to polymer, while those by ultraviolet lights were independent of the kind of polymers. The dependence of emission intensity on polymers under electron irradiation was estimated to show the fact that the radiation excited energy transfers occur from the polymer matrix to the additives and that an efficiency of the energy transfer is dependent on kinds of polymers. (author)

  11. Antifouling Activity of Synthetic Alkylpyridinium Polymers Using the Barnacle Model

    Science.gov (United States)

    Piazza, Veronica; Dragić, Ivanka; Sepčić, Kristina; Faimali, Marco; Garaventa, Francesca; Turk, Tom; Berne, Sabina

    2014-01-01

    Polymeric alkylpyridinium salts (poly-APS) isolated from the Mediterranean marine sponge, Haliclona (Rhizoniera) sarai, effectively inhibit barnacle larva settlement and natural marine biofilm formation through a non-toxic and reversible mechanism. Potential use of poly-APS-like compounds as antifouling agents led to the chemical synthesis of monomeric and oligomeric 3-alkylpyridinium analogues. However, these are less efficient in settlement assays and have greater toxicity than the natural polymers. Recently, a new chemical synthesis method enabled the production of poly-APS analogues with antibacterial, antifungal and anti-acetylcholinesterase activities. The present study examines the antifouling properties and toxicity of six of these synthetic poly-APS using the barnacle (Amphibalanus amphitrite) as a model (cyprids and II stage nauplii larvae) in settlement, acute and sub-acute toxicity assays. Two compounds, APS8 and APS12-3, show antifouling effects very similar to natural poly-APS, with an anti-settlement effective concentration that inhibits 50% of the cyprid population settlement (EC50) after 24 h of 0.32 mg/L and 0.89 mg/L, respectively. The toxicity of APS8 is negligible, while APS12-3 is three-fold more toxic (24-h LC50: nauplii, 11.60 mg/L; cyprids, 61.13 mg/L) than natural poly-APS. This toxicity of APS12-3 towards nauplii is, however, 60-fold and 1200-fold lower than that of the common co-biocides, Zn- and Cu-pyrithione, respectively. Additionally, exposure to APS12-3 for 24 and 48 h inhibits the naupliar swimming ability with respective IC50 of 4.83 and 1.86 mg/L. PMID:24699112

  12. Antifouling Activity of Synthetic Alkylpyridinium Polymers Using the Barnacle Model

    Directory of Open Access Journals (Sweden)

    Veronica Piazza

    2014-04-01

    Full Text Available Polymeric alkylpyridinium salts (poly-APS isolated from the Mediterranean marine sponge, Haliclona (Rhizoniera sarai, effectively inhibit barnacle larva settlement and natural marine biofilm formation through a non-toxic and reversible mechanism. Potential use of poly-APS-like compounds as antifouling agents led to the chemical synthesis of monomeric and oligomeric 3-alkylpyridinium analogues. However, these are less efficient in settlement assays and have greater toxicity than the natural polymers. Recently, a new chemical synthesis method enabled the production of poly-APS analogues with antibacterial, antifungal and anti-acetylcholinesterase activities. The present study examines the antifouling properties and toxicity of six of these synthetic poly-APS using the barnacle (Amphibalanus amphitrite as a model (cyprids and II stage nauplii larvae in settlement, acute and sub-acute toxicity assays. Two compounds, APS8 and APS12-3, show antifouling effects very similar to natural poly-APS, with an anti-settlement effective concentration that inhibits 50% of the cyprid population settlement (EC50 after 24 h of 0.32 mg/L and 0.89 mg/L, respectively. The toxicity of APS8 is negligible, while APS12-3 is three-fold more toxic (24-h LC50: nauplii, 11.60 mg/L; cyprids, 61.13 mg/L than natural poly-APS. This toxicity of APS12-3 towards nauplii is, however, 60-fold and 1200-fold lower than that of the common co-biocides, Zn- and Cu-pyrithione, respectively. Additionally, exposure to APS12-3 for 24 and 48 h inhibits the naupliar swimming ability with respective IC50 of 4.83 and 1.86 mg/L.

  13. High resolution NMR spectroscopy of synthetic polymers in bulk

    International Nuclear Information System (INIS)

    Komorski, R.A.

    1986-01-01

    The contents of this book are: Overview of high-resolution NMR of solid polymers; High-resolution NMR of glassy amorphous polymers; Carbon-13 solid-state NMR of semicrystalline polymers; Conformational analysis of polymers of solid-state NMR; High-resolution NMR studies of oriented polymers; High-resolution solid-state NMR of protons in polymers; and Deuterium NMR of solid polymers. This work brings together the various approaches for high-resolution NMR studies of bulk polymers into one volume. Heavy emphasis is, of course, given to 13C NMR studies both above and below Tg. Standard high-power pulse and wide-line techniques are not covered

  14. Control of polymer-packing orientation in thin films through synthetic tailoring of backbone coplanarity

    KAUST Repository

    Chen, Mark S.

    2013-10-22

    Controlling solid-state order of π-conjugated polymers through macromolecular design is essential for achieving high electronic device performance; yet, it remains a challenge, especially with respect to polymer-packing orientation. Our work investigates the influence of backbone coplanarity on a polymer\\'s preference to pack face-on or edge-on relative to the substrate. Isoindigo-based polymers were synthesized with increasing planarity by systematically substituting thiophenes for phenyl rings in the acceptor comonomer. This increasing backbone coplanarity, supported by density functional theory (DFT) calculations of representative trimers, leads to the narrowing of polymer band gaps as characterized by ultraviolet-visible-near infrared (UV-vis-NIR) spectroscopy and cyclic voltammetry. Among the polymers studied, regiosymmetric II and TII polymers exhibited the highest hole mobilities in organic field-effect transistors (OFETs), while in organic photovoltaics (OPVs), TBII polymers that display intermediate levels of planarity provided the highest power conversion efficiencies. Upon thin-film analysis by atomic force microscropy (AFM) and grazing-incidence X-ray diffraction (GIXD), we discovered that polymer-packing orientation could be controlled by tuning polymer planarity and solubility. Highly soluble, planar polymers favor face-on orientation in thin films while the less soluble, nonplanar polymers favor an edge-on orientation. This study advances our fundamental understanding of how polymer structure influences nanostructural order and reveals a new synthetic strategy for the design of semiconducting materials with rationally engineered solid-state properties. © 2013 American Chemical Society.

  15. RFID Privacy Risk Evaluation Based on Synthetic Method of Extended Attack Tree and Information Feature Entropy

    OpenAIRE

    Li, Peng; Xu, Chao; Chen, Long; Wang, Ruchuan

    2015-01-01

    Evaluation of security risks in radio frequency identification (RFID) systems is a challenging problem in Internet of Things (IoT). This paper proposes an extended attack tree (EAT) model to identify RFID system’s flaws and vulnerabilities. A corresponding formal description of the model is described which adds a probability SAND node together with the probability attribute of the node attack. In addition, we model the process of an RFID data privacy attack based on EAT, taking a sensitive in...

  16. Biomedical inorganic polymers bioactivity and applications of natural and synthetic polymeric inorganic molecules

    CERN Document Server

    Müller, Werner E G; Schröder, Heinz C; Schroder, Heinz C

    2014-01-01

    In recent years, inorganic polymers have attracted much attention in nano-biomedicine, in particular in the area of regenerative medicine and drug delivery. This growing interest in inorganic polymers has been further accelerated by the development of new synthetic and analytical methods in the field of nanotechnology and nanochemistry. Examples for biomedical inorganic polymers that had been proven to exhibit biomedical effects and/or have been applied in preclinical or clinical trials are polysilicate / silica glass (such as naturally formed "biosilica" and synthetic "bioglass") and inorganic polyphosphate. Some members of the mentioned biomedical inorganic polymers have already been applied e.g. as "bioglass" for bone repair and bone tissue engineering, or they are used in food processing and in dental care (inorganic polyphosphates). However, there are a number of further biological and medicinal properties of these polymers, which have been elucidated in the last few years but not yet been applied for tr...

  17. Blends of synthetic and natural polymers as drug delivery systems for growth hormone.

    Science.gov (United States)

    Cascone, M G; Sim, B; Downes, S

    1995-05-01

    In order to overcome the biological deficiencies of synthetic polymers and to enhance the mechanical characteristics of natural polymers, two synthetic polymers, poly(vinyl alcohol) (PVA) and poly(acrylic acid) (PAA) were blended, in different ratios, with two biological polymers, collagen (C) and hyaluronic acid (HA). These blends were used to prepare films, sponges and hydrogels which were loaded with growth hormone (GH) to investigate their potential use as drug delivery systems. The GH release was monitored in vitro using a specific enzyme-linked immunosorbent assay. The results show that GH can be released from HA/PAA sponges and from HA/PVA and C/PVA hydrogels. The initial GH concentration used for sample loading affected the total quantity of GH released but not the pattern of release. The rate and quantity of GH released was significantly dependent on the HA or C content of the polymers.

  18. PEG-related polymer resins as synthetic supports

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    Combinatorial chemistry has become a significant part of the discovery and optimization process for novel drugs,affinity ligands,and catalysts.The polymeric supports play a key role in combinatory chemistry.Therefore,various kinds of functional polymer resins have been exploited as supports,reagents,and catalysts in organic synthesis.In comparison to the conventional Merrifield resins,the poly(ethylene glycol)(PEG)-related polymer resins have advantages including good compatibilities with polar solvents,good solvent absorbency and swelling properties.This review focuses primarily on the more recent work in the field of developing PEG-related polymer resins as supports for organic synthesis.

  19. Review of Synthetic Methods to Form Hollow Polymer Nanocapsules

    Energy Technology Data Exchange (ETDEWEB)

    Barker, Madeline T. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2014-03-13

    Syntactic foams have grown in interest due to the widened range of applications because of their mechanical strength and high damage tolerance. In the past, hollow glass or ceramic particles were used to create the pores. This paper reviews literature focused on the controlled synthesis of hollow polymer spheres with diameters ranging from 100 –200 nm. By using hollow polymer spheres, syntactic foams could reach ultra-low densities.

  20. Synthetic Polymer with a Structure-Driven Hepatic Deposition and Curative Pharmacological Activity in Hepatic Cells

    DEFF Research Database (Denmark)

    Riber, Camilla Frich; Halling Folkmar Andersen, Anna; Anegaard Rolskov, Lærke

    2017-01-01

    Synthetic polymers make strong contributions as tools for delivery of biological drugs and chemotherapeutics. The most praised characteristic of polymers in these applications is complete lack of pharmacological function such as to minimize the side effects within the human body. In contrast......, synthetic polymers with curative pharmacological activity are truly rare. Moreover, such activity is typically nonspecific rather than structure-defined. In this work, we present the discovery of poly(ethylacrylic acid) (PEAA) as a polymer with a suit of structure-defined, unexpected, pharmacological......, and pharmacokinetic properties not observed in close structural analogues. Specifically, PEAA reveals capacity to bind to albumin with ensuing natural hepatic deposition in vivo and exhibits concurrent inhibitory activity against the hepatitis C virus and inflammation in hepatic cells. Our findings provide a view...

  1. S-Layer Based Bio-Imprinting - Synthetic S-Layer Polymers

    Science.gov (United States)

    2015-07-09

    AFRL-OSR-VA-TR-2015-0161 S-Layer Based Bio- Imprinting - Synthetic S-Layer Polymers Dietmar Pum ZENTRUM FUER NANOBIOTECHNOLOGIE Final Report 07/09...COVERED (From - To)      01-06-2012 to 31-05-2015 4.  TITLE AND SUBTITLE S-Layer Based Bio- Imprinting - Synthetic S-Layer Polymers 5a.  CONTRACT...technology for the fabrication of nano patterned thin film imprints by using functional S-layer protein arrays as templates. The unique feature of

  2. Synthetic genetic polymers capable of heredity and evolution

    DEFF Research Database (Denmark)

    Pinheiro, Vitor B; Taylor, Alexander I; Cozens, Christopher

    2012-01-01

    in and recovered from six alternative genetic polymers based on simple nucleic acid architectures not found in nature [xeno-nucleic acids (XNAs)]. We also select XNA aptamers, which bind their targets with high affinity and specificity, demonstrating that beyond heredity, specific XNAs have the capacity......Genetic information storage and processing rely on just two polymers, DNA and RNA, yet whether their role reflects evolutionary history or fundamental functional constraints is currently unknown. With the use of polymerase evolution and design, we show that genetic information can be stored...... for Darwinian evolution and folding into defined structures. Thus, heredity and evolution, two hallmarks of life, are not limited to DNA and RNA but are likely to be emergent properties of polymers capable of information storage....

  3. Microparticles based on natural and synthetic polymers for ophthalmic applications.

    Science.gov (United States)

    Tataru, G; Popa, M; Costin, D; Desbrieres, J

    2012-05-01

    Sodium salt of carboxymethylcellulose/poly(vinyl alcohol) particles suitable for application in ocular drug administration were prepared by crosslinking with epichlorohydrin in an alkaline medium, in reverse emulsion. The influence of parameters related with the particles elaboration process (ratio between polymer mixture and crosslinking agent, concentration of polymer solution, duration of crosslinking reaction, stirring intensity, etc.) based on their composition, size, and swelling ability was studied. Obtained microparticles fulfill the requirements for biomaterials-they are formed from biocompatible polymers; the acute toxicity value (LD(50)) is high enough to consider these materials as weakly toxic (hence able to introduce within the organism); they are able to include and release drugs in a controlled way. The in vivo adrenalin ocular delivery from the microparticles was tested on voluntary human patient. The particles showed good adhesion properties without irritation to the patient and proved the capability to treat the ocular congestion. Copyright © 2012 Wiley Periodicals, Inc.

  4. Influence of Natural, Synthetic Polymers and Fillers on sustained release matrix tablets of Pregabalin

    OpenAIRE

    Vijaya Durga. K; Ashok Kumar. P; Suresh V Kulkarni

    2013-01-01

    The objective of the present study was to develop sustained release matrix tablets of Pregabalin for the treatment of neuropathic pain and epilepsy. The tablets were prepared by wet granulation and formulated using drug with Hydrophilic, hydrophobic, synthetic, natural polymers and 4 different fillers were used. The effect of Polymer concentration, combination and fillers on drug release rate was analyzed for the formulations F-1 to F-17. The tablets were subjected to physicochemical studies,...

  5. Analytical and statistical approaches in the characterization of synthetic polymers

    NARCIS (Netherlands)

    Dimzon, I.K.

    2015-01-01

    Polymers vary in terms of the monomer/s used; the number, distribution and type of linkage of monomers per molecule; and the side chains and end groups attached. Given this diversity, traditional single-technique approaches to characterization often give limited and inadequate information about a

  6. New coupling strategy for radionuclide labeling of synthetic polymers

    Czech Academy of Sciences Publication Activity Database

    Hrubý, Martin; Kučka, Jan; Nováková, Michaela; Macková, Hana; Vetrík, Miroslav

    2010-01-01

    Roč. 68, č. 2 (2010), s. 334-339 ISSN 0969-8043 R&D Projects: GA AV ČR KAN200200651; GA ČR GA202/09/2078; GA MŠk 1M0505 Institutional research plan: CEZ:AV0Z40500505 Keywords : polymer * radionuclide * labeling Subject RIV: CF - Physical ; Theoretical Chemistry Impact factor: 0.999, year: 2010

  7. Impinging jet study of the deposition of colloidal particles on synthetic polymer (Zeonor)

    DEFF Research Database (Denmark)

    Vlček, Jakub; Lapčík, Lubomír; Cech, Jiri

    2014-01-01

    In this study, an impinging jet deposition experiments were performed on synthetic polymer (Zeonor) original and by micro-embossing modified substrates with exactly defined topology as confirmed by AFM and SEM. Deposition experiments were performed at ambient temperature and at selected flow regi...

  8. Novel polymer materials for protecting crew and structural elements of orbital station against microorganisms attack throughout long-term operation

    Science.gov (United States)

    Savelyev, Yu.; Rudenko, A.; Robota, L.; Koval, E.; Savelyeva, O.; Markovskaya, L.; Veselov, V.

    2009-01-01

    Novel polyurethanes, polyamidourethanes and polyurethane foams of stable to biocorrosion were synthesized. The polymers possess fungicidal/fungistatic and bactericidal/bacteriostatic activity. After the biological tests with using of mold fungi and yeasts, polymers totally keep their main exploitation characteristics: for most of polymers coefficients of strength and elasticity keeping are equal of 100%. Most of them possess the fungicidal properties of zero balls, according to the State Standard. Life-firmness investigation of the most aggressive extremophiles: mold fungi Penicillium and Aspergillus on the polymer surfaces showed that for some samples it made up from 3 to 10 days. Some polymers possess both anti-micotic and anti-bacterial action. Based on investigation results a special technological scheme of assured human protection against microorganisms attack in specific condition of his existence are to be elaborated.

  9. Diversity screening for novel enzymes degrading synthetic polymers

    DEFF Research Database (Denmark)

    Lezyk, Mateusz Jakub

    plant cell wall polymers. Several enzymes catalysed transglycosylation either using lactose or pNP-Fuc as acceptor and Mfuc6 exhibited an unusually high transglycosylation/hydrolysis ratio. Using 25 mM pNP-Fuc as donor and under conditions tested, the maximum yields of 1.6 ± 0.1 mM 2’-fucosyllactose...... of glucose during cellulase-catalyzed hydrolysis of pretreated sugarcane bagasse. We have further utilized the constructed metagenomic library for functional identification of epoxide hydrolase activities using a new agar-plate assay. Using this method, clones with epoxide hydrolase activity were identified...

  10. Single-Chain Folding of Synthetic Polymers: A Critical Update.

    Science.gov (United States)

    Altintas, Ozcan; Barner-Kowollik, Christopher

    2015-11-23

    The current contribution serves as a critical update to a previous feature article from us (Macromol. Rapid Commun. 2012, 33, 958-971), and highlights the latest advances in the preparation of single chain polymeric nanoparticles and initial-yet promising-attempts towards mimicking the structure of natural biomacromolecules via single-chain folding of well-defined linear polymers via so-called single chain selective point folding and repeat unit folding. The contribution covers selected examples from the literature published up to ca. September 2015. Our aim is not to provide an exhaustive review but rather highlight a selection of new and exciting examples for single-chain folding based on advanced macromolecular precision chemistry. Initially, the discussion focuses on the synthesis and characterization of single-chain folded structures via selective point folding. The second part of the feature article addresses the folding of well-defined single-chain polymers by means of repeat unit folding. The current state of the art in the field of single-chain folding indicates that repeat unit folding-driven nanoparticle preparation is well-advanced, while initial encouraging steps towards building selective point folding systems have been taken. In addition, a summary of the-in our view-open key questions is provided that may guide future biomimetic design efforts. © 2015 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  11. In vivo tissue response and durability of five novel synthetic polymers in a rabbit model.

    Science.gov (United States)

    Sahin, E; Cingi, C; Eskiizmir, G; Altintoprak, N; Calli, A; Calli, C; Yilgör, I; Yilgör, E

    2016-04-01

    Alloplastic materials are frequently used in facial plastic surgeries such as rhinoplasty and nasal reconstruction. Unfortunately, the ideal alloplastic material has not been found. This experimental study evaluates the tissue response and durability of five novel polymers developed as an alloplastic material. In this experimental study involving a tertiary university hospital, six subcuticular pockets were formed at the back of 10 rabbits for the implantation of each polymer and sham group. Each pocket was excised with its adjacent tissue after three months, and collected for histopathological examination. Semi-quantitative examination including neovascularisation, inflammation, fibrosis, abscess formation, multinucleated foreign body giant cells was performed, and integrity of polymer was evaluated. A statistical comparison was performed. No statically significant difference was detected in neovascularisation, inflammation, fibrosis, abscess formation and multinucleated foreign body giant cells when a paired comparison between sham and polymer II, III and IV groups was performed individually. Nevertheless, the degree of fibrosis was less than sham group in polymer I (p = .027) and V (p = .018), although the other variables were almost similar. The integrity of polymers III (9 intact, 1 fragmented) and IV (8 intact, 2 absent) was better than the other polymers. These novel synthetic polymers could be considered as good candidates for clinical applicability. All polymers provided satisfactory results in terms of tissue response; however, fibrovascular integration was higher in polymers II, III and IV. In addition, the durability of polymer III and IV was better than the others. © Copyright by Società Italiana di Otorinolaringologia e Chirurgia Cervico-Facciale, Rome, Italy.

  12. Synthetic Strategies in the Preparation of Polymer/Inorganic Hybrid Nanoparticles

    Science.gov (United States)

    Hood, Matthew A.; Mari, Margherita; Muñoz-Espí, Rafael

    2014-01-01

    This article reviews the recent advances and challenges in the preparation of polymer/inorganic hybrid nanoparticles. We mainly focus on synthetic strategies, basing our classification on whether the inorganic and the polymer components have been formed in situ or ex situ, of the hybrid material. Accordingly, four types of strategies are identified and described, referring to recent examples: (i) ex situ formation of the components and subsequent attachment or integration, either by covalent or noncovalent bonding; (ii) in situ polymerization in the presence of ex situ formed inorganic nanoparticles; (iii) in situ precipitation of the inorganic components on or in polymer structures; and (iv) strategies in which both polymer and inorganic component are simultaneously formed in situ. PMID:28788665

  13. Synthetic Effect of Vivid Shark Skin and Polymer Additive on Drag Reduction Reinforcement

    Directory of Open Access Journals (Sweden)

    Huawei Chen

    2014-06-01

    Full Text Available Natural shark skin has a well-demonstrated drag reduction function, which is mainly owing to its microscopic structure and mucus on the body surface. In order to improve drag reduction, it is necessary to integrate microscopic drag reduction structure and drag reduction agent. In this study, two hybrid approaches to synthetically combine vivid shark skin and polymer additive, namely, long-chain grafting and controllable polymer diffusion, were proposed and attempted to mimic such hierarchical topography of shark skin without waste of polymer additive. Grafting mechanism and optimization of diffusion port were investigated to improve the efficiency of the polymer additive. Superior drag reduction effects were validated, and the combined effect was also clarified through comparison between drag reduction experiments.

  14. Interaction of Dendritic Polymers with Synthetic Lipid and Cell Membranes

    Science.gov (United States)

    Mecke, Almut; Hong, Seungpyo; Bielinska, Anna U.; Banaszak Holl, Mark M.; Orr, Bradford G.; Baker, James R., Jr.

    2004-03-01

    Polyamidoamine (PAMAM) dendrimers are promising candidates for the development of nanoscale therapeutic transport agents. Here we present studies on dendrimer-membrane interactions leading to a better understanding of possible uptake mechanisms into cells. Using synthetic lipid and natural cell membranes as model systems it is shown that the effect of PAMAM dendrimers on a membrane strongly depends on the dendrimer generation, architecture and chemical properties of the branch end groups. Atomic force microscopy data indicates that generation 7 dendrimers have the ability to form small ( 10-100 nm) holes in a lipid bilayer. When dendrimers with otherwise identical chemical properties are arranged in a covalently linked cluster, no hole formation occurs. Dendrimer-lipid micelle formation is proposed and investigated as a possible mechanism for this behavior. Smaller dendrimers (generation 5) have a greatly reduced ability to remove lipid molecules from a bilayer. In addition to the size of the dendrimer, the charge of the branch end groups plays a significant role for dendrimer-membrane interactions. These results agree well with biological studies using cultured cells and point to a new mechanism of specific targeting and uptake into cells.

  15. Molecular dynamics modeling the synthetic and biological polymers interactions pre-studied via docking

    Science.gov (United States)

    Tsvetkov, Vladimir B.; Serbin, Alexander V.

    2014-06-01

    In previous works we reported the design, synthesis and in vitro evaluations of synthetic anionic polymers modified by alicyclic pendant groups (hydrophobic anchors), as a novel class of inhibitors of the human immunodeficiency virus type 1 ( HIV-1) entry into human cells. Recently, these synthetic polymers interactions with key mediator of HIV-1 entry-fusion, the tri-helix core of the first heptad repeat regions [ HR1]3 of viral envelope protein gp41, were pre-studied via docking in terms of newly formulated algorithm for stepwise approximation from fragments of polymeric backbone and side-group models toward real polymeric chains. In the present article the docking results were verified under molecular dynamics ( MD) modeling. In contrast with limited capabilities of the docking, the MD allowed of using much more large models of the polymeric ligands, considering flexibility of both ligand and target simultaneously. Among the synthesized polymers the dinorbornen anchors containing alternating copolymers of maleic acid were selected as the most representative ligands (possessing the top anti-HIV activity in vitro in correlation with the highest binding energy in the docking). To verify the probability of binding of the polymers with the [HR1]3 in the sites defined via docking, various starting positions of polymer chains were tried. The MD simulations confirmed the main docking-predicted priority for binding sites, and possibilities for axial and belting modes of the ligands-target interactions. Some newly MD-discovered aspects of the ligand's backbone and anchor units dynamic cooperation in binding the viral target clarify mechanisms of the synthetic polymers anti-HIV activity and drug resistance prevention.

  16. Frontiers in biomaterials the design, synthetic strategies and biocompatibility of polymer scaffolds for biomedical application

    CERN Document Server

    Cao, Shunsheng

    2014-01-01

    Frontiers in Biomaterials: The Design, Synthetic Strategies and Biocompatibility of Polymer Scaffolds for Biomedical Application, Volume 1" highlights the importance of biomaterials and their interaction with biological system. The need for the development of biomaterials as scaffold for tissue regeneration is driven by the increasing demands for materials that mimic functions of extracellular matrices of body tissues.This ebook covers the latest challenges on the biocompatibility of scaffold overtime after implantation and discusses the requirement of innovative technologies and strategies f

  17. Synthetic microfluidic paper: high surface area and high porosity polymer micropillar arrays.

    Science.gov (United States)

    Hansson, Jonas; Yasuga, Hiroki; Haraldsson, Tommy; van der Wijngaart, Wouter

    2016-01-21

    We introduce Synthetic Microfluidic Paper, a novel porous material for microfluidic applications that consists of an OSTE polymer that is photostructured in a well-controlled geometry of slanted and interlocked micropillars. We demonstrate the distinct benefits of Synthetic Microfluidic Paper over other porous microfluidic materials, such as nitrocellulose, traditional paper and straight micropillar arrays: in contrast to straight micropillar arrays, the geometry of Synthetic Microfluidic Paper was miniaturized without suffering capillary collapse during manufacturing and fluidic operation, resulting in a six-fold increased internal surface area and a three-fold increased porous fraction. Compared to commercial nitrocellulose materials for capillary assays, Synthetic Microfluidic Paper shows a wider range of capillary pumping speed and four times lower device-to-device variation. Compared to the surfaces of the other porous microfluidic materials that are modified by adsorption, Synthetic Microfluidic Paper contains free thiol groups and has been shown to be suitable for covalent surface chemistry, demonstrated here for increasing the material hydrophilicity. These results illustrate the potential of Synthetic Microfluidic Paper as a porous microfluidic material with improved performance characteristics, especially for bioassay applications such as diagnostic tests.

  18. Combined X-ray and neutron fibre diffraction studies of biological and synthetic polymers

    International Nuclear Information System (INIS)

    Parrot, I.M.; Urban, V.; Gardner, K.H.; Forsyth, V.T.

    2005-01-01

    The fibrous state is a natural one for polymer molecules which tend to assume regular helical conformations rather than the globular structures characteristic of many proteins. Fibre diffraction therefore has broad application to the study of a wide range of biological and synthetic polymers. The purpose of this paper is to illustrate the general scope of the method and in particular to demonstrate the impact of a combined approach involving both X-ray and neutron diffraction methods. While the flux of modern X-ray synchrotron radiation sources allows high quality datasets to be recorded with good resolution within a very short space of time, neutron studies can provide unique information through the ability to locate hydrogen or deuterium atoms that are often difficult or impossible to locate using X-ray methods. Furthermore, neutron fibre diffraction methods can, through the ability to selectively label specific parts of a structure, be used to highlight novel aspects of polymer structure that can not be studied using X-rays. Two examples are given. The first describes X-ray and neutron diffraction studies of conformational transitions in DNA. The second describes structural studies of the synthetic high-performance polymer poly(p-phenylene terephthalamide) (PPTA), known commercially as Kevlar[reg] or Twaron[reg

  19. Combined X-ray and neutron fibre diffraction studies of biological and synthetic polymers.

    Energy Technology Data Exchange (ETDEWEB)

    Parrot, I. M. [Institut Laue-Langevin (ILL); Urban, Volker S [ORNL; Gardner, K. H. [DuPont Experimental Station; Forsyth, V. T. [Institut Laue Langevin and Keele University

    2005-04-01

    The fibrous state is a natural one for polymer molecules which tend to assume regular helical conformations rather than the globular structures characteristic of many proteins. Fibre diffraction therefore has broad application to the study of a wide range of biological and synthetic polymers. The purpose of this paper is to illustrate the general scope of the method and in particular to demonstrate the impact of a combined approach involving both X-ray and neutron diffraction methods. While the flux of modern X-ray synchrotron radiation sources allows high quality datasets to be recorded with good resolution within a very short space of time, neutron studies can provide unique information through the ability to locate hydrogen or deuterium atoms that are often difficult or impossible to locate using X-ray methods. Furthermore, neutron fibre diffraction methods can, through the ability to selectively label specific parts of a structure, be used to highlight novel aspects of polymer structure that can not be studied using X-rays. Two examples are given. The first describes X-ray and neutron diffraction studies of conformational transitions in DNA. The second describes structural studies of the synthetic high-performance polymer poly(p-phenylene terephthalamide) (PPTA), known commercially as Kevlar{reg_sign} or Twaron{reg_sign}.

  20. Combined X-ray and neutron fibre diffraction studies of biological and synthetic polymers

    Science.gov (United States)

    Parrot, I. M.; Urban, V.; Gardner, K. H.; Forsyth, V. T.

    2005-08-01

    The fibrous state is a natural one for polymer molecules which tend to assume regular helical conformations rather than the globular structures characteristic of many proteins. Fibre diffraction therefore has broad application to the study of a wide range of biological and synthetic polymers. The purpose of this paper is to illustrate the general scope of the method and in particular to demonstrate the impact of a combined approach involving both X-ray and neutron diffraction methods. While the flux of modern X-ray synchrotron radiation sources allows high quality datasets to be recorded with good resolution within a very short space of time, neutron studies can provide unique information through the ability to locate hydrogen or deuterium atoms that are often difficult or impossible to locate using X-ray methods. Furthermore, neutron fibre diffraction methods can, through the ability to selectively label specific parts of a structure, be used to highlight novel aspects of polymer structure that can not be studied using X-rays. Two examples are given. The first describes X-ray and neutron diffraction studies of conformational transitions in DNA. The second describes structural studies of the synthetic high-performance polymer poly(p-phenylene terephthalamide) (PPTA), known commercially as Kevlar® or Twaron®.

  1. Combined X-ray and neutron fibre diffraction studies of biological and synthetic polymers

    Energy Technology Data Exchange (ETDEWEB)

    Parrot, I.M. [Institut Laue Langevin, 6 Rue Jules Horowitz, 38042 Grenoble Cedex 9 (France); Institute of Science and Technology in Medicine, Keele University Medical School, Staffordshire ST4 7QB (United Kingdom); Urban, V. [Oak Ridge National Laboratory, P.O. Box 2008, Oak Ridge, TN 37831-6100 (United States); Gardner, K.H. [Department of Materials Science and Engineering University of Delaware, Newark, DE 19719 (United States); Forsyth, V.T. [Institut Laue Langevin, 6 Rue Jules Horowitz, 38042 Grenoble Cedex 9 (France) and Institute of Science and Technology in Medicine, Keele University Medical School, Staffordshire ST4 7QB (United Kingdom)]. E-mail: tforsyth@ill.fr

    2005-08-15

    The fibrous state is a natural one for polymer molecules which tend to assume regular helical conformations rather than the globular structures characteristic of many proteins. Fibre diffraction therefore has broad application to the study of a wide range of biological and synthetic polymers. The purpose of this paper is to illustrate the general scope of the method and in particular to demonstrate the impact of a combined approach involving both X-ray and neutron diffraction methods. While the flux of modern X-ray synchrotron radiation sources allows high quality datasets to be recorded with good resolution within a very short space of time, neutron studies can provide unique information through the ability to locate hydrogen or deuterium atoms that are often difficult or impossible to locate using X-ray methods. Furthermore, neutron fibre diffraction methods can, through the ability to selectively label specific parts of a structure, be used to highlight novel aspects of polymer structure that can not be studied using X-rays. Two examples are given. The first describes X-ray and neutron diffraction studies of conformational transitions in DNA. The second describes structural studies of the synthetic high-performance polymer poly(p-phenylene terephthalamide) (PPTA), known commercially as Kevlar[reg] or Twaron[reg].

  2. Glycoproteins functionalized natural and synthetic polymers for prospective biomedical applications: A review.

    Science.gov (United States)

    Tabasum, Shazia; Noreen, Aqdas; Kanwal, Arooj; Zuber, Mohammad; Anjum, Muhammad Naveed; Zia, Khalid Mahmood

    2017-05-01

    Glycoproteins have multidimensional properties such as biodegradability, biocompatibility, non-toxicity, antimicrobial and adsorption properties; therefore, they have wide range of applications. They are blended with different polymers such as chitosan, carboxymethyl cellulose (CMC), polyvinyl pyrrolidone (PVP), polycaprolactone (PCL), heparin, polystyrene fluorescent nanoparticles (PS-NPs) and carboxyl pullulan (PC) to improve their properties like thermal stability, mechanical properties, resistance to pH, chemical stability and toughness. Considering the versatile charateristics of glycoprotein based polymers, this review sheds light on synthesis and characterization of blends and composites of glycoproteins, with natural and synthetic polymers and their potential applications in biomedical field such as drug delivery system, insulin delivery, antimicrobial wound dressing uses, targeting of cancer cells, development of anticancer vaccines, development of new biopolymers, glycoproteome research, food product and detection of dengue glycoproteins. All the technical scientific issues have been addressed; highlighting the recent advancement. Copyright © 2017 Elsevier B.V. All rights reserved.

  3. FORMULATION DEVELOPMENT OF MUCOADHESIVE MICROCAPSULES OF METFORMIN HYDROCHLORIDE USING NATURAL AND SYNTHETIC POLYMERS AND IN VITRO CHARACTERIZATION

    OpenAIRE

    Yellanki Shiva Kumar; Deb Sambit kumar; Goranti Sharada; Nerella Naveen kumar

    2010-01-01

    The objective of this work was to develop optimized and systematically evaluate performances of mucoadhesive microcapsules of antihyperglycemic agent drug Metformin. Alginate microcapsules coated with mucoadhesive natural or synthetic polymers were prepared by Orifice-Ionic Gelation technique utilizing calcium chloride as a cross linking agent. The effect of type (natural or synthetic) and concentration of coating polymers and concentration of alginate on formulation was investigated. Prepare...

  4. Emerging synthetic strategies for core cross-linked star (CCS) polymers and applications as interfacial stabilizers: bridging linear polymers and nanoparticles.

    Science.gov (United States)

    Chen, Qijing; Cao, Xueteng; Xu, Yuanyuan; An, Zesheng

    2013-10-01

    Core cross-linked star (CCS) polymers become increasingly important in polymer science and are evaluated in many value-added applications. However, limitations exist to varied degrees for different synthetic methods. It is clear that improvement in synthetic efficiency is fundamental in driving this field moving even further. Here, the most recent advances are highlighted in synthetic strategies, including cross-linking with cross-linkers of low solubility, polymerization-induced self-assembly in aqueous-based heterogeneous media, and cross-linking via dynamic covalent bonds. The understanding of CCS polymers is also further refined to advocate their role as an intermediate between linear polymers and polymeric nanoparticles, and their use as interfacial stabilizers is rationalized within this context. © 2013 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  5. Radiation synthesis and characterization of network structure of natural/synthetic double-network superabsorbent polymers

    International Nuclear Information System (INIS)

    Sen, M.; Hayrabolulu, H.

    2011-01-01

    Complete text of publication follows. Superabsorbent polymers (SAPs) are moderately cross linked, 3-D, hydrophilic network polymers that can absorb and conserve considerable amounts of aqueous fluids even under certain heat or pressure. Because of the unique properties superior to conventional absorbents, SAPs have found potential application in many fields such as hygienic products, disposable diapers, horticulture, gel actuators, drug-delivery systems, as well as water-blocking tapes coal dewatering, water managing materials for the renewal of arid and desert environment, etc. In recent years, naturally available resources, such as polysaccharides have drawn considerable attention for the preparation of SAPs. Since the mechanical properties of polysaccharide based natural polymers are low, researchers have mostly focused on natural/synthetic polymer/monomer mixtures to obtain novel SAPs. The aim of this study is to synthesize and characterization of network structure of novel double-network (DN) hydrogels as a SAP. Hydrogels with high mechanical strength have been prepared by radiation induced polymerization and crosslink of acrylic acid sodium salt in the presence of natural polymer locust bean gum. Liquid retention capacities and absorbency under load (AUL) analysis of synthesized SAPs was performed at different temperatures in water and synthetic urine solution, in order to determine their SAP character. For the characterization of network structure of the semi-IPN hydrogels, the average molecular weight between cross links (M c ) were evaluated by using uniaxial compression and oscillatory dynamical mechanical analyses and the advantage and disadvantage of these two technique for the characterization of network structures were compared.

  6. Preparation of a zeolite-modified polymer monolith for identification of synthetic colorants in lipsticks

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Huiqi; Li, Zheng [College of Chemistry, Jilin University, Changchun 130012 (China); Niu, Qian [Jilin Entry-Exit Inspection and Quarantine Bureau, Changchun 130062 (China); Ma, Jiutong [College of Chemistry, Jilin University, Changchun 130012 (China); Jia, Qiong, E-mail: jiaqiong@jlu.edu.cn [College of Chemistry, Jilin University, Changchun 130012 (China)

    2015-10-30

    Graphical abstract: Poly(methacrylic acid-ethylene dimethacrylate) monolithic column embedded with zeolites was prepared and employed for the polymer monolith microextraction of colorants combined with HPLC. - Highlights: • Zeolite, as a kind of mesoporous material, was firstly combined with PMME. • Zeolite@poly(MAA-EDMA) monolith columns were prepared for the enrichment of colorants. • Zeolite@poly(MAA-EDMA) monolith columns demonstrated relatively high extraction capacity. - Abstract: A novel zeolite-modified poly(methacrylic acid-ethylenedimethacrylate) (zeolite@poly(MAA-EDMA)) monolithic column was prepared with the in situ polymerization method and employed in polymer monolith microextraction for the separation and preconcentration of synthetic colorants combined with high performance liquid chromatography. The polymer was characterized by scanning electronmicroscopy, Fourier-transform infrared spectroscopy, X-ray photoelectron spectroscopy, and thermo-gravimetric analysis. Various parameters affecting the extraction efficiency were investigated and optimized. Under the optimum experimental conditions, we obtained acceptable linearities, low limits of detection, and good intra-day/inter-day relative standard deviations. The method was applied to the determination of synthetic colorants in lipsticks with recoveries ranged from 70.7% to 109.7%. Compared with conventional methacrylic acid-based monoliths, the developed monolith exhibited high enrichment capacity because of the introduction of zeolites into the preparation process. The extraction efficiency followed the order: zeolite@poly(MAA-EDMA) > poly(MAA-EDMA) > direct HPLC analysis.

  7. Formation of low charge state ions of synthetic polymers using quaternary ammonium compounds.

    Science.gov (United States)

    Nasioudis, Andreas; Joyce, William F; van Velde, Jan W; Heeren, Ron M A; van den Brink, Oscar F

    2010-07-01

    Factors such as high polymer dispersity and variation in elemental composition (of copolymers) often complicate the electrospray ionization mass spectrometry (ESI-MS) analysis of synthetic polymers with high molar mass. In the experiments described in this study, quaternary ammonium compounds were observed to facilitate the production of low charge state pseudomolecular ions when added to the spray solution for ESI-MS. This approach was then used for the ESI time-of-flight mass spectrometry (TOF-MS) analysis of synthetic polymers. Hexadecyltrimethylammonium chloride permitted the successful analysis of poly(ethylene glycol) of 2-40 kDa, poly(propylene glycol) and poly(tetramethylene glycol) oligomers. Increasing the quaternary ammonium compounds' concentration results in the production of low charge state pseudomolecular ions. A comparison of structurally different quaternary ammonium compounds showed that the best performance is expected from large molecules with specific charge localization, which leaves the charge available for interactions. The applicability of the method for the MS analysis of other polymeric systems was also studied. In the case of poly(tetramethylene glycol), the method not only shifted the distributions to higher m/z values but also allowed the detection of high molecular weight material that was not observed without addition of the modifier to the spray solution.

  8. Comparison of spatial frequency domain features for the detection of side attack explosive ballistics in synthetic aperture acoustics

    Science.gov (United States)

    Dowdy, Josh; Anderson, Derek T.; Luke, Robert H.; Ball, John E.; Keller, James M.; Havens, Timothy C.

    2016-05-01

    Explosive hazards in current and former conflict zones are a threat to both military and civilian personnel. As a result, much effort has been dedicated to identifying automated algorithms and systems to detect these threats. However, robust detection is complicated due to factors like the varied composition and anatomy of such hazards. In order to solve this challenge, a number of platforms (vehicle-based, handheld, etc.) and sensors (infrared, ground penetrating radar, acoustics, etc.) are being explored. In this article, we investigate the detection of side attack explosive ballistics via a vehicle-mounted acoustic sensor. In particular, we explore three acoustic features, one in the time domain and two on synthetic aperture acoustic (SAA) beamformed imagery. The idea is to exploit the varying acoustic frequency profile of a target due to its unique geometry and material composition with respect to different viewing angles. The first two features build their angle specific frequency information using a highly constrained subset of the signal data and the last feature builds its frequency profile using all available signal data for a given region of interest (centered on the candidate target location). Performance is assessed in the context of receiver operating characteristic (ROC) curves on cross-validation experiments for data collected at a U.S. Army test site on different days with multiple target types and clutter. Our preliminary results are encouraging and indicate that the top performing feature is the unrolled two dimensional discrete Fourier transform (DFT) of SAA beamformed imagery.

  9. Synthetic, implantable polymers for local delivery of IUdR to experimental human malignant glioma

    International Nuclear Information System (INIS)

    Williams, Jeffery A.; Yuan Xuan; Dillehay, Larry E.; Shastri, Venkatram R.; Brem, Henry; Williams, Jerry R.

    1998-01-01

    Purpose: Recently, polymeric controlled delivery of chemotherapy has been shown to improve survival of patients with malignant glioma. We evaluated whether we could similarly deliver halogenated pyrimidines to experimental intracranial human malignant glioma. To address this issue we studied the in vitro release from polymers and the in vivo drug delivery of IUdR to experimental human U251 glioblastoma xenografts. Methods and Materials: In vitro: To measure release, increasing (10%, 30%, 50%) proportions of IUdR in synthetic [(poly(bis(p-carboxyphenoxy)-propane) (PCPP):sebacic acid (SA) polymer discs were serially incubated in buffered saline and the supernatant fractions were assayed. In vivo: To compare local versus systemic delivery, mice bearing flank xenografts had intratumoral or contralateral flank IUdR polymer (50% loading) treatments. Mice bearing intracranial (i.c.) xenografts had i.c. versus flank IUdR polymer treatments. Four or 8 days after implantation of polymers, mice were sacrificed and the percentage tumor cells that were labeled with IUdR was measured using quantitative microscopic immunohistochemistry. Results: In vitro: Increasing percentage loadings of IUdR resulted in higher percentages of release: 43.7 + 0.1, 70.0 + 0.2, and 90.2 + 0.2 (p < 0.001 ANOVA) for the 10%, 30%, and 50% loadings, respectively. In vivo: For the flank tumors, both the ipsilateral and contralateral IUdR polymers resulted in similarly high percentages labeling of the tumors versus time. For the ipsilateral IUdR polymers, the percentage of tumor cellular labeling after 4 days versus 8 days was 45.8 ± 7.0 versus 40.6 ± 3.9 (p = NS). For the contralateral polymer implants, the percentage of tumor cellular labeling were 43.9 ± 10.1 versus 35.9 ± 5.2 (p = NS) measured 4 days versus 8 days after implantation. For the i.c. tumors treated with extracranial IUdR polymers, the percentage of tumor cellular labeling was low: 13.9 ± 8.8 and 11.2 ± 5.7 measured 4 and 8 days

  10. Protein-polymer nano-machines. Towards synthetic control of biological processes

    Directory of Open Access Journals (Sweden)

    Alexander Cameron

    2004-09-01

    Full Text Available Abstract The exploitation of nature's machinery at length scales below the dimensions of a cell is an exciting challenge for biologists, chemists and physicists, while advances in our understanding of these biological motifs are now providing an opportunity to develop real single molecule devices for technological applications. Single molecule studies are already well advanced and biological molecular motors are being used to guide the design of nano-scale machines. However, controlling the specific functions of these devices in biological systems under changing conditions is difficult. In this review we describe the principles underlying the development of a molecular motor with numerous potential applications in nanotechnology and the use of specific synthetic polymers as prototypic molecular switches for control of the motor function. The molecular motor is a derivative of a TypeI Restriction-Modification (R-M enzyme and the synthetic polymer is drawn from the class of materials that exhibit a temperature-dependent phase transition. The potential exploitation of single molecules as functional devices has been heralded as the dawn of new era in biotechnology and medicine. It is not surprising, therefore, that the efforts of numerous multidisciplinary teams 12. have been focused in attempts to develop these systems. as machines capable of functioning at the low sub-micron and nanometre length-scales 3. However, one of the obstacles for the practical application of single molecule devices is the lack of functional control methods in biological media, under changing conditions. In this review we describe the conceptual basis for a molecular motor (a derivative of a TypeI Restriction-Modification enzyme with numerous potential applications in nanotechnology and the use of specific synthetic polymers as prototypic molecular switches for controlling the motor function 4.

  11. Mineralization of Synthetic Polymer Scaffolds: A Bottom-upApproach for the Development of Artificial Bone

    Energy Technology Data Exchange (ETDEWEB)

    Song, Jie; Viengkham, Malathong; Bertozzi, Carolyn R.

    2004-09-27

    The controlled integration of organic and inorganic components confers natural bone with superior mechanical properties. Bone biogenesis is thought to occur by templated mineralization of hard apatite crystals by an elastic protein scaffold, a process we sought to emulate with synthetic biomimetic hydrogel polymers. Crosslinked polymethacrylamide and polymethacrylate hydrogels were functionalized with mineral-binding ligands and used to template the formation of hydroxyapatite. Strong adhesion between the organic and inorganic materials was achieved for hydrogels functionalized with either carboxylate or hydroxy ligands. The mineral-nucleating potential of hydroxyl groups identified here broadens the design parameters for synthetic bone-like composites and suggests a potential role for hydroxylated collagen proteins in bone mineralization.

  12. Recent trends on gellan gum blends with natural and synthetic polymers: A review.

    Science.gov (United States)

    Zia, Khalid Mahmood; Tabasum, Shazia; Khan, Muhammad Faris; Akram, Nadia; Akhter, Naheed; Noreen, Aqdas; Zuber, Mohammad

    2018-04-01

    Gellan gum (GG), a linear negatively charged exopolysaccharide,is biodegradable and non-toxic in nature. It produces hard and translucent gel in the presence of metallic ions which is stable at low pH. However, GG has poor mechanical strength, poor stability in physiological conditions, high gelling temperature and small temperature window.Therefore,it is blended with different polymers such as agar, chitosan, cellulose, sodium alginate, starch, pectin, polyanaline, pullulan, polyvinyl chloride, and xanthan gum. In this article, a comprehensive overview of combination of GG with natural and synthetic polymers/compounds and their applications in biomedical field involving drug delivery system, insulin delivery, wound healing and gene therapy, is presented. It also describes the utilization of GG based materials in food and petroleum industry. All the technical scientific issues have been addressed; highlighting the recent advancement. Copyright © 2017 Elsevier B.V. All rights reserved.

  13. The triazine-based porous organic polymer: Novel synthetic strategy for high specific surface area

    International Nuclear Information System (INIS)

    Park, Jin Kuen

    2017-01-01

    A new type of microporous polymer has been successively synthesized via a simple polycondensation reaction with the 2,4-diaminotriazine moiety and dianhydride monomer. Diaminotriazine moieties in M1 especially can provide effective branching sites, resulting in high surface areas up to 1150 m"2 /g. In addition, the specific pore structure of the polyimide POP in its solid state can be modified by the surface activation method. Therefore, it can be expected that the resulting material will be a promising candidate for gas storage, and with this synthetic strategy, various type of derivatives will also be optimized

  14. The triazine-based porous organic polymer: Novel synthetic strategy for high specific surface area

    Energy Technology Data Exchange (ETDEWEB)

    Park, Jin Kuen [Dept. of Chemistry, Hankuk University of Foreign Studies, Yongin (Korea, Republic of)

    2017-02-15

    A new type of microporous polymer has been successively synthesized via a simple polycondensation reaction with the 2,4-diaminotriazine moiety and dianhydride monomer. Diaminotriazine moieties in M1 especially can provide effective branching sites, resulting in high surface areas up to 1150 m{sup 2} /g. In addition, the specific pore structure of the polyimide POP in its solid state can be modified by the surface activation method. Therefore, it can be expected that the resulting material will be a promising candidate for gas storage, and with this synthetic strategy, various type of derivatives will also be optimized.

  15. A Comparison of Degradable Synthetic Polymer Fibers for Anterior Cruciate Ligament Reconstruction

    OpenAIRE

    Tovar, Nick; Bourke, Sharon; Jaffe, Michael; Murthy, N. Sanjeeva; Kohn, Joachim; Gatt, Charles; Dunn, Michael G.

    2010-01-01

    We compared mechanical properties, degradation rates, and cellular compatibilities of two synthetic polymer fibers potentially useful as ACL reconstruction scaffolds: poly(desaminotyrosyl-tyrosine dodecyl dodecanedioate)(12,10), p(DTD DD) and poly(L-lactic acid), PLLA. The yield stress of ethylene oxide (ETO) sterilized wet fibers was 150 ± 22 MPa and 87 ± 12 MPa for p(DTD DD) and PLLA, respectively, with moduli of 1.7 ± 0.1 MPa and 4.4 ± 0.43 MPa. Strength and molecular weight retention were...

  16. Protein cages and synthetic polymers: a fruitful symbiosis for drug delivery applications, bionanotechnology and materials science.

    Science.gov (United States)

    Rother, Martin; Nussbaumer, Martin G; Renggli, Kasper; Bruns, Nico

    2016-11-07

    Protein cages are hollow protein nanoparticles, such as viral capsids, virus-like particles, ferritin, heat-shock proteins and chaperonins. They have well-defined capsule-like structures with a monodisperse size. Their protein subunits can be modified by genetic engineering at predetermined positions, allowing for example site-selective introduction of attachment points for functional groups, catalysts or targeting ligands on their outer surface, in their interior and between subunits. Therefore, protein cages have been extensively explored as functional entities in bionanotechnology, as drug-delivery or gene-delivery vehicles, as nanoreactors or as templates for the synthesis of organic and inorganic nanomaterials. The scope of functionalities and applications of protein cages can be significantly broadened if they are combined with synthetic polymers on their surface or within their interior. For example, PEGylation reduces the immunogenicity of protein cage-based delivery systems and active targeting ligands can be attached via polymer chains to favour their accumulation in diseased tissue. Polymers within protein cages offer the possibility of increasing the loading density of drug molecules, nucleic acids, magnetic resonance imaging contrast agents or catalysts. Moreover, the interaction of protein cages and polymers can be used to modulate the size and shape of some viral capsids to generate structures that do not occur with native viruses. Another possibility is to use the interior of polymer cages as a confined reaction space for polymerization reactions such as atom transfer radical polymerization or rhodium-catalysed polymerization of phenylacetylene. The protein nanoreactors facilitate a higher degree of control over polymer synthesis. This review will summarize the hybrid structures that have been synthesized by polymerizing from protein cage-bound initiators, by conjugating polymers to protein cages, by embedding protein cages into bulk polymeric

  17. Removal of toxic uranium from synthetic nuclear power reactor effluents using uranyl ion imprinted polymer particles.

    Science.gov (United States)

    Preetha, Chandrika Ravindran; Gladis, Joseph Mary; Rao, Talasila Prasada; Venkateswaran, Gopala

    2006-05-01

    Major quantities of uranium find use as nuclear fuel in nuclear power reactors. In view of the extreme toxicity of uranium and consequent stringent limits fixed by WHO and various national governments, it is essential to remove uranium from nuclear power reactor effluents before discharge into environment. Ion imprinted polymer (IIP) materials have traditionally been used for the recovery of uranium from dilute aqueous solutions prior to detection or from seawater. We now describe the use of IIP materials for selective removal of uranium from a typical synthetic nuclear power reactor effluent. The IIP materials were prepared for uranyl ion (imprint ion) by forming binary salicylaldoxime (SALO) or 4-vinylpyridine (VP) or ternary SALO-VP complexes in 2-methoxyethanol (porogen) and copolymerizing in the presence of styrene (monomer), divinylbenzene (cross-linking monomer), and 2,2'-azobisisobutyronitrile (initiator). The resulting materials were then ground and sieved to obtain unleached polymer particles. Leached IIP particles were obtained by leaching the imprint ions with 6.0 M HCl. Control polymer particles were also prepared analogously without the imprint ion. The IIP particles obtained with ternary complex alone gave quantitative removal of uranyl ion in the pH range 3.5-5.0 with as low as 0.08 g. The retention capacity of uranyl IIP particles was found to be 98.50 mg/g of polymer. The present study successfully demonstrates the feasibility of removing uranyl ions selectively in the range 5 microg - 300 mg present in 500 mL of synthetic nuclear power reactor effluent containing a host of other inorganic species.

  18. Calculating the vulnerability of synthetic polymers to autoignition during nuclear flash. Final report

    International Nuclear Information System (INIS)

    Hickman, R.; Reitter, T.

    1985-01-01

    The purpose of our investigation was to determine if the rapid progression of fire to flashover conditions in a furnished room, observed in a 1953 nuclear weapons test at the Nevada Test Site (the Encore Event), might be typical behavior rather than an aberration. If flashover under such conditions is indeed likely, this phenomenon is worth pursuing in view of the increased threat to buildings and human life from possible large-scale fires. We placed special emphasis on fires that occurred in modern rooms, i.e., ones furnished with upholstery and drapery materials made from synthetic polymers. Examination of photochemical processes showed them to be an unlikely explanation, either in Encore or in the future. Our calculation of rapid radiant-heating behavior of a few materials demonstrated that fabrics and fabric-covered foams would exceed their autoignition temperature when exposed to a 25-cal/cm 2 fluence from a 1-Mt air burst weapon. Because synthetic polymers have higher heating values and release heat faster during combustion than do the cellulosics used in the Encore experiment, early flashover should not be unexpected in contemporary households. However, the far-field thermal fluence required would be higher because of the absorption of thermal energy by windows and window coverings. Because of the complexity of the problem, carefully planned, full-scale experiments will be needed to finally answer the question. 39 refs., 9 figs., 8 tabs

  19. Using synthetic polymers to reduce soil erosion after forest fires in Mediterranean soils

    Science.gov (United States)

    Lado, Marcos; Ben-Hur, Meni; Inbar, Assaf

    2010-05-01

    Forest fires are a major environmental problem in the Mediterranean region because they result in a loss of vegetation cover, changes in biodiversity, increases in greenhouse gasses emission and a potential increase of runoff and soil erosion. The large increases in runoff and sediment yields after high severity fires have been attributed to several factors, among them: increase in soil water repellency; soil sealing by detached particles and by ash particles, and the loss of a surface cover. The presence of a surface cover increases infiltration, and decreases runoff and erosion by several mechanisms which include: rainfall interception, plant evapotranspiration, preservation of soil structure by increasing soil organic matter, and increasing surface roughness. The loss of vegetation cover as a result of fire leaves the surface of the soil exposed to the direct impact of the raindrops, and therefore the sensitivity of the soil to runoff generation and soil loss increases. In this work, we propose a new method to protect soils against post-fire erosion based on the application of synthetic polymers to the soil. Laboratory rainfall simulations and field runoff plots were used to analyze the suitability of the application of synthetic polymers to reduce soil erosion and stabilize soil structure in Mediterranean soils. The combination of these two processes will potentially favor a faster recovery of the vegetation structure. This method has been successfully applied in arable land, however it has not been tested in burnt forests. The outcome of this study may provide important managerial tools for forest management following fires.

  20. Oral sustained release tablets of zidovudine using binary blends of natural and synthetic polymers.

    Science.gov (United States)

    Emeje, Martins; Olaleye, Olajide; Isimi, Christiana; Fortunak, Joseph; Byrn, Stephen; Kunle, Olobayo; Ofoefule, Sabinus

    2010-01-01

    Oral sustained release matrix tablets of zidovudine (ZDV) were prepared using different types, proportions and blends of carbopol 71G (C71) and a plant gum obtained from Abelmoschus esculentus (AEG). The effect of various formulation factors like polymer proportion, polymer type and pH of the dissolution medium on the in vitro release of the drug was studied, using the half change technique, in 900 ml of dissolution medium, at 100 rpm. Release kinetics were analyzed using Zero-order, Higuchi's square-root and Ritger-Peppas' empirical equations. In vitro release performance as revealed by the time taken for 70% of the drug to be released (t70%), showed that the release rate decreased with increase in polymer proportion. Matrix tablets containing 10 and 20% AEG were found to exhibit immediate-release characteristics. Matrix tablets containing 30% AEG showed t70% value of 204 min and extended the release up to 5 h, while matrix tablets containing 30% carbopol showed t70% value of 234 min and extended the release up to 6 h. Three blends of AEG and C71 at the ratio of 1:2, 2:1 and 1:3 showed t70% values of 132, 312 and 102 min respectively and extended the release up to 8 h. Mathematical analysis of the release kinetics indicated that the nature of drug release from the matrix tablets followed Fickian and anomalous release. Drug release from matrix tablets of zidovudine containing blends of AEG and C71 demonstrates the advantage of blending a natural and synthetic polymer over single polymer use.

  1. Radiation Synthesis and Characterization of Natural and Natural-Synthetic Hybrid Super Absorbent Polymers for Agricultural Applications. Chapter 19

    Energy Technology Data Exchange (ETDEWEB)

    Şen, M.; Hayrabolulu, H.; Güven, O. [Hacettepe University Department of Chemistry, Beytepe, Ankara (Turkey)

    2014-07-15

    The experimental studies carried out in Hacettepe University, Laboratories of Radiation and Polymers Science (LRPS) in the past ten years, which focused mainly on the synthesis of synthetic and natural-synthetic super absorbent polymers in various irradiation conditions, are summarized in the first part of the presentation. Studies conducted on the following areas: (1) the controlled release of fertilizers and herbicides and the effect of the natural polymer type, (2) the neutralization degree of poly(acrylic acid), (3) the temperature and pressure on the swelling kinetics, and (4) the maximum water absorption capacity of the potential soil conditional hydrogels, were explained. The results were then compared with those obtained from commercial super absorbent polymers prepared through conventional techniques. In the third part of the presentation, basic and advanced techniques in the characterization of the network structure of super water absorbents were presented. (author)

  2. Biodegradability of PP/HMSPP and natural and synthetic polymers blends in function of gamma irradiation degradation

    Science.gov (United States)

    Cardoso, Elisabeth C. L.; Scagliusi, Sandra R.; Lima, Luis F. C. P.; Bueno, Nelson R.; Brant, Antonio J. C.; Parra, Duclerc F.; Lugão, Ademar B.

    2014-01-01

    Polymers are used for numerous applications in different industrial segments, generating enormous quantities of discarding in the environment. Polymeric materials composites account for an estimated from 20 to 30% total volume of solid waste. Polypropylene (PP) undergoes crosslinking and extensive main chain scissions when submitted to ionizing irradiation; as one of the most widely used linear hydrocarbon polymers, PP, made from cheap petrochemical feed stocks, shows easy processing leading it to a comprehensive list of finished products. Consequently, there is accumulation in the environment, at 25 million tons per year rate, since polymeric products are not easily consumed by microorganisms. PP polymers are very bio-resistant due to involvement of only carbon atoms in main chain with no hydrolysable functional group. Several possibilities have been considered to minimize the environmental impact caused by non-degradable plastics, subjecting them to: physical, chemical and biological degradation or combination of all these due to the presence of moisture, air, temperature, light, high energy radiation or microorganisms. There are three main classes of biodegradable polymers: synthetic polymers, natural polymers and blends of polymers in which one or more components are readily consumed by microorganisms. This work aims to biodegradability investigation of a PP/HMSPP (high melt strength polypropylene) blended with sugarcane bagasse, PHB (poly-hydroxy-butyrate) and PLA (poly-lactic acid), both synthetic polymers, at a 10% level, subjected to gamma radiation at 50, 100, 150 and 200 kGy doses. Characterization will comprise IR, DSC, TGA, OIT and Laboratory Soil Burial Test (LSBT).

  3. Synthetic Consolidants Attacked by Melanin-Producing Fungi: Case Study of the Biodeterioration of Milan (Italy) Cathedral Marble Treated with Acrylics▿

    Science.gov (United States)

    Cappitelli, Francesca; Nosanchuk, Joshua D.; Casadevall, Arturo; Toniolo, Lucia; Brusetti, Lorenzo; Florio, Sofia; Principi, Pamela; Borin, Sara; Sorlini, Claudia

    2007-01-01

    Monuments and artistic stone surfaces are often consolidated and protected with synthetic polymers, in particular, acrylics. Although it is generally thought that acrylic polymers are resistant to biodeterioration, we report for the first time the systematic occurrence of dematiaceous meristematic fungi on many marble samples of the cathedral in Milan (Italy) previously treated with this material. Fourier transform infrared spectroscopy applied to the Milan cathedral stone samples revealed characteristic features of biodeteriorated synthetic resins that differentiated them from the aged but nonbiodeteriorated samples. Samples showing biological colonization were analyzed for the presence of fungi. Cultivation and morphological characterization and methods independent from cultivation, such as denaturing gradient gel electrophoresis coupled with partial 18S rRNA gene sequencing and immunofluorescence staining with melanin-binding antibodies, showed that melanin-producing species are heavily present on stone surfaces protected with acrylic resins. This observation raises the question of the effectiveness of acrylics in protecting stone artworks. PMID:17071788

  4. Synthetic consolidants attacked by melanin-producing fungi: case study of the biodeterioration of Milan (Italy) cathedral marble treated with acrylics.

    Science.gov (United States)

    Cappitelli, Francesca; Nosanchuk, Joshua D; Casadevall, Arturo; Toniolo, Lucia; Brusetti, Lorenzo; Florio, Sofia; Principi, Pamela; Borin, Sara; Sorlini, Claudia

    2007-01-01

    Monuments and artistic stone surfaces are often consolidated and protected with synthetic polymers, in particular, acrylics. Although it is generally thought that acrylic polymers are resistant to biodeterioration, we report for the first time the systematic occurrence of dematiaceous meristematic fungi on many marble samples of the cathedral in Milan (Italy) previously treated with this material. Fourier transform infrared spectroscopy applied to the Milan cathedral stone samples revealed characteristic features of biodeteriorated synthetic resins that differentiated them from the aged but nonbiodeteriorated samples. Samples showing biological colonization were analyzed for the presence of fungi. Cultivation and morphological characterization and methods independent from cultivation, such as denaturing gradient gel electrophoresis coupled with partial 18S rRNA gene sequencing and immunofluorescence staining with melanin-binding antibodies, showed that melanin-producing species are heavily present on stone surfaces protected with acrylic resins. This observation raises the question of the effectiveness of acrylics in protecting stone artworks.

  5. Improving the Compatibility of Natural and Synthetic Polymer Blends by Radiation Treatments for Using in Practical Application

    International Nuclear Information System (INIS)

    Abu-El Fadle, F.I.

    2011-01-01

    Different polymer blends based on the natural polymers carboxymethyl cellulose (CMC) and sodium alginate as well as the synthetic polymers poly(ethylene glycol) (PEG), poly(ethylene oxide) (PEO) and poly acrylamide (PAM) were prepared by solution casting in the form of films. The common solvent used was water. The different blends prepared in this study were subjected to gamma radiation. The compatibility and structure-property behaviour of these blends was studied by differential scanning calorimetry (DSC), Fourier-Transform Infrared (FTIR) analysis, thermogravimetric analysis (TGA), scanning electron microscopy (SEM), and tensile mechanical testing before and after irradiation. In addition, the swelling properties of different polymer blends were studied at different conditions of temperature and ph. The controlled release characters of the different blends of different drugs were investigated. In addition, the different polymer blends were used for the removal of heavy metals and dyes waste.

  6. Protein and synthetic polymer injection for induction of obstructive hydrocephalus in rats

    Directory of Open Access Journals (Sweden)

    Del Bigio Marc R

    2007-09-01

    Full Text Available Abstract Background The objective of this study was to develop a simple and inexpensive animal model of induced obstructive hydrocephalus with minimal tissue inflammation, as an alternative to kaolin injection. Materials Two-hundred and two male Sprague-Dawley rats aged 3 weeks received intracisternal injections of kaolin (25% suspension, Matrigel, type 1 collagen from rat tail, fibrin glue (Tisseel, n-butyl-cyanoacrylate (NBCA, or ethylene vinyl alcohol copolymer (Onyx-18 and Onyx-34. Magnetic resonance imaging was used to assess ventricle size. Animals were euthanized at 2, 5, 10 and 14 days post-injection for histological analysis. Results Kaolin was associated with 10% mortality and successful induction of hydrocephalus in 97% of survivors (ventricle area proportion 0.168 ± 0.018. Rapidly hardening agents (fibrin glue, NBCA, vinyl polymer had high mortality rates and low success rates in survivors. Only Matrigel had relatively low mortality (17% and moderate success rate (20%. An inflammatory response with macrophages and some lymphocytes was associated with kaolin. There was negligible inflammation associated with Matrigel. A severe inflammatory response with giant cell formation was associated with ethylene vinyl alcohol copolymer. Conclusion Kaolin predictably produces moderate to severe hydrocephalus with a mild chronic inflammatory reaction and fibrosis of the leptomeninges. Other synthetic polymers and biopolymers tested are unreliable and cause different types of inflammation.

  7. Desorption electro-spray ionization - orbitrap mass spectrometry of synthetic polymers and copolymers

    International Nuclear Information System (INIS)

    Friia, Manel; Legros, Veronique; Tortajada, Jeanine; Buchmann, William

    2012-01-01

    Desorption Electro-Spray Ionization (DESI) - Orbitrap Mass Spectrometry (MS) was evaluated as a new tool for the characterization of various industrial synthetic polymers (poly(ethylene glycol), poly(propylene glycol), poly(methylmethacrylate), poly(dimethylsiloxane)) and copolymers, with masses ranging from 500 g.mol -1 up to more than 20000 g.mol -1 . Satisfying results in terms of signal stability and sensitivity were obtained from hydrophobic surfaces (HTC Prosolia) with a mixture water/methanol (10/90) as spray solvent in the presence of sodium salt. Taking into account the formation of multiplied charged species by DESI-MS, a strategy based on the use of a deconvolution software followed by the automatic assignment of the ions was described allowing the rapid determination of Mn, Mw and PDI values. DESI-Orbitrap MS results were compared to those obtained from matrix-assisted laser desorption/ionization- time-of-flight MS and gel permeation chromatography. An application of DESI-Orbitrap MS for the detection and identification of polymers directly from cosmetics was described. (authors)

  8. Gamma irradiated micro system for long-term parenteral contraception: An alternative to synthetic polymers.

    Science.gov (United States)

    Puthli, S; Vavia, P

    2008-11-15

    An injectable system of levonorgestrel (LNG) was developed using biodegradable polymer of natural origin. The parenteral system was optimized for particle size and higher drug loading. The microparticulate system was characterised by scanning electron microscopy, encapsulation efficiency, moisture content, IR, DSC, XRD, residual solvent content, sterility testing, test of abnormal toxicity and test for pyrogens. The microparticles were sterilised by gamma irradiation (2.5Mrad). The system was injected intramuscularly in rabbits and the blood levels of LNG were determined using radioimmunoassay technique. An optimized drug to polymer ratio of 0.3-1.0 (w/w ratio) gave improved drug loading of about 52%. In vivo studies in rabbits showed that the drug was released in a sustained manner for a period of 1 month. The AUC(0-t) was found to be 9363.6+/-2340pg/mLday(-1) with MRT calculated to be about 16 days and Kel of 0.01day(-1). LNG levels were maintained between 200 and 400pg/mL. In vivo release exhibited an initial burst effect which was not observed in the in vitro dissolution. This promising "Progestin-only" long-term contraceptive with improved user compliance is an alternative to the synthetic expensive polymeric carriers.

  9. A Comparison of Degradable Synthetic Polymer Fibers for Anterior Cruciate Ligament Reconstruction

    Science.gov (United States)

    Tovar, Nick; Bourke, Sharon; Jaffe, Michael; Murthy, N. Sanjeeva; Kohn, Joachim; Gatt, Charles; Dunn, Michael G.

    2009-01-01

    We compared mechanical properties, degradation rates, and cellular compatibilities of two synthetic polymer fibers potentially useful as ACL reconstruction scaffolds: poly(desaminotyrosyl-tyrosine dodecyl dodecanedioate)(12,10), p(DTD DD) and poly(L-lactic acid), PLLA. The yield stress of ethylene oxide (ETO) sterilized wet fibers was 150 ± 22 MPa and 87 ± 12 MPa for p(DTD DD) and PLLA, respectively, with moduli of 1.7 ± 0.1 MPa and 4.4 ± 0.43 MPa. Strength and molecular weight retention were determined after incubation under physiological conditions at varying times. After 64 weeks strength decreased to 20 and 37% of the initial sterile fiber values and MW decreased to 41% and 36% of the initial values for p(DTD DD) and PLLA, respectively. ETO sterilization had no significant effect on mechanical properties. Differences in mechanical behavior may be due to the semicrystalline nature of PLLA and the small degree of crystallinity induced by mesogenic ordering in p(DTD DD) suggested by DSC analysis. Fibroblast growth was similar on 50-fiber scaffolds of both polymers through 16 days in vitro. These data suggest that p(DTD DD) fibers, with higher strength, lower stiffness, favorable degradation rate and cellular compatibility, may be a superior alternative to PLLA fibers for development of ACL reconstruction scaffolds. PMID:19623532

  10. Advances in Tribology of Lubricin and Lubricin-Like Synthetic Polymer Nanostructures

    Directory of Open Access Journals (Sweden)

    Ilker S. Bayer

    2018-04-01

    Full Text Available Articular cartilage surrounds the ends of diarthrodial joints (most common movable joints and during motion, it experiences a wide range of loading conditions while remaining under exceedingly low-friction and wear-free conditions. This remarkable tribological performance stems from complex interactions between the synovial fluid and articular cartilage. In fact, lubricin and hyaluronic acid (HA that are part of the synovial fluid are now known to be the key contributors to effective joint lubrication and wear protection. Studies involving animal models and artificial systems suggest that lubricin and HA molecules may work in tandem to produce a highly synergistic effect for lubrication. However, latest observations suggest that lubricin has significant potential for protecting the articular joints, probably more than HA. Recently, lurbicin-related friction regulation in soft eye tissues, where much lower forces are involved compared to knee joints for instance, has been shown to be related to dry eye disease and contact lens discomfort. As such, lubricin’s role in natural friction regulation is very complex. Moreover, partially unresolved water-lubricin interactions are essential for lubrication and load carrying function in the joints. The chemical structure of lubricin has inspired several chemists to synthesize new copolymers and polymer brushes that function just like lubricin in order to design new synthetic or bio-based lubricants with ultra-low-friction coefficients. Hence, lubricin has emerged as a key natural molecule for bioinspired tribology. The aim of this review is to present the latest advances in understanding of lubricin’s function in joint lubrication and in soft tissue friction (i.e., human eye and document what has been achieved so far in transforming this biomedical knowledge into new polymer design for advanced engineering tribology. It is hoped that this review will catalyze research and development efforts in

  11. Biodegradability of PP/HMSPP and natural and synthetic polymers blends in function of gamma irradiation degradation

    International Nuclear Information System (INIS)

    Cardoso, Elisabeth C.L.; Scagliusi, Sandra R.; Lima, Luis F.C.P.; Bueno, Nelson R.; Brant, Antonio J.C.; Parra, Duclerc F.; Lugão, Ademar B.

    2014-01-01

    Polymers are used for numerous applications in different industrial segments, generating enormous quantities of discarding in the environment. Polymeric materials composites account for an estimated from 20 to 30% total volume of solid waste. Polypropylene (PP) undergoes crosslinking and extensive main chain scissions when submitted to ionizing irradiation; as one of the most widely used linear hydrocarbon polymers, PP, made from cheap petrochemical feed stocks, shows easy processing leading it to a comprehensive list of finished products. Consequently, there is accumulation in the environment, at 25 million tons per year rate, since polymeric products are not easily consumed by microorganisms. PP polymers are very bio-resistant due to involvement of only carbon atoms in main chain with no hydrolysable functional group. Several possibilities have been considered to minimize the environmental impact caused by non-degradable plastics, subjecting them to: physical, chemical and biological degradation or combination of all these due to the presence of moisture, air, temperature, light, high energy radiation or microorganisms. There are three main classes of biodegradable polymers: synthetic polymers, natural polymers and blends of polymers in which one or more components are readily consumed by microorganisms. This work aims to biodegradability investigation of a PP/HMSPP (high melt strength polypropylene) blended with sugarcane bagasse, PHB (poly-hydroxy-butyrate) and PLA (poly-lactic acid), both synthetic polymers, at a 10% level, subjected to gamma radiation at 50, 100, 150 and 200 kGy doses. Characterization will comprise IR, DSC, TGA, OIT and Laboratory Soil Burial Test (LSBT). - Highlights: • Polymeric materials composites account for an estimated from 20 to 30% total volume of solid waste. • Landfills will not be enough for an estimated accumulation of 25 million tons per year of plastics. • Incorporation of natural/synthetic polymers in PP/HMSPP to reduce

  12. Synthetic

    Directory of Open Access Journals (Sweden)

    Anna Maria Manferdini

    2010-06-01

    Full Text Available Traditionally materials have been associated with a series of physical properties that can be used as inputs to production and manufacturing. Recently we witnessed an interest in materials considered not only as ‘true matter’, but also as new breeds where geometry, texture, tooling and finish are able to provoke new sensations when they are applied to a substance. These artificial materials can be described as synthetic because they are the outcome of various qualities that are not necessarily true to the original matter, but they are the combination of two or more parts, whether by design or by natural processes. The aim of this paper is to investigate the potential of architectural surfaces to produce effects through the invention of new breeds of artificial matter, using micro-scale details derived from Nature as an inspiration.

  13. [The Use of Synthetic Polymers (Superdisintegrants) in Technology Tablets Containing Ethanol Dry Extract from Asparagus officinalis].

    Science.gov (United States)

    Linka, Wojciech Andrzej; Wojtaszek, Ilona; Zgoda, Marian Mikołaj; Kołodziejczyk, Michał Krzysztof

    2015-01-01

    Dry extracts are now frequently used in medicine as an alternative to synthetic drugs. In the case of tablet technology with dry plant extracts, the proper selection of disintegrants (superdisintegrants) is particularly important. Objectives. The aim of this study was to evaluate the usefulness of the polymers constituting superdisintegrants (Vivasol®, Vivastar®, Polyplasdone XL) in uncoated tablet formulation of alcoholic extracted from Asparagus officinalis. Dry the ethanol extract of Asparagus officinalis, Vivasol®, Vivastar®, Vivapur®, Kollidon VA64, Polyplasdone XL, magnesium stearate. Direct compression. Paddle method was carried out to study pharmacopoeial parameters and pharmaceutical availability. The calculation of equivalency factors: similarity [f2] and the difference [f1]. Approximation results. Tablets brownish-green, with a smooth and uniform surface, without stains, chipping and damage. The determined average weight of the tablets compiled with the standards. The test friability and crushing strength revealed that the most mechanically strong tablets contained Vivasol, Vivastar, Polyplasdone XL. These tablets also have a longer disintegration and dissolution time compared with tablets containing only Vivasol. These differences are also confirmed by the calculated f2 and f1. The addition of a mixture of Polyplasdone XL and Vivastar to Vivasol significantly increases the mechanical strength of the tablets (crushing strength, resistance to crushing). The addition of a mixture of Polyplasdone XL and Vivastar to Vivasol paradoxically increases the disintegration time of tablets (11.1 min). Single superdisintegrant breaks up the tablet more effectively than a mixture of superdisintegrants.

  14. Natural-Synthetic Hybrid Polymers Developed via Electrospinning: The Effect of PET in Chitosan/Starch System

    Science.gov (United States)

    Espíndola-González, Adolfo; Martínez-Hernández, Ana Laura; Fernández-Escobar, Francisco; Castaño, Victor Manuel; Brostow, Witold; Datashvili, Tea; Velasco-Santos, Carlos

    2011-01-01

    Chitosan is an amino polysaccharide found in nature, which is biodegradable, nontoxic and biocompatible. It has versatile features and can be used in a variety of applications including films, packaging, and also in medical surgery. Recently a possibility to diversify chitosan properties has emerged by combining it with synthetic materials to produce novel natural-synthetic hybrid polymers. We have studied structural and thermophysical properties of chitosan + starch + poly(ethylene terephthalate) (Ch + S + PET) fibers developed via electrospinning. Properties of these hybrids polymers are compared with extant chitosan containing hybrids synthesized by electrospinning. Molecular interactions and orientation in the fibers are analyzed by infrared and Raman spectroscopies respectively, morphology by scanning electron microscopy and thermophysical properties by thermogravimetric analysis and differential scanning calorimetry. Addition of PET to Ch + S systems results in improved thermal stability at elevated temperatures. PMID:21673930

  15. α-Amino acid containing degradable polymers as functional biomaterials: rational design, synthetic pathway, and biomedical applications.

    Science.gov (United States)

    Sun, Huanli; Meng, Fenghua; Dias, Aylvin A; Hendriks, Marc; Feijen, Jan; Zhong, Zhiyuan

    2011-06-13

    Currently, biomedical engineering is rapidly expanding, especially in the areas of drug delivery, gene transfer, tissue engineering, and regenerative medicine. A prerequisite for further development is the design and synthesis of novel multifunctional biomaterials that are biocompatible and biologically active, are biodegradable with a controlled degradation rate, and have tunable mechanical properties. In the past decades, different types of α-amino acid-containing degradable polymers have been actively developed with the aim to obtain biomimicking functional biomaterials. The use of α-amino acids as building units for degradable polymers may offer several advantages: (i) imparting chemical functionality, such as hydroxyl, amine, carboxyl, and thiol groups, which not only results in improved hydrophilicity and possible interactions with proteins and genes, but also facilitates further modification with bioactive molecules (e.g., drugs or biological cues); (ii) possibly improving materials biological properties, including cell-materials interactions (e.g., cell adhesion, migration) and degradability; (iii) enhancing thermal and mechanical properties; and (iv) providing metabolizable building units/blocks. In this paper, recent developments in the field of α-amino acid-containing degradable polymers are reviewed. First, synthetic approaches to prepare α-amino acid-containing degradable polymers will be discussed. Subsequently, the biomedical applications of these polymers in areas such as drug delivery, gene delivery and tissue engineering will be reviewed. Finally, the future perspectives of α-amino acid-containing degradable polymers will be evaluated.

  16. Activity and Safety of Synthetic Lectins Based on Benzoboroxole-Functionalized Polymers for Inhibition of HIV Entry

    Science.gov (United States)

    Mahalingam, Alamelu; Geonnotti, Anthony R.; Balzarini, Jan; Kiser, Patrick F.

    2011-01-01

    Lectins derived from plant and microbial sources constitute a vital class of entry inhibitors that target the oligomannose residues on the HIV envelope gp120. Despite their potency and specificity, success of lectin-based entry inhibitors may be impeded by issues in regards to economical production, formulation and potential mitogenicity. Therefore, there exists a gap in the HIV therapeutics pipeline that underscores the need for mass producible, synthetic, broad-spectrum, and biocomptabile inhibitors of HIV entry. Here, we present the development of a polymeric synthetic lectin, based on benzoboroxole (BzB), which exhibits weak affinity (~25 M−1) for non-reducing sugars, similar to those found on the HIV envelope. High molecular weight BzB-functionalized polymers demonstrated antiviral activity that increased with an increase in ligand density and molecular weight of the polymer construct; revealing that polyvalency improves activity. Polymers showed significant increase in activity from 25 to 75 mol% BzB functionalization with EC50 of 15 μM and 15 nM, respectively. A further increase in mole functionalization to 90% resulted in an increase of the EC50 (59 ± 5 nM), likely due to the elongated rigid structure of the polymer chain compelled by electrostatic repulsion between the boronic acid groups. An increase in molecular weight of the polymer at 50 mol% BzB functionalization showed a gradual but significant increase in antiviral activity, with the highest activity seen with the 382 kDa polymer (EC50 of 1.1 ± 0.5 nM in CEM cells and 11 ± 3 nM in TZM-bl cells). Supplementing the polymer backbone with 10 mol% sulfonic acid not only increased the aqueous solubility of the polymers by at least 50-fold, but also demonstrated a synergistic increase in anti-HIV activity (4.0 ± 1.5 nM in TZM-bl cells), possibly due to electrostatic interactions between the negatively charged polymer backbone and the positively charged V3-loop in the gp120. The benzoboroxole

  17. Control of polymer-packing orientation in thin films through synthetic tailoring of backbone coplanarity

    KAUST Repository

    Chen, Mark S.; Niskala, Jeremy R.; Unruh, David A.; Chu, Crystal K.; Lee, Olivia P.; Frechet, Jean

    2013-01-01

    Controlling solid-state order of π-conjugated polymers through macromolecular design is essential for achieving high electronic device performance; yet, it remains a challenge, especially with respect to polymer-packing orientation. Our work

  18. Enzymatic modification of natural and synthetic polymers using lipases and proteases

    Science.gov (United States)

    Chakraborty, Soma

    Enzymatic modification of natural/synthetic polymers [starch nanoparticles, poly (n-alkyl acrylates) and poly(vinyl formamide)] was studied. Enzymes used for catalysis were lipases and proteases. Starch nanoparticles (40nm diameter) were incorporated into AOT-coated reverse micelles. Reactions performed with the acylating agents vinyl stearate, epsilon-caprolactone and maleic anhydride in toluene in presence of Novozyme-435 at 40°C for 36h gave products with degrees of substitution of 0.8, 0.6 and 0.4 respectively. DEPT-135 NMR spectra revealed that the modification occurred regioselectively at the C-6 position of the glucose units. Infrared microspectroscopy showed that the surfactant coated starch nanoparticles diffuse into pores of Novozyme-435 beads, coming in close proximity with CALB to promote modification. The modified products retained nanoscale dimensions. Catalysis of amide bond formation between a low molar mass amine and ester side groups of poly(n-alkyl acrylates)[poly(ethyl acrylate), poly(methyl acrylate) and poly(butyl acrylate)] was also examined. The nucleophiles were mono and diamines. Among the poly(n-alkyl acrylates) and the lipases studied, poly(ethyl acrylate) was the preferred substrate and Novozyme-435 the most active lipase. Poly(ethyl acrylate) in 80% by-volume toluene was reacted with 1 equivalent per repeat unit of hexyl amine at 70°C in presence of Novozyme-435. The product contained 10.6 mol% amide groups. Attempts to increase the amidation beyond 10--11 mol% by increasing the reaction time or use of fresh enzyme were unsuccessful, showing that poly(ethylacrylate-co-10mol%hexylacrylamide) is a poor substrate for further acylation. When chiral amines ([R,S]-alpha-methyl benzylamine, [R,S]-beta-methyl phenyl amine) were used as nucleophiles, Novozyme-435 enantioselectively catalyzed amidation of poly(ethyl acrylate). Poly(vinyl formamide), P(VfAm) by acid or base-catalyzed hydrolysis leads to poly(vinylamine), P(VAm), and

  19. Effect of surfactant species and electrophoretic medium composition on the electrophoretic behavior of neutral and water-insoluble linear synthetic polymers in nonaqueous capillary zone electrophoresis.

    Science.gov (United States)

    Fukai, Nao; Kitagawa, Shinya; Ohtani, Hajime

    2017-07-01

    We have recently demonstrated the separation of neutral and water-insoluble linear synthetic polymers in nonaqueous capillary zone electrophoresis (NACZE) using a cationic surfactant of cetyltrimethylammonium chloride (CTAC). In this study, eight ionic surfactants were investigated for the separation of four synthetic polymers (polystyrene, polymethylmethacrylates, polybutadiene, and polycarbonate); only three surfactants (CTAC, dimethyldioctadecylammonium bromide, and sodium dodecylsulfate) caused their separation. The order of the interaction between the polymers and the surfactants depended on both the surfactant species and the composition of the electrophoretic medium. Their investigation revealed that the separation is majorly affected by the hydrophobic interactions between the polymers and the ionic surfactants. In addition, the electrophoretic behavior of polycarbonate suggested that electrostatic interaction also affects the selectivity of the polymers. © 2017 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  20. Use of Synthetic Polymers in Nuclear Emulsions for Fast-Neutron Dosimetry

    International Nuclear Information System (INIS)

    Bradna, F.

    1967-01-01

    The paper describes the results of tests on the properties of hydrogen-enriched nuclear-track emulsions for detecting fast neutrons, which were prepared in the Radiological Dosimetry Laboratory of the Czechoslovak Academy of Sciences Nuclear Research Institute. It also compares the dosimetric characteristics of these new emulsions with those of the gelatin emulsions used up to the present. The most promising of the series of polymers synthesized in the laboratory were: (1) Polyvinylacetal of 2,4-disulphonic acid benzaldehyde (polymer No. 1); (2) The co-polymer of a-acetylaminoacrylic acid and N-vinylpyrrolidone (polymer No. 2). The author also studied the possibility of using polyvinyl alcohol solutions with a higher hydrogen content than the above polymers for saturating polymer-gelatin emulsions and for preparing from them films for use as proton radiators. Polymers No. 1 and No. 2 were tested beforehand in an ammonia emulsion. It was established that polymer No. 1 has no marked effect on the photochemical properties of the emulsions, whereas the physical and mechanical.properties of the polymer-gelatin emulsions are considerably better than those of normal gelatin emulsions. The polymers have good protective properties, and polymer No. 2; can be used even during physical ageing, since it retards this process only to a small extent. The photochemical properties of the polymer-gelatin emulsions remain practically unchanged during natural ageing, and their mechanical strength is still further increased. After these preliminary tests, polymers No.-1 and No. 2 were used as fillers for a nuclear-track emulsion, in quantities ranging from 50 to 70% of the total amount of protective colloid, the silver content of the emulsion remaining unchanged. To increase their efficiency further, the polymer-gelatin emulsions were saturated with hydrogen, which was passed through the liquid emulsion for a short period of time. When prepared, the emulsions were poured on a tri

  1. Synthetic polymers in the marine environment: a rapidly increasing, long-term threat.

    Science.gov (United States)

    Moore, Charles James

    2008-10-01

    Synthetic polymers, commonly known as plastics, have been entering the marine environment in quantities paralleling their level of production over the last half century. However, in the last two decades of the 20th Century, the deposition rate accelerated past the rate of production, and plastics are now one of the most common and persistent pollutants in ocean waters and beaches worldwide. Thirty years ago the prevailing attitude of the plastic industry was that "plastic litter is a very small proportion of all litter and causes no harm to the environment except as an eyesore" [Derraik, J.G.B., 2002. The pollution of the marine environment by plastic debris: a review. Mar. Pollut. Bull. 44(9), 842-852]. Between 1960 and 2000, the world production of plastic resins increased 25-fold, while recovery of the material remained below 5%. Between 1970 and 2003, plastics became the fastest growing segment of the US municipal waste stream, increasing nine-fold, and marine litter is now 60-80% plastic, reaching 90-95% in some areas. While undoubtedly still an eyesore, plastic debris today is having significant harmful effects on marine biota. Albatross, fulmars, shearwaters and petrels mistake floating plastics for food, and many individuals of these species are affected; in fact, 44% of all seabird species are known to ingest plastic. Sea turtles ingest plastic bags, fishing line and other plastics, as do 26 species of cetaceans. In all, 267 species of marine organisms worldwide are known to have been affected by plastic debris, a number that will increase as smaller organisms are assessed. The number of fish, birds, and mammals that succumb each year to derelict fishing nets and lines in which they become entangled cannot be reliably known; but estimates are in the millions. We divide marine plastic debris into two categories: macro, >5 mm and micro, plastic micro-debris by filter feeders at the base of the food web is known to occur, but has not been quantified

  2. Role of various natural, synthetic and semi-synthetic polymers on drug release kinetics of losartan potassium oral controlled release tablets.

    Science.gov (United States)

    Jayasree, J; Sivaneswari, S; Hemalatha, G; Preethi, N; Mounika, B; Murthy, S Vasudeva

    2014-10-01

    The objective of the present work was to formulate and to characterize controlled release matrix tablets of losartan potassium in order to improve bioavailability and to minimize the frequency of administration and increase the patient compliance. Losartan potassium controlled release matrix tablets were prepared by direct compression technique by the use of different natural, synthetic and semisynthetic polymers such as gum copal, gum acacia, hydroxypropyl methyl cellulose K100 (HPMC K100), eudragit RL 100 and carboxy methyl ethyl cellulose (CMEC) individually and also in combination. Studies were carried out to study the influence of type of polymer on drug release rate. All the formulations were subjected to physiochemical characterization such as weight variation, hardness, thickness, friability, drug content, and swelling index. In vitro dissolution studies were carried out simulated gastric fluid (pH 1.2) for first 2 h and followed by simulated intestinal fluid (pH 6.8) up to 24 h, and obtained dissolution data were fitted to in vitro release kinetic equations in order to know the order of kinetics and mechanism of drug release. Results of physiochemical characterization of losartan potassium matrix tablets were within acceptable limits. Formulation containing HPMC K100 and CMEC achieved the desired drug release profile up to 24 h followed zero order kinetics, release pattern dominated by Korsmeyer - Peppas model and mechanism of drug release by nonfickian diffusion. The good correlation obtained from Hixson-Crowell model indicates that changes in surface area of the tablet also influences the drug release. Based on the results, losartan potassium controlled release matrix tablets prepared by employing HPMC K100 and CMEC can attain the desired drug release up to 24 h, which results in maintaining steady state concentration and improving bioavailability.

  3. Biodegradable Polymers

    OpenAIRE

    Vroman, Isabelle; Tighzert, Lan

    2009-01-01

    Biodegradable materials are used in packaging, agriculture, medicine and other areas. In recent years there has been an increase in interest in biodegradable polymers. Two classes of biodegradable polymers can be distinguished: synthetic or natural polymers. There are polymers produced from feedstocks derived either from petroleum resources (non renewable resources) or from biological resources (renewable resources). In general natural polymers offer fewer advantages than synthetic polymers. ...

  4. Assessment of Some Synthetic Polymers for the Removal of Pollutants from Waste Solutions

    International Nuclear Information System (INIS)

    Ayoub, R.; El-Naggar, H.A.; Ezz EL-Din, M.R.; Moussa, A.R.

    1999-01-01

    The sorption capacity of 134 Cs, 60 Co, 152+154 Eu and Cu (II) by three prepared has been studied using batch and column techniques. The three polymers are polyacrylic acid (PAA), polyacrylamide-acrylic acid (PAM-AA) and polyacrylamide-N-vinyl-2-pyrraldone (PAM-NVP). These polymers were prepared by gamma radiation initiated polymerization of their corresponding monomer solutions. The appropriate value for V/m ratio (volume of solution to mass of polymer) that can result in reasonably high distribution coefficient, Kd, was determined. The variation of the amount sorbed of the isotope per gram polymer (X/m) with concentration of the relevant element was found to follow a Frendlich type isotherm. The distribution coefficient, Kd, of the studied element was found to be affected by the ph of the solution. The desorption of the investigated metal ions is also studied at different ph. For column studies, the percent removed of the radioisotopes 134 Cs, 60 Co, ( 152+154 )Eu in addition to some heavy metals ions such as Pb, Cd, Zn and Cu(II) was determined. More than 95% of these elements were removed when 3 beds column of PAA or PAM-AA was used. From the data obtained we can conclude that the polymer PAA or PAM-AA can considered as an efficient sorbent for metal cations from their aqueous solution

  5. Research on the structure in solution of optically active synthetic polymers (propylene polysulphide, propylene polyoxide, tertio-butyl polysulphide)

    International Nuclear Information System (INIS)

    Sarrazin, Brigitte

    1971-03-01

    It was proposed to study the structure of sulphur-containing synthetic polymers, stereo-regular, optically active in solution and able to adopt a spiral conformation, with special reference to propylene polysulphide. Two methods were used, the first mathematical (conformational energy calculations) and the second physico-chemical, essentially spectroscopic. By conformational analysis it is possible to choose the most probable structures liable to be adopted by a given polymer in solution while the spectro-polarimetric study should, in principle, invalidate or confirm certain of these hypotheses. The conformational energy calculations showed that in fact there is no energy conformation low enough to be stable in solution. Strictly speaking however we can refer to a region of stability in which steric hindrance is low and many energy minima exist. These minima are indistinguishable both by their energy values and by their spatial localizations and are all enclosed in the region bounded by the barriers due to steric hindrance. This uncertainty does not arise from approximations made in the calculations, but from the multitude of stereochemical structure possible. Investigations into the variation of the optical rotary dispersion and the circular dichroism as a function of temperature indicated the existence of three or more equilibrium states in the dioxane. The spectra appear to be the summation of the optical activities of the numerous simultaneously possible conformations. It appears that polymers, such as propylene polysulphide or propylene polyoxide do not have stable structures in solution. These are molecules of great flexibility possessing a large number of degrees of freedom. These properties distinguish them from the natural polymers, carrying precise information, such as DNA which must consequently have stable conformations. (author) [fr

  6. Magnetic polymer beads: Recent trends and developments in synthetic design and applications

    KAUST Repository

    Philippova, Olga

    2011-04-01

    The paper describes the synthesis, properties and applications of magnetic polymer beads. State-of-the-art, future challenges, and promising trends in this field are analyzed. New applications in oil recovery are described. © 2010 Elsevier Ltd. All rights reserved.

  7. Magnetic polymer beads: Recent trends and developments in synthetic design and applications

    KAUST Repository

    Philippova, Olga; Barabanova, Anna; Molchanov, Vyacheslav; Khokhlov, Alexei

    2011-01-01

    The paper describes the synthesis, properties and applications of magnetic polymer beads. State-of-the-art, future challenges, and promising trends in this field are analyzed. New applications in oil recovery are described. © 2010 Elsevier Ltd. All rights reserved.

  8. High-throughput experimentation in synthetic polymer chemistry: From RAFT and anionic polymerizations to process development

    NARCIS (Netherlands)

    Guerrero-Sanchez, C.A.; Paulus, R.M.; Fijten, M.W.M.; Mar, de la M.J.; Hoogenboom, R.; Schubert, U.S.

    2006-01-01

    The application of combinatorial and high-throughput approaches in polymer research is described. An overview of the utilized synthesis robots is given, including different parallel synthesizers and a process development robot. In addition, the application of the parallel synthesis robots to

  9. Soft X-ray spectromicroscopy of biological and synthetic polymer systems

    International Nuclear Information System (INIS)

    Hitchcock, A.; Morin, C.; Araki, T.; Zhang, X.; Dynes, J.; Stover, H.; Brash, J.

    2004-01-01

    Full text: Scanning transmission X-ray microscopy (STXM) and X-ray photoemission electron microscopy (X-PEEM) are synchrotron based, soft X-ray spectromicroscopy techniques which provide chemical speciation at 50 nm spatial resolution based on near edge X-ray absorption spectral (NEXAFS) contrast. The instrumentation and techniques of soft X-ray spectro- microscopy will be described and illustrated with applications to wet biofilms, protein interactions with patterned polymer surfaces, and polymer microstructure optimization. STXM can be applied to samples in air, He, vacuum, or a fully hydrated environment. With many collaborators, my group is using STXM to study fundamental and applied aspects of polymer microstructure, to map metal ions and anti-microbial agents in wet biofilms, and to identify sites of selective adsorption of proteins on phase separated polymer thin films in the presence of an overlayer of protein solution. X-PEEM has greater surface sensitivity than STXM but requires a flat, conductive, and vacuum-compatible sample. Comparison of X-PEEM and STXM for the same system - fibrinogen adsorption on a PS:PMMA blend, will be used to illustrate advantages and limitations of each technique. Measurements at 5.3.2 STXM and 7.3.1 PEEM at the Advanced Light Source, funded by DoE under contract DE-AC03- 76SF00098. Research supported by NSERC (Canada), AFMnet (Advanced Food and Biomaterials Network) and the Canada Research Chair program

  10. Studies in Finishing Effects of Clay Mineral in Polymers and Synthetic Fibers

    Directory of Open Access Journals (Sweden)

    Faheem Uddin

    2013-01-01

    Full Text Available The use of clay mineral in modifying the properties of polymeric material is improved in application. The current interest in modifying the polymeric materials, particularly polyethylene, polypropylene, polystyrene, and nylon using clay mineral for improved flame retardancy, thermal stability, peak heat release rate, fracture, and strength properties generated significant research literature. This paper aims to review some of the important recent modification achieved in the performance of polymeric materials using organoclay mineral. Degradation of clay mineral-polymer (nm composite is discussed with appropriate known examples. Clay mineral (nm loading of 5 wt.% to 7 wt.% that was significantly smaller than the percent loading of conventional fillers in polymeric materials introduced significant improvement in terms of thermal and physical stability. An attempt is made to emphasize flammability and thermal stability and to indicate the areas that are relatively little explored in modification of fiber-forming polymers to enhance further research interest.

  11. iBodies: Modular Synthetic Antibody Mimetics Based on Hydrophilic Polymers Decorated with Functional Moieties

    Czech Academy of Sciences Publication Activity Database

    Šácha, Pavel; Knedlík, Tomáš; Schimer, Jiří; Tykvart, Jan; Parolek, Jan; Navrátil, Václav; Dvořáková, Petra; Sedlák, František; Ulbrich, Karel; Strohalm, Jiří; Majer, Pavel; Šubr, Vladimír; Konvalinka, Jan

    2016-01-01

    Roč. 55, č. 7 (2016), s. 2356-2360 ISSN 1433-7851 R&D Projects: GA ČR GBP208/12/G016; GA MŠk LO1302 Institutional support: RVO:61388963 ; RVO:61389013 Keywords : antibody mimetics * HPMA * molecular recognition * polymer conjugates * protein targeting Subject RIV: CE - Biochemistry; CD - Macromolecular Chemistry (UMCH-V) Impact factor: 11.994, year: 2016 http://onlinelibrary.wiley.com/doi/10.1002/anie.201508642/full

  12. The synthesis and characterisation of mucoadhesive polymeric systems using synthetic and natural polymers

    OpenAIRE

    Sarah, Duggan

    2015-01-01

    Mucoadhesion is the binding of a material to a mucosal surface. The mucosal surface has a rate of absorption of up to four times that of the skin and, therefore, has great potential as a route of drug administration. Mucoadhesive polymeric drug delivery devices have been designed to allow for the slow and controlled release of a drug to a specific site, with fewer side effects and greater bioavailability in comparison to other methods of administration. In this project, mucoadhesive polyme...

  13. Development of partially biodegradable foams from PP/HMSPP blends with natural and synthetic polymers

    International Nuclear Information System (INIS)

    Cardoso, Elizabeth Carvalho Leite

    2014-01-01

    Polymers are used in various application and in different industrial areas providing enormous quantities of wastes in environment. Among diverse components of residues in landfills are polymeric materials, including Polypropylene, which contribute with 20 to 30% of total volume of solid residues. As polymeric materials are immune to microbial degradation, they remain in soil and in landfills as a semi-permanent residue. Environmental concerning in litter reduction is being directed to renewable polymers development for manufacturing of polymeric foams. Foamed polymers are considered future materials, with a wide range of applications; high density structural foams are specially used in civil construction, in replacement of metal, woods and concrete with a final purpose of reducing materials costs. At present development, it was possible the incorporation of PP/HMSPP polymeric matrix blends with sugarcane bagasse, PHB and PLA, in structural foams production. Thermal degradation at 100, 120 and 160 deg C temperatures was not enough to induce biodegradability. Gamma irradiation degradation, at 50, 100, 200 and 500 kGy showed effective for biodegradability induction. Irradiated bagasse blends suffered surface erosion, in favor of water uptake and consequently, a higher biodegradation in bulk structure. (author)

  14. Preparation, Characterization and Efficacy Evaluation of Synthetic Biocompatible Polymers Linking Natural Antioxidants

    Directory of Open Access Journals (Sweden)

    Nevio Picci

    2012-10-01

    Full Text Available The purpose of this work was the synthesis, characterization and efficacy evaluation of new biocompatible antioxidant polymers linking trans-ferulic acid or a-lipoic acid. In particular, ferulic or lipoic acid were introduced in the preformed polymeric backbone. The new antioxidant biopolymers were characterized by Fourier transform infrared spectroscopy and gel permeation chromatography. The degree of functionalization (moles of antioxidant per gram of polymer was determined by the Gaur-Gupta method for free amino group determination and by the Folin method for the phenolic groups. Their ability to inhibit lipid peroxidation were estimated in rat liver microsomal membranes induced in vitro by tert-BOOH (tert-butyl hydroperoxide, as a source of free radicals. The DPPH (1,1-diphenyl-2-picrylhydrazyl radical-scavenging effect was also evaluated. The obtained systems, with different solubility, showed strong antioxidant and antiradical activities, suggesting potential use as packaging materials for foods, cosmetics, pharmaceuticals and personal care products. Moreover, the cytotoxicity of the synthesized polymers was also evaluated on Caco-2 cell cultures in order to verify their biocompatibility when exposed to an absorptive epithelial cell line.

  15. Porous organic polymers with anchored aldehydes: A new platform for post-synthetic amine functionalization en route for enhanced CO2 adsorption properties

    KAUST Repository

    Guillerm, Vincent; Weselinski, Lukasz Jan; Al Kordi, Mohamed; Haja Mohideen, Mohamed Infas; Belmabkhout, Youssef; Cairns, Amy; Eddaoudi, Mohamed

    2014-01-01

    A novel porous organic polymer has been synthesized using the molecular building block approach to deliberately encompass aldehyde functionalities amenable to post functionalization. The resultant porous framework allows a facile, one-step quantitative and post-synthetic functionalization by amines, permitting enhanced CO2 sorption properties. © 2014 The Royal Society of Chemistry.

  16. Natural polymers: an overview

    CSIR Research Space (South Africa)

    John, MJ

    2012-08-01

    Full Text Available The scarcity of natural polymers during the world war years led to the development of synthetic polymers like nylon, acrylic, neoprene, styrene-butadiene rubber (SBR) and polyethylene. The increasing popularity of synthetic polymers is partly due...

  17. Inhibition of mild steel corrosion in acidic medium using synthetic and naturally occurring polymers and synergistic halide additives

    Energy Technology Data Exchange (ETDEWEB)

    Umoren, S.A. [Department of Chemistry, Faculty of Science, University of Uyo, P.M.B 1017 Uyo (Nigeria)], E-mail: saviourumoren@yahoo.com; Ogbobe, O.; Igwe, I.O. [Department of Polymer and Textile Engineering, School of Engineering and Engineering Technology, Federal University of Technology, P.M.B. 1526 Owerri (Nigeria); Ebenso, E.E. [Department of Chemistry and Chemical Technology, National University of Lesotho, P. O. Roma180, Lesotho (South Africa)

    2008-07-15

    The corrosion inhibition of mild steel in H{sub 2}SO{sub 4} in the presence of gum arabic (GA) (naturally occurring polymer) and polyethylene glycol (PEG) (synthetic polymer) was studied using weight loss, hydrogen evolution and thermometric methods at 30-60 deg. C. PEG was found to be a better inhibitor for mild steel corrosion in acidic medium than GA. The effect of addition of halides (KCl, KBr and KI) was also studied. Results obtained showed that inhibition efficiency (I%) increased with increase in GA and PEG concentration, addition of halides and with increase in temperature. Increase in inhibition efficiency (I%) and degree of surface coverage ({theta}) was found to follow the trend Cl{sup -} < Br{sup -} < I{sup -} which indicates that the radii and electronegativity of the halide ions play a significant role in the adsorption process. GA and PEG alone and in combination with halides were found to obey Temkin adsorption isotherm. Phenomenon of chemical adsorption is proposed from the trend of inhibition efficiency with temperature and values {delta}G{sub ads}{sup 0} obtained. The synergism parameter, S{sub I} evaluated is found to be greater than unity indicating that the enhanced inhibition efficiency caused by the addition of halides is only due to synergism.

  18. Reverse adhesion of a gecko-inspired synthetic adhesive switched by an ion-exchange polymer-metal composite actuator.

    Science.gov (United States)

    Guo, Dong-Jie; Liu, Rui; Cheng, Yu; Zhang, Hao; Zhou, Li-Ming; Fang, Shao-Ming; Elliott, Winston Howard; Tan, Wei

    2015-03-11

    Inspired by how geckos abduct, rotate, and adduct their setal foot toes to adhere to different surfaces, we have developed an artificial muscle material called ion-exchange polymer-metal composite (IPMC), which, as a synthetic adhesive, is capable of changing its adhesion properties. The synthetic adhesive was cast from a Si template through a sticky colloid precursor of poly(methylvinylsiloxane) (PMVS). The PMVS array of setal micropillars had a high density of pillars (3.8 × 10(3) pillars/mm(2)) with a mean diameter of 3 μm and a pore thickness of 10 μm. A graphene oxide monolayer containing Ag globular nanoparticles (GO/Ag NPs) with diameters of 5-30 nm was fabricated and doped in an ion-exchanging Nafion membrane to improve its carrier transfer, water-saving, and ion-exchange capabilities, which thus enhanced the electromechanical response of IPMC. After being attached to PMVS micropillars, IPMC was actuated by square wave inputs at 1.0, 1.5, or 2.0 V to bend back and forth, driving the micropillars to actively grip or release the surface. To determine the adhesion of the micropillars, the normal adsorption and desorption forces were measured as the IPMC drives the setal micropillars to grip and release, respectively. Adhesion results demonstrated that the normal adsorption forces were 5.54-, 14.20-, and 23.13-fold higher than the normal desorption forces under 1.0, 1.5, or 2.0 V, respectively. In addition, shear adhesion or friction increased by 98, 219, and 245%, respectively. Our new technique provides advanced design strategies for reversible gecko-inspired synthetic adhesives, which might be used for spiderman-like wall-climbing devices with unprecedented performance.

  19. Synthetic approaches towards new polymer systems by the combination of living carbocationic and anionic polymerizations

    DEFF Research Database (Denmark)

    Feldthusen, Jesper; Ivan, Bela; Muller, Axel. H.E.

    1996-01-01

    Recent efforts to obtain block copolymers by combination of living carbocationic and anionic polymerizations are presented.When tolyl-ended polyisobutylene was used as macroinitiator of anionic polymerization of methacrylate derivatives mixtures of homopolymers and block copolymers were formed due...... to incomplete lithiation of this chain end.In another approach a new functionalization method was developed by end-quenching living polyisobutylene with 1,1-diphenylethylene. After transformation of the groups into 2,2-diphenylvinyl end groups and lithiation polymers were synthesized from protected acrylate...

  20. Surface chemical immobilization of bioactive peptides on synthetic polymers for cardiac tissue engineering.

    Science.gov (United States)

    Rosellini, Elisabetta; Cristallini, Caterina; Guerra, Giulio D; Barbani, Niccoletta

    2015-01-01

    The aim of this work was the development of new synthetic polymeric systems, functionalized by surface chemical modification with bioactive peptides, for myocardial tissue engineering. Polycaprolactone and a poly(ester-ether-ester) block copolymer synthesized in our lab, polycaprolactone-poly(ethylene oxide)-polycaprolactone (PCL-PEO-PCL), were used as the substrates to be modified. Two pentapeptides, H-Gly-Arg-Gly-Asp-Ser-OH (GRGDS) from fibronectin and H-Tyr-Ile-Gly-Ser-Arg-OH (YIGSR) from laminin, were used for the functionalization. Polymeric membranes were obtained by casting from solutions and then functionalized by means of alkaline hydrolysis and subsequent coupling of the bioactive molecules through 1-(3-dimethylaminopropyl)-3-ethylcarbodimide hydrochloride/N-hydroxysuccinimide chemistry. The hydrolysis conditions, in terms of hydrolysis time, temperature, and sodium hydroxide concentration, were optimized for the two materials. The occurrence of the coupling reaction was demonstrated by infrared spectroscopy, as the presence on the functionalized materials of the absorption peaks typical of the two peptides. The peptide surface density was determined by chromatographic analysis and the distribution was studied by infrared chemical imaging. The results showed a nearly homogeneous peptide distribution, with a density above the minimum value necessary to promote cell adhesion. Preliminary in vitro cell culture studies demonstrated that the introduction of the bioactive molecules had a positive effect on improving C2C12 myoblasts growth on the synthetic materials.

  1. RELEASE AND MUCOADHESION PROPERTIES OF DICLOFENAC MATRIX TABLETS FROM NATURAL AND SYNTHETIC POLYMER BLENDS.

    Science.gov (United States)

    Odeniyi, Michael A; Khan, Nasir H; Peh, Kok K

    2015-01-01

    The delayed release and mucoadhesive properties of Cedrela gum and hydroxypropylmethylcellulose blend in diclofenac sodium tablet formulations were evaluated. Tablets were prepared by direct compression and the crushing strength and detachment force were found to increase from 74.49 ± 1.22 to 147.25 ± 2.57 N and 0.302 ± 0.36 to 1.141 ± 0.05 N from low to high level of polymers, respectively. The release kinetics followed Korsmeyer-Peppas release and the n varied between 0.834 and 1.273, indicating that the release mechanism shifts from Fickian to super case I (anomalous release). The drug release profile fits a pulsatile-release pattern characterized by a lag time followed by a more or less rapid and complete drug release. The Cedrela gum-hydroxypropylmethylcelluse blend tablets delayed diclofenac release for 2 h and sustained the release for 12 h. The polymer blend delayed drug release in the 0.1 M HCl simulating gastric environment and subsequent release pH 6.8 phosphate buffer.

  2. A Comprehensive Study on Fast Dispersible and Slow-Releasing Characteristic of Orange Peel Pectin in Relation to Established Synthetic Polymer.

    Science.gov (United States)

    Srivastava, Pranati; Singh, Mahendra; Bhargava, Shilpi

    2017-10-01

    In the present work, the method to extract, isolate, and characterize orange peel pectin using soxhlation, and thereafter, the use of this polymer-polymer in the formulation of fast dispersable and slow-releasing tablet has been studied. Thereafter, the evaluation and comparison of fast dispersible/slow-releasing tablets using orange peel pectin versus prepared using sodium starch glycolate (SSG) were carried out. In the present investigation, extraction methodology was employed for isolation of pectin from orange peels. Four different batches with each polymer were prepared with varying concentration of superdisintegrant and bulking agent using diclofenac sodium as model drug. Diclofenac sodium stands as easily available, cheap, and good candidate to demonstrate disintegrant property. The formulation involved wet granulation method for the preparation of tablets of each batch. The tablets were evaluated for hardness, friability, thickness, wetting time, deaggregation time, and in vitro release characteristic data. It was observed that parameters for batch O2* were comparable with that of synthetic superdisintegrant. This batch gave around 92.12% drug release in period of 90 min. The study showed that orange peel pectin could be a potential candidate for formulation of orodispersible dosage forms in competence to SSG, which is established superdisintegrant. The results led to the conclusion that the use of natural polymers in formulation of pharmaceutical dosage form can be put into practice on industrial scale meeting the similar requirements as done by synthetic polymers. The present work aims to demonstrate and establish the use of naturally derived polymer, i.e., orange peel pectin as a superdisintegrant. The extraction methodology has been discussed followed by comparative analysis with a synthetic polymer. Abbreviations used: O1-O2: Batches Containing Orange peel pectin, S1-S2: Batches containing SSG, SSG: Sodium starch glycolate, NDDS: Novel drug delivery

  3. Poly (ether ether ketone) derivatives: Synthetic route and characterization of nitrated and sulfonated polymers

    International Nuclear Information System (INIS)

    Conceicao, T.F.; Bertolino, J.R.; Barra, G.M.O.; Pires, A.T.N.

    2009-01-01

    Nitrated and sulfonated poly (ether ether ketone) [SNPEEK] samples were prepared through sulfonation of nitrated PEEK (NPEEK) at different temperatures resulting in polymers with distinct sulfonation degrees (SD). The sulfonation occurred preferentially in the hydroquinone segment even after 81% of this moiety had been nitrated. Sulfonation in the benzophenone moiety was achieved only in 16% of this segment at the reaction temperature of 80 deg. C. The substitution degree was obtained through the TG curves, and values were in agreement with 1 H NMR data when SD is much higher as ND (nitration degree). The highest SD obtained was 72%. Membranes of the sulfonated and nitrated PEEK (SNPEEK) were prepared by casting and showed good ductility depending on the substitution degree, with proton conductivity in the order of 10 -2 S cm -1 , an important characteristic in some applications, such as in fuel cells

  4. The equilibrium sedimentation of hyaluronic acid and of two synthetic polymers

    Science.gov (United States)

    Nichol, L. W.; Ogston, A. G.; Preston, B. N.

    1967-01-01

    1. The method of equilibrium sedimentation has been investigated as an alternative to osmotic-pressure measurement for determining thermodynamic properties of polymer solutions at relatively high concentrations. 2. The simplifications that must be made in the theoretical treatment are discussed. 3. Measurements have been made on samples of polyethylene glycol, neutralized polymethacrylic acid and hyaluronic acid. With the first and third, values of the `non-ideality coefficients' have been obtained that agree with those obtained from osmotic measurements on the same materials. 4. Evidence has been obtained of the presence in hyaluronic acid preparations of a fraction that has either a lower degree of thermodynamic non-ideality or a higher density increment than the bulk of the sample. This fraction is not protein. ImagesFig. 3.Fig. 4.Fig. 5.Fig. 7.Fig. 8.Fig. 9.Fig. 11.Fig. 12.Fig. 13.Fig. 14. PMID:6029600

  5. Poly (ether ether ketone) derivatives: Synthetic route and characterization of nitrated and sulfonated polymers

    Energy Technology Data Exchange (ETDEWEB)

    Conceicao, T.F.; Bertolino, J.R. [Grupo de Estudo em Materiais Polimericos-Departamento de Quimica, Universidade Federal de Santa Catarina, Florianopolis, SC (Brazil); Barra, G.M.O. [Departamento de Engenharia Mecanica, Universidade Federal de Santa Catarina, Florianopolis, SC (Brazil); Pires, A.T.N. [Grupo de Estudo em Materiais Polimericos-Departamento de Quimica, Universidade Federal de Santa Catarina, Florianopolis, SC (Brazil)], E-mail: alfredotiburcio@pq.cnpq.br

    2009-03-01

    Nitrated and sulfonated poly (ether ether ketone) [SNPEEK] samples were prepared through sulfonation of nitrated PEEK (NPEEK) at different temperatures resulting in polymers with distinct sulfonation degrees (SD). The sulfonation occurred preferentially in the hydroquinone segment even after 81% of this moiety had been nitrated. Sulfonation in the benzophenone moiety was achieved only in 16% of this segment at the reaction temperature of 80 deg. C. The substitution degree was obtained through the TG curves, and values were in agreement with {sup 1}H NMR data when SD is much higher as ND (nitration degree). The highest SD obtained was 72%. Membranes of the sulfonated and nitrated PEEK (SNPEEK) were prepared by casting and showed good ductility depending on the substitution degree, with proton conductivity in the order of 10{sup -2} S cm{sup -1}, an important characteristic in some applications, such as in fuel cells.

  6. Radiation synthesis and characterisation of the network structure of natural/synthetic double-network superabsorbent polymers

    International Nuclear Information System (INIS)

    Şen, Murat; Hayrabolulu, Hande

    2012-01-01

    In this study radiation synthesis and characterisation of the network structure of acrylic acid sodium salt/locust bean gum, (AAcNa/LBG) natural/synthetic double-network super absorbent polymers were investigated. Quartet systems composed of acrylic acid sodium salt/locust bean gum/N,N methylene bis acrylamide/water (AAcNa/LBG/MBAAm/water) were prepared at varying degree of neutralisations (DN) by controlling the DN value of AAc and irradiated with gamma rays at ambient temperature at a very low dose rate. The influences of the DN on the swelling and network properties were examined. It was observed that the DN strongly affected the gelation and super absorption properties of the gels. Molecular weight between crosslinks (M ¯ c ), effective crosslink density (ν e ) and mesh size (ξ) of SAPs were calculated from swelling and shear modules data obtained from compression and oscillatory frequency sweep tests. M ¯ c values obtained from the uniaxial deformation experiments were very close to those obtained from the oscillatory shear experiments excluding the completely neutralised gel system. It was concluded that the uniaxial compression technique could be used for the characterisation of the network structure of a hydrogel as along with the rheological analyses; however, a very precise control of the gel size was also needed. - Highlights: ► Radiation synthesis and characterisation of AAcNa/LBG super absorbent polymers described. ► Influences of the DN on the swelling and network properties were examined. ► Molecular weight between crosslinks and effective crosslink density of SAPs were calculated. ► Suitability of rheology technique for the characterisation of hydrogels were demonstrated.

  7. Molecular dynamics modeling the synthetic and biological polymers interactions pre-studied via docking: anchors modified polyanions interference with the HIV-1 fusion mediator.

    Science.gov (United States)

    Tsvetkov, Vladimir B; Serbin, Alexander V

    2014-06-01

    In previous works we reported the design, synthesis and in vitro evaluations of synthetic anionic polymers modified by alicyclic pendant groups (hydrophobic anchors), as a novel class of inhibitors of the human immunodeficiency virus type 1 (HIV-1) entry into human cells. Recently, these synthetic polymers interactions with key mediator of HIV-1 entry-fusion, the tri-helix core of the first heptad repeat regions [HR1]3 of viral envelope protein gp41, were pre-studied via docking in terms of newly formulated algorithm for stepwise approximation from fragments of polymeric backbone and side-group models toward real polymeric chains. In the present article the docking results were verified under molecular dynamics (MD) modeling. In contrast with limited capabilities of the docking, the MD allowed of using much more large models of the polymeric ligands, considering flexibility of both ligand and target simultaneously. Among the synthesized polymers the dinorbornen anchors containing alternating copolymers of maleic acid were selected as the most representative ligands (possessing the top anti-HIV activity in vitro in correlation with the highest binding energy in the docking). To verify the probability of binding of the polymers with the [HR1]3 in the sites defined via docking, various starting positions of polymer chains were tried. The MD simulations confirmed the main docking-predicted priority for binding sites, and possibilities for axial and belting modes of the ligands-target interactions. Some newly MD-discovered aspects of the ligand's backbone and anchor units dynamic cooperation in binding the viral target clarify mechanisms of the synthetic polymers anti-HIV activity and drug resistance prevention.

  8. Improving the drug delivery characteristics of graphene oxide based polymer nanocomposites through the “one-pot” synthetic approach of single-electron-transfer living radical polymerization

    Energy Technology Data Exchange (ETDEWEB)

    Gao, Peng; Liu, Meiying; Tian, Jianwen; Deng, Fengjie [Department of Chemistry, Nanchang University, 999 Xuefu Avenue, Nanchang 330031 (China); Wang, Ke [Department of Chemistry and the Tsinghua Center for Frontier Polymer Research, Tsinghua University, Beijing 100084 (China); Xu, Dazhuang [Department of Chemistry, Nanchang University, 999 Xuefu Avenue, Nanchang 330031 (China); Liu, Liangji [Affiliated Hospital of Jiangxi University of Traditional Chinese Medicine, Nanchang 330006 (China); Zhang, Xiaoyong, E-mail: xiaoyongzhang1980@gmail.com [Department of Chemistry, Nanchang University, 999 Xuefu Avenue, Nanchang 330031 (China); Wei, Yen, E-mail: weiyen@tsinghua.edu.cn [Department of Chemistry and the Tsinghua Center for Frontier Polymer Research, Tsinghua University, Beijing 100084 (China)

    2016-08-15

    Graphical abstract: The PEGylated graphene oxides with high water dispersibility, good biocompatibility as well as high drug loading capability were fabricated via “one-pot” SET-LRP. - Highlights: • Surface modification of graphene oxide with polymers. • One-pot single-electron-transfer living radical polymerization. • Improving drug delivery characteristics. • The synthetic approach is rather simple, universal and effective. - Abstract: Graphene oxide (GO) based polymer nanocomposites have attracted extensive research interest recently for their outstanding physicochemical properties and potential applications. However, surface modification of GO with synthetic polymers has demonstrated to be trouble for most polymerization procedures are occurred under non-aqueous solution, which will in turn lead to the restacking of GO. In this work, a facile and efficient “one-pot” strategy has been developed for surface modification of GO with synthetic polymers through single-electron-transfer living radical polymerization (SET-LRP). The GO based polymer nanocomposites were obtained via SET-LRP in aqueous solution using poly(ethylene glycol) methyl ether methacrylate (PEGMA) as the monomer and 11-bromoundecanoic acid as the initiator, which could be effectively adsorbed on GO through hydrophobic interaction. The successful preparation of GO based polymer nanocomposites was confirmed by a series of characterization techniques such as {sup 1}H nuclear magnetic resonance, Fourier transform infrared spectroscopy, thermogravimetric analysis, transmission electron microscopy and X-ray photoelectron spectroscopy. The resultant products exhibit high water disperisibility, excellent biocompatibility and high efficient drug loading capability, making these PEGylated GO nanocomposites promising candidates for biomedical applications.

  9. Oxidative degradation processes in synthetic and biological polymers as studied by pulse radiolysis experiments

    International Nuclear Information System (INIS)

    Schnabel, W.

    1986-01-01

    On the basis of pulse radiolysis experiments carried out with various polymers in dilute solution three modes of action of molecular oxygen, O 2 can be discriminated with respect to main-chain scission: (a) O 2 acts as a promoter, (b) O 2 acts as an inhibitor, and (c) O 2 acts as a fixing agent for main-chain breaks. The promoting mode of action (a) is due to the inhibition of simultaneously occurring intermolecular crosslinking and/or to the combination of peroxyl radicals with the subsequent formation of readily decomposing oxyl radicals. The inhibiting mode of action (b) pertains to the reaction of O 2 with macroradicals that otherwise undergo main-chain rupture. Fixing of main-chain ruptures (mode c) becomes important if macroradicals generated by a very fast rupture of bonds in the main chain are prone to recombine quickly. This mode of action was evidenced in the case of polybutenesulfone, where main-chain scission involves the extrusion of small segments of the chain. (author)

  10. Synthetic Polymers at Interfaces: Monodisperse Emulsions Multiple Emulsions and Liquid Marbles

    Science.gov (United States)

    Sun, Guanqing

    The adsorption of polymeric materials at interfaces is an energetically favorable process which is investigated in much diversified fields, such as emulsions, bubbles, foams, liquid marbles. Pickering emulsion, which is emulsion stabilized by solid particles has been investigated for over one century and preparation of Pickering emulsion with narrow size distribution is crucial for both the theoretical study of the stabilization mechanism and practical application, such as templated fabrication of colloidosomes. The precise control over the size and functionality of polymer latices allows the preparation of monodisperse Pickering emulsions with desired sizes through SPG membrane emulsification at rather rapid rate compared to microfludic production. Double or multiple emulsions have long been investigated but its rapid destabilization has always been a major obstacle in applying them into practical applications. The modern living polymerization techniques allow us to prepare polymers with designed structure of block copolymers which makes it possible to prepare ultra-stable multiple emulsions. The precise tuning of the ratio of hydrophobic part over the hydrophilic can unveil the stabilization mechanism. Liquid marble is a new type of materials of which liquid droplets are coated by dry particles. The coating of an outer layer of dry particles renders the liquid droplets non-sticky at solid surface which is useful in transportation of small amount of liquid without leakage at extreme low friction force. The property of liquid marbles relies largely on the stabilizers and the drying condition of polymeric latices is shown to have great influence on the property of liquid marbles. Firstly, an introduction to the interfacial and colloidal science with special attention to topics on emulsions, multiple emulsion and liquid marbles is given in Chapter 1. The unique features of an interface and a discussion on the definition of colloids are introduced prior to the

  11. Generation of live offspring from vitrified embryos with synthetic polymers SuperCool X-1000 and SuperCool Z-1000.

    Science.gov (United States)

    Marco-Jimenez, F; Jimenez-Trigos, E; Lavara, R; Vicente, J S

    2014-01-01

    Ice growth and recrystallisation are considered important factors in determining vitrification outcomes. Synthetic polymers inhibit ice formation during cooling or warming of the vitrification process. The aim of this study was to assess the effect of adding commercially available synthetic polymers SuperCool X-1000 and SuperCool Z-1000 to vitrification media on in vivo development competence of rabbit embryos. Four hundred and thirty morphologically normal embryos recovered at 72 h of gestation were used. The vitrification media contained 20% dimethyl sulphoxide and 20% ethylene glycol, either alone or in combination with 1% of SuperCool X-1000 and 1% SuperCool. Our results show that embryos can be successfully vitrified using SuperCool X-1000 and SuperCool Z-1000 and when embryos are transferred, live offspring can be successfully produced. In conclusion, our results demonstrated that we succeeded for the first time in obtaining live offspring after vitrification of embryos using SuperCool X-1000 and SuperCool Z-1000 polymers.

  12. Nanoencapsulation of Aloe vera in Synthetic and Naturally Occurring Polymers by Electrohydrodynamic Processing of Interest in Food Technology and Bioactive Packaging.

    Science.gov (United States)

    Torres-Giner, Sergio; Wilkanowicz, Sabina; Melendez-Rodriguez, Beatriz; Lagaron, Jose M

    2017-06-07

    This work originally reports on the use of electrohydrodynamic processing (EHDP) to encapsulate Aloe vera (AV, Aloe barbadensis Miller) using both synthetic polymers, i.e., polyvinylpyrrolidone (PVP) and poly(vinyl alcohol) (PVOH), and naturally occurring polymers, i.e., barley starch (BS), whey protein concentrate (WPC), and maltodextrin. The AV leaf juice was used as the water-based solvent for EHDP, and the resultant biopolymer solution properties were evaluated to determine their effect on the process. Morphological analysis revealed that, at the optimal processing conditions, synthetic polymers mainly produced fiber-like structures, while naturally occurring polymers generated capsules. Average sizes ranged from 100 nm to above 3 μm. As a result of their different and optimal morphology and, hence, higher AV content, PVP, in the form of nanofibers, and WPC, of nanocapsules, were further selected to study the AV stability against ultraviolet (UV) light exposure. Fourier transform infrared (FTIR) spectroscopy confirmed the successful encapsulation of AV in the biopolymer matrices, presenting both encapsulants a high chemical interaction with the bioactive components. Ultraviolet-visible (UV-vis) spectroscopy showed that, while PVP nanofibers offered a poor effect on the AV degradation during UV light exposure (∼10% of stability after 5 h), WPC nanobeads delivered excellent protection (stability of >95% after 6 h). This was ascribed to positive interactions between WPC and the hydrophilic components of AV and the inherent UV-blocking and oxygen barrier properties provided by the protein. Therefore, electrospraying of food hydrocolloids interestingly appears as a novel potential nanotechnology tool toward the formulation of more stable functional foods and nutraceuticals.

  13. Leachability of boron from wood treated with natural and semi-synthetic polymers and calcium precipitating agent

    Science.gov (United States)

    S. N. Kartal; F. Green

    2003-01-01

    Several fixation systems to limit or decrease boron leachability from treated wood have been developed. Some attempts have relied on limiting of water penetration of treated wood using water repellents, monomer and polymer systems. On the other hand, non-toxic polymers such as proteins were tried to reduce amount of boron leached from wood (Thevenon et al. 1997, 1998...

  14. Tailored Polymer-Supported Templates in Dynamic Combinatorial Libraries : Simultaneous Selection, Amplification and Isolation of Synthetic Receptors

    NARCIS (Netherlands)

    Besenius, Pol; Cormack, Peter A.G.; Liu, Jingyuan; Otto, Sijbren; Sanders, Jeremy K.M.; Sherrington, David C.

    2008-01-01

    The thermodynamically controlled synthesis and isolation of macrocyclic receptors from dynamic combinatorial libraries has been achieved in a single step using a polymer-supported template. The templates were cinchona alkaloids which show interesting enantio- and diastereoselective molecular

  15. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    2010-01-01

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion...... of attack surfaces of the cloud computing scenario participants....

  16. Synthetic surfactant- and cross-linker-free preparation of highly stable lipid-polymer hybrid nanoparticles as potential oral delivery vehicles.

    Science.gov (United States)

    Wang, Taoran; Xue, Jingyi; Hu, Qiaobin; Zhou, Mingyong; Chang, Chao; Luo, Yangchao

    2017-06-05

    The toxicity associated with concentrated synthetic surfactants and the poor stability at gastrointestinal condition are two major constraints for practical applications of solid lipid nanoparticles (SLN) as oral delivery vehicles. In this study, a synthetic surfactant-free and cross-linker-free method was developed to fabricate effective, safe, and ultra-stable lipid-polymer hybrid nanoparticles (LPN). Bovine serum albumin (BSA) and dextran varying in molecular weights were first conjugated through Maillard reaction and the conjugates were exploited to emulsify solid lipid by a solvent diffusion and sonication method. The multilayer structure was formed by self-assembly of BSA-dextran micelles to envelope solid lipid via a pH- and heating-induced facile process with simultaneous surface deposition of pectin. The efficiency of different BSA-dextran conjugates was systematically studied to prepare LPN with the smallest size, the most homogeneous distribution and the greatest stability. The molecular interactions were characterized by Fourier transform infrared and fluorescence spectroscopies. Both nano spray drying and freeze-drying methods were tested to produce spherical and uniform pectin-coated LPN powders that were able to re-assemble nanoscale structure when redispersed in water. The results demonstrated the promise of a synthetic surfactant- and cross-linker-free technique to prepare highly stable pectin-coated LPN from all natural biomaterials as potential oral delivery vehicles.

  17. Synthetic staggered architecture composites

    International Nuclear Information System (INIS)

    Dutta, Abhishek; Tekalur, Srinivasan Arjun

    2013-01-01

    Highlights: ► Composite design inspired by nature. ► Tuning microstructure via changing ceramic content and aspect ratio. ► Experimental display of structure–property correlationship in synthetic composites. - Abstract: Structural biocomposites (for example, nacre in seashells, bone, etc.) are designed according to the functional role they are delegated for. For instance, bone is primarily designed for withstanding time-dependent loading (for example, withstanding stresses while running, jumping, accidental fall) and hence the microstructure is designed primarily from enhanced toughness and moderate stiffness point of view. On the contrary, seashells (which lie in the abyss of oceans) apart from providing defense to the organism (it is hosting) against predatory attacks, are subjected to static loading (for example, enormous hydrostatic pressure). Hence, emphasis on the shell structure evolution is directed primarily towards providing enhanced stiffness. In order to conform between stiffness and toughness, nature precisely employs a staggered arrangement of inorganic bricks in a biopolymer matrix (at its most elementary level of architecture). Aspect ratio and content of ceramic bricks are meticulously used by nature to synthesize composites having varying degrees of stiffness, strength and toughness. Such an amazing capability of structure–property correlationship has rarely been demonstrated in synthetic composites. Therefore, in order to better understand the mechanical behavior of synthetic staggered composites, the problem becomes two-pronged: (a) synthesize composites with varying brick size and contents and (b) experimental investigation of the material response. In this article, an attempt has been made to synthesize and characterize staggered ceramic–polymer composites having varying aspect ratio and ceramic content using freeze-casting technique. This will in-turn help us in custom-design manufacture of hybrid bio-inspired composite materials

  18. Evaluation of synthetic water-soluble metal-binding polymers with ultrafiltration for selective concentration of americium and plutonium

    International Nuclear Information System (INIS)

    Smith, B.F.; Gibson, R.R.; Jarvinen, G.D.; Jones, M.M.; Lu, M.T.; Robison, T.W.; Schroeder, N.C.; Stalnaker, N.

    1997-01-01

    Routine counting methods and ICP-MS are unable to directly measure the new US Department of Energy (DOE) regulatory level for discharge waters containing alpha-emitting radionuclides of 30 pCi/L total alpha or the 0.05 pCi/L regulatory level for Pu or Am activity required for surface waters at the Rocky Flats site by the State of Colorado. This inability indicates the need to develop rapid, reliable, and robust analytical techniques for measuring actinide metal ions, particularly americium and plutonium. Selective separation or preconcentration techniques would aid in this effort. Water-soluble metal-binding polymers in combination with ultrafiltration are shown to be an effective method for selectively removing dilute actinide ions from acidic solutions of high ionic strength. The actinide-binding properties of commercially available water-soluble polymers and several polymers which have been reported in the literature were evaluated. The functional groups incorporated in the polymers were pyrrolidone, amine, oxime, and carboxylic, phosphonic, or sulfonic acid. The polymer containing phosphonic acid groups gave the best results with high distribution coefficients and concentration factors for 241 Am(III) and 238 Pu(III)/(IV) at pH 4 to 6 and ionic strengths of 0.1 to 4

  19. Heart Attack

    Science.gov (United States)

    ... properly causes your body's blood sugar levels to rise, increasing your risk of heart attack. Metabolic syndrome. This occurs when you have obesity, high blood pressure and high blood sugar. Having metabolic ...

  20. Heart Attack

    Science.gov (United States)

    ... family history of heart attack race – African Americans, Mexican Americans, Native Americans, and native Hawaiians are at ... Your doctor will prescribe the medicines that are right for you. If you have had a heart ...

  1. Synthetic biocompatible polymers are an effective delivery platform that elicits potent antibody responses against HIV-1 glycopeptide immunogens

    Czech Academy of Sciences Publication Activity Database

    Francica, J.; Lynn, G.; Laga, Richard; Aussedat, B.; Meyerhoff, R.; Alam, M.; Danishefsky, S.; Haynes, B.; Seder, R.

    2016-01-01

    Roč. 32, Supplement 1 (2016), s. 221-P07.27 ISSN 0889-2229. [Conference on HIV Research for Prevention - HIV R4P. 17.10.2016-21.10.2016, Chicago] Institutional support: RVO:61389013 Keywords : biocompatible polymers * druh delivery Subject RIV: CD - Macromolecular Chemistry

  2. Independent assessment of matrix-assisted laser desorption/ionization mass spectrometry (MALDI-MS) sample preparation quality : Effect of sample preparation on MALDI-MS of synthetic polymers

    NARCIS (Netherlands)

    Kooijman, Pieter C.; Kok, Sander; Honing, Maarten

    2017-01-01

    Rationale: Matrix-assisted laser desorption/ionization mass spectrometry (MALDI-MS) provides detailed and in-depth information about the molecular characteristics of synthetic polymers. To obtain the most accurate results the sample preparation parameters should be chosen to suit the sample and the

  3. Rapid, nondestructive estimation of surface polymer layer thickness using attenuated total reflection fourier transform infrared (ATR FT-IR) spectroscopy and synthetic spectra derived from optical principles.

    Science.gov (United States)

    Weinstock, B André; Guiney, Linda M; Loose, Christopher

    2012-11-01

    We have developed a rapid, nondestructive analytical method that estimates the thickness of a surface polymer layer with high precision but unknown accuracy using a single attenuated total reflection Fourier transform infrared (ATR FT-IR) measurement. Because the method is rapid, nondestructive, and requires no sample preparation, it is ideal as a process analytical technique. Prior to implementation, the ATR FT-IR spectrum of the substrate layer pure component and the ATR FT-IR and real refractive index spectra of the surface layer pure component must be known. From these three input spectra a synthetic mid-infrared spectral matrix of surface layers 0 nm to 10,000 nm thick on substrate is created de novo. A minimum statistical distance match between a process sample's ATR FT-IR spectrum and the synthetic spectral matrix provides the thickness of that sample. We show that this method can be used to successfully estimate the thickness of polysulfobetaine surface modification, a hydrated polymeric surface layer covalently bonded onto a polyetherurethane substrate. A database of 1850 sample spectra was examined. Spectrochemical matrix-effect unknowns, such as the nonuniform and molecularly novel polysulfobetaine-polyetherurethane interface, were found to be minimal. A partial least squares regression analysis of the database spectra versus their thicknesses as calculated by the method described yielded an estimate of precision of ±52 nm.

  4. Synthetic biology, inspired by synthetic chemistry.

    Science.gov (United States)

    Malinova, V; Nallani, M; Meier, W P; Sinner, E K

    2012-07-16

    The topic synthetic biology appears still as an 'empty basket to be filled'. However, there is already plenty of claims and visions, as well as convincing research strategies about the theme of synthetic biology. First of all, synthetic biology seems to be about the engineering of biology - about bottom-up and top-down approaches, compromising complexity versus stability of artificial architectures, relevant in biology. Synthetic biology accounts for heterogeneous approaches towards minimal and even artificial life, the engineering of biochemical pathways on the organismic level, the modelling of molecular processes and finally, the combination of synthetic with nature-derived materials and architectural concepts, such as a cellular membrane. Still, synthetic biology is a discipline, which embraces interdisciplinary attempts in order to have a profound, scientific base to enable the re-design of nature and to compose architectures and processes with man-made matter. We like to give an overview about the developments in the field of synthetic biology, regarding polymer-based analogs of cellular membranes and what questions can be answered by applying synthetic polymer science towards the smallest unit in life, namely a cell. Copyright © 2012 Federation of European Biochemical Societies. Published by Elsevier B.V. All rights reserved.

  5. Structural study of synthetic polymers by MALDI-TOFMS; MALDI-TOFMS ni yoru gosei kobunshi no kozo kaiseki

    Energy Technology Data Exchange (ETDEWEB)

    Noguchi, K.; Hirayama, K. [Ajinomoto Co. Inc., Tokyo (Japan)

    1998-08-01

    As observation results on the time-dependent change in the ring-opening reaction of novolac epoxy resin with acetic acid by MALDI-TOFMS, the epoxy ring was opened with reaction time, the hydroxy group formed by the ring-opening reaction was acetylated, those components were measured. In the case of the FABMS/MS observation of materials and the reaction products, the estimation structure could be confirmed from the measured results of MALDI-TOFMS. In the polymerization of bisphenol A epoxy resin with N, N`-dimethylethylenediamine, it was observed by MALDI-TOFMS that many kinds of polymers with high molecular weight were formed with an increase of reaction time. In this case, the LSIMS/MS observation of materials and the reaction products was carried out, the estimation structure could be confirmed from the measured results of MALDI-TOFMS. 19 refs., 8 figs.

  6. The anti-calcification potential of a silsesquioxane nanocomposite polymer under in vitro conditions: potential material for synthetic leaflet heart valve.

    Science.gov (United States)

    Ghanbari, Hossein; Kidane, Asmeret G; Burriesci, Gaetano; Ramesh, Bala; Darbyshire, Arnold; Seifalian, Alexander M

    2010-11-01

    Calcification currently represents a major cause of failure of biological tissue heart valves. It is a complex phenomenon influenced by a number of biochemical and mechanical factors. Recent advances in material science offer new polymers with improved properties, potentially suitable for synthetic leaflets heart valves manufacturing. In this study, the calcification-resistance efficacy and mechanical and surface properties of a new nanocomposite polymeric material (polyhedral oligomeric silsesquioxane-poly(carbonate-urea)urethane; POSS-PCU) which has been developed by our group are assessed by means of in vitro testing. In particular, thin sheets of nanocomposite, glutaraldehyde-fixed bovine pericardium (BP) and polyurethane (PU) were exposed to a calcium solution into a specially designed in vitro accelerated physiological pulsatile pressure system for a period of 31days and a total of 4×10(7) cycles. The samples were investigated for signs of calcification after exposure to calcium solution by means of X-ray, microscopic and chemical inspections. Mechanical and surface properties were also studied using stress-strain behaviour and surface morphology and hydrophobicity. Comparison shows that, in the experimental conditions, the level of calcification for the nanocomposite is considerably lower than for the fixed BP (p=0.008) and PU samples (p=0.015). Also, mechanical properties were unchanged in POSS-PCU, while there was a significant deterioration in PU samples (pnanocomposite remained more hydrophobic than the PU sample (pnanocomposite in synthetic leaflets heart valves may lead to potential advantages in terms of long-term performances and durability. Copyright © 2010. Published by Elsevier Ltd.

  7. Combined Effect of Synthetic and Natural Polymers in Preparation of Cetirizine Hydrochloride Oral Disintegrating Tablets: Optimization by Central Composite Design.

    Science.gov (United States)

    Patro, Chandra Sekhar; Sahu, Prafulla Kumar

    2017-01-01

    Our aim was to employ experimental design to formulate and optimize cetirizine hydrochloride oral disintegrating tablets (ODTs) by direct compression technique, using the mutual effect of synthetic croscarmellose sodium (CCS) and natural Hibiscus rosa-sinensis mucilage (HRM) as disintegrants in the formulation. Central composite design (CCD) was applied to optimize the influence of three levels each of CCS ( X 1 ) and HRM ( X 2 ) concentrations (independent variables) for investigated responses: disintegration time (DT) ( Y 1 ), % friability ( F ) ( Y 2 ), and % cumulative drug release (DR) ( Y 3 ) (dependent variables). This face-centered second-order model's reliability was verified by the probability and adequate precision values from the analysis of variance, while the significant factor effects influencing the studied responses were identified using multiple linear regression analysis. Perturbation and response surface plots were interpreted to evaluate the responses' sensitivity towards the variables. During optimization, the concentrations of the processed factors were evaluated, and the resulting values were in good agreement with predicted estimates endorsing the validity. Spectral study by Fourier Transform Infrared Spectroscopy (FTIR) and thermograms from Differential Scanning Calorimetry (DSC) demonstrated the drug-excipients compatibility of the optimized formulation. The optimized formulation has concentrations of 9.05 mg and 16.04 mg of CCS and HRM each, respectively, and the model predicted DT of 13.271 sec, F of 0.498, and DR of 99.768%.

  8. Combined Effect of Synthetic and Natural Polymers in Preparation of Cetirizine Hydrochloride Oral Disintegrating Tablets: Optimization by Central Composite Design

    Directory of Open Access Journals (Sweden)

    Chandra Sekhar Patro

    2017-01-01

    Full Text Available Our aim was to employ experimental design to formulate and optimize cetirizine hydrochloride oral disintegrating tablets (ODTs by direct compression technique, using the mutual effect of synthetic croscarmellose sodium (CCS and natural Hibiscus rosa-sinensis mucilage (HRM as disintegrants in the formulation. Central composite design (CCD was applied to optimize the influence of three levels each of CCS (X1 and HRM (X2 concentrations (independent variables for investigated responses: disintegration time (DT (Y1, % friability (F (Y2, and % cumulative drug release (DR (Y3 (dependent variables. This face-centered second-order model’s reliability was verified by the probability and adequate precision values from the analysis of variance, while the significant factor effects influencing the studied responses were identified using multiple linear regression analysis. Perturbation and response surface plots were interpreted to evaluate the responses’ sensitivity towards the variables. During optimization, the concentrations of the processed factors were evaluated, and the resulting values were in good agreement with predicted estimates endorsing the validity. Spectral study by Fourier Transform Infrared Spectroscopy (FTIR and thermograms from Differential Scanning Calorimetry (DSC demonstrated the drug-excipients compatibility of the optimized formulation. The optimized formulation has concentrations of 9.05 mg and 16.04 mg of CCS and HRM each, respectively, and the model predicted DT of 13.271 sec, F of 0.498, and DR of 99.768%.

  9. Formulation and evaluation of a sustained-release tablets of metformin hydrochloride using hydrophilic synthetic and hydrophobic natural polymers.

    Science.gov (United States)

    Wadher, K J; Kakde, R B; Umekar, M J

    2011-03-01

    Metformin hydrochloride has relatively short plasma half-life, low absolute bioavailability. The need for the administration two to three times a day when larger doses are required can decrease patient compliance. Sustained release formulation that would maintain plasma level for 8-12 h might be sufficient for daily dosing of metformin. Sustained release products are needed for metformin to prolong its duration of action and to improve patient compliances. The overall objective of this study was to develop an oral sustained release metformin hydrochloride tablet by using hydrophilic Eudragit RSPO alone or its combination with hydrophobic natural polymers Gum copal and gum damar as rate controlling factor. The tablets were prepared by wet granulation method. The in vitro dissolution study was carried out using USP 22 apparatus I, paddle method and the data was analysed using zero order, first order, Higuchi, Korsmeyer and Hixson-Crowell equations. The drug release study revealed that Eudragit RSPO alone was unable to sustain the drug release. Combining Eudragit with gum Copal and gum Damar sustained the drug release for more than 12 h. Kinetic modeling of in vitro dissolution profiles revealed the drug release mechanism ranges from diffusion controlled or Fickian transport to anomalous type or non-Fickian transport. Fitting the in vitro drug release data to Korsmeyer equation indicated that diffusion along with erosion could be the mechanism of drug release.

  10. [The use of natural and synthetic hydrophilic polymers in the formulation of metformin hydrochloride tablets with different profile release].

    Science.gov (United States)

    Kołodziejczyk, Michał Krzysztof; Kołodziejska, Justyna; Zgoda, Marian Mikołaj

    2012-01-01

    Metformin hydrochloride after buformin and phenformin belongs to the group of biguanid derivatives used as oral anti-diabetic drugs. The object of the study is the technological analysis and the potential effect of biodegradable macromolecular polymers on the technological and therapeutic parameters of oral anti-diabetic medicinal products with metformin hydrochloride: Siofor, Formetic, Glucophage, Metformax in doses of 500mg and 1000mg and Glucophage XR in a dose of 500 mg of modified release. Market therapeutic products containing 500 and 1000 mg of metformin hydrochloride in a normal formulation and 500 mg of metformin hydrochloride in a formulation of modified release were analyzed. Following research methods were used: technological analysis of tablets, study of disintegration time of tablets, evaluation of pharmaceutical availability of metformin hydrochloride from tested therapeutic products, mathematical and kinetic analysis of release profiles of metformin hydrochloride, statistical analysis of mean differences of release coefficients. The percentage of excipients in the XR formulation is higher and constitutes 50.5% of a tablet mass. However, in standard formulations the percentage is lower, between 5.5% and 12.76%. On the basis of the results of disintegration time studies, the analysed therapeutic products can be divided into two groups, regardless the dose. The first one are preparations with faster (not fast!) disintegration: Glucophage i Metformax. The second group are preparations with slower disintegration, more balanced in the aspect of a high dose of the biologically active substance: Formetic and Siofor. Products with a lower content of excipients (Metformax, Glucophage) disintegrate in a faster way. The disintegration rate of the products with a higher content of excipients (Formetic, Siofor) is slower. The appearance of metformin hydrochloride concentration in the gastrointestinal contents, balanced in time, caused by a slower disintegration

  11. Localized Enzymatic Degradation of Polymers: Physics and Scaling Laws

    Science.gov (United States)

    Lalitha Sridhar, Shankar; Vernerey, Franck

    2018-03-01

    Biodegradable polymers are naturally abundant in living matter and have led to great advances in controlling environmental pollution due to synthetic polymer products, harnessing renewable energy from biofuels, and in the field of biomedicine. One of the most prevalent mechanisms of biodegradation involves enzyme-catalyzed depolymerization by biological agents. Despite numerous studies dedicated to understanding polymer biodegradation in different environments, a simple model that predicts the macroscopic behavior (mass and structural loss) in terms of microphysical processes (enzyme transport and reaction) is lacking. An interesting phenomenon occurs when an enzyme source (released by a biological agent) attacks a tight polymer mesh that restricts free diffusion. A fuzzy interface separating the intact and fully degraded polymer propagates away from the source and into the polymer as the enzymes diffuse and react in time. Understanding the characteristics of this interface will provide crucial insight into the biodegradation process and potential ways to precisely control it. In this work, we present a centrosymmetric model of biodegradation by characterizing the moving fuzzy interface in terms of its speed and width. The model predicts that the characteristics of this interface are governed by two time scales, namely the polymer degradation and enzyme transport times, which in turn depend on four main polymer and enzyme properties. A key finding of this work is simple scaling laws that can be used to guide biodegradation of polymers in different applications.

  12. Synthetic Polymer Affinity Ligand for Bacillus thuringiensis ( Bt) Cry1Ab/Ac Protein: The Use of Biomimicry Based on the Bt Protein-Insect Receptor Binding Mechanism.

    Science.gov (United States)

    Liu, Mingming; Huang, Rong; Weisman, Adam; Yu, Xiaoyang; Lee, Shih-Hui; Chen, Yalu; Huang, Chao; Hu, Senhua; Chen, Xiuhua; Tan, Wenfeng; Liu, Fan; Chen, Hao; Shea, Kenneth J

    2018-05-24

    We report a novel strategy for creating abiotic Bacillus thuringiensis ( Bt) protein affinity ligands by biomimicry of the recognition process that takes place between Bt Cry1Ab/Ac proteins and insect receptor cadherin-like Bt-R 1 proteins. Guided by this strategy, a library of synthetic polymer nanoparticles (NPs) was prepared and screened for binding to three epitopes 280 FRGSAQGIEGS 290 , 368 RRPFNIGINNQQ 379 and 436 FRSGFSNSSVSIIR 449 located in loop α8, loop 2 and loop 3 of domain II of Bt Cry1Ab/Ac proteins. A negatively charged and hydrophilic nanoparticle (NP12) was found to have high affinity to one of the epitopes, 368 RRPFNIGINNQQ 379 . This same NP also had specific binding ability to both Bt Cry1Ab and Bt Cry1Ac, proteins that share the same epitope, but very low affinity to Bt Cry2A, Bt Cry1C and Bt Cry1F closely related proteins that lack epitope homology. To locate possible NP- Bt Cry1Ab/Ac interaction sites, NP12 was used as a competitive inhibitor to block the binding of 865 NITIHITDTNNK 876 , a specific recognition site in insect receptor Bt-R 1 , to 368 RRPFNIGINNQQ 379 . The inhibition by NP12 reached as high as 84%, indicating that NP12 binds to Bt Cry1Ab/Ac proteins mainly via 368 RRPFNIGINNQQ 379 . This epitope region was then utilized as a "target" or "bait" for the separation and concentration of Bt Cry1Ac protein from the extract of transgenic Bt cotton leaves by NP12. This strategy, based on the antigen-receptor recognition mechanism, can be extended to other biotoxins and pathogen proteins when designing biomimic alternatives to natural protein affinity ligands.

  13. Heart Attack Recovery FAQs

    Science.gov (United States)

    ... recommendations to make a full recovery. View an animation of a heart attack . Heart Attack Recovery Questions ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  14. Processing of polymers using reactive solvents

    NARCIS (Netherlands)

    Lemstra, P.J.; Kurja, J.; Meijer, H.E.H.; Meijer, H.E.H.

    1997-01-01

    A review with many refs. on processing of polymers using reactive solvents including classification of synthetic polymers, guidelines for the selection of reactive solvents, basic aspects of processing, examples of intractable and tractable polymer/reactive solvent system

  15. Star Polymers.

    Science.gov (United States)

    Ren, Jing M; McKenzie, Thomas G; Fu, Qiang; Wong, Edgar H H; Xu, Jiangtao; An, Zesheng; Shanmugam, Sivaprakash; Davis, Thomas P; Boyer, Cyrille; Qiao, Greg G

    2016-06-22

    Recent advances in controlled/living polymerization techniques and highly efficient coupling chemistries have enabled the facile synthesis of complex polymer architectures with controlled dimensions and functionality. As an example, star polymers consist of many linear polymers fused at a central point with a large number of chain end functionalities. Owing to this exclusive structure, star polymers exhibit some remarkable characteristics and properties unattainable by simple linear polymers. Hence, they constitute a unique class of technologically important nanomaterials that have been utilized or are currently under audition for many applications in life sciences and nanotechnologies. This article first provides a comprehensive summary of synthetic strategies towards star polymers, then reviews the latest developments in the synthesis and characterization methods of star macromolecules, and lastly outlines emerging applications and current commercial use of star-shaped polymers. The aim of this work is to promote star polymer research, generate new avenues of scientific investigation, and provide contemporary perspectives on chemical innovation that may expedite the commercialization of new star nanomaterials. We envision in the not-too-distant future star polymers will play an increasingly important role in materials science and nanotechnology in both academic and industrial settings.

  16. Star-Branched Polymers (Star Polymers)

    KAUST Repository

    Hirao, Akira; Hayashi, Mayumi; Ito, Shotaro; Goseki, Raita; Higashihara, Tomoya; Hadjichristidis, Nikolaos

    2015-01-01

    The synthesis of well-defined regular and asymmetric mixed arm (hereinafter miktoarm) star-branched polymers by the living anionic polymerization is reviewed in this chapter. In particular, much attention is being devoted to the synthetic

  17. Independent assessment of matrix-assisted laser desorption/ionization mass spectrometry (MALDI-MS) sample preparation quality: Effect of sample preparation on MALDI-MS of synthetic polymers.

    Science.gov (United States)

    Kooijman, Pieter C; Kok, Sander; Honing, Maarten

    2017-02-28

    Matrix-assisted laser desorption/ionization mass spectrometry (MALDI-MS) provides detailed and in-depth information about the molecular characteristics of synthetic polymers. To obtain the most accurate results the sample preparation parameters should be chosen to suit the sample and the aim of the experiment. Because the underlying principles of MALDI are still not fully known, a priori determination of optimal sample preparation protocols is often not possible. Employing an automated sample preparation quality assessment method recently presented by us we quantified the sample preparation quality obtained using various sample preparation protocols. Six conventional matrices with and without added potassium as a cationization agent and six ionic liquid matrices (ILMs) were assessed using poly(ethylene glycol) (PEG), polytetrahydrofuran (PTHF) and poly(methyl methacrylate) (PMMA) as samples. All sample preparation protocols were scored and ranked based on predefined quality parameters and spot-to-spot repeatability. Clearly distinctive preferences were observed in matrix identity and cationization agent for PEG, PTHF and PMMA, as the addition of an excess of potassium cationization agent results in an increased score for PMMA and a contrasting matrix-dependent effect for PTHF and PEG. The addition of excess cationization agent to sample mixtures dissipates any overrepresentation of high molecular weight polymer species. Our results show reduced ionization efficiency and similar sample deposit homogeneity for all tested ILMs, compared with well-performing conventional MALDI matrices. The results published here represent a start in the unsupervised quantification of sample preparation quality for MALDI samples. This method can select the best sample preparation parameters for any synthetic polymer sample and the results can be used to formulate hypotheses on MALDI principles. Copyright © 2016 John Wiley & Sons, Ltd. Copyright © 2016 John Wiley & Sons, Ltd.

  18. Terrorists and Suicide Attacks

    National Research Council Canada - National Science Library

    Cronin, Audrey K

    2003-01-01

    Suicide attacks by terrorist organizations have become more prevalent globally, and assessing the threat of suicide attacks against the United States and its interests at home and abroad has therefore...

  19. Solidarity under Attack

    DEFF Research Database (Denmark)

    Meret, Susi; Goffredo, Sergio

    2017-01-01

    https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack......https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack...

  20. Pericarditis - after heart attack

    Science.gov (United States)

    ... include: A previous heart attack Open heart surgery Chest trauma A heart attack that has affected the thickness of your heart muscle Symptoms Symptoms include: Anxiety Chest pain from the swollen pericardium rubbing on the ...

  1. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  2. Water Soluble Polymers for Pharmaceutical Applications

    OpenAIRE

    Veeran Gowda Kadajji; Guru V. Betageri

    2011-01-01

    Advances in polymer science have led to the development of novel drug delivery systems. Some polymers are obtained from natural resources and then chemically modified for various applications, while others are chemically synthesized and used. A large number of natural and synthetic polymers are available. In the present paper, only water soluble polymers are described. They have been explained in two categories (1) synthetic and (2) natural. Drug polymer conjugates, block copolymers, hydrogel...

  3. Use of Synthetic Polymers in Nuclear Emulsions for Fast-Neutron Dosimetry; Primenenie sinteticheskikh polimerov v yadernykh ehmul'siyakh dlya dozimetrii bystrykh nejtronov

    Energy Technology Data Exchange (ETDEWEB)

    Bradna, F. [Laboratorija Radiologicheskoj Dozimetrii Instituta Jadernykh Issledovanij CHSAN Praga, CSSR (Czech Republic)

    1967-01-15

    The paper describes the results of tests on the properties of hydrogen-enriched nuclear-track emulsions for detecting fast neutrons, which were prepared in the Radiological Dosimetry Laboratory of the Czechoslovak Academy of Sciences Nuclear Research Institute. It also compares the dosimetric characteristics of these new emulsions with those of the gelatin emulsions used up to the present. The most promising of the series of polymers synthesized in the laboratory were: (1) Polyvinylacetal of 2,4-disulphonic acid benzaldehyde (polymer No. 1); (2) The co-polymer of a-acetylaminoacrylic acid and N-vinylpyrrolidone (polymer No. 2). The author also studied the possibility of using polyvinyl alcohol solutions with a higher hydrogen content than the above polymers for saturating polymer-gelatin emulsions and for preparing from them films for use as proton radiators. Polymers No. 1 and No. 2 were tested beforehand in an ammonia emulsion. It was established that polymer No. 1 has no marked effect on the photochemical properties of the emulsions, whereas the physical and mechanical.properties of the polymer-gelatin emulsions are considerably better than those of normal gelatin emulsions. The polymers have good protective properties, and polymer No. 2; can be used even during physical ageing, since it retards this process only to a small extent. The photochemical properties of the polymer-gelatin emulsions remain practically unchanged during natural ageing, and their mechanical strength is still further increased. After these preliminary tests, polymers No.-1 and No. 2 were used as fillers for a nuclear-track emulsion, in quantities ranging from 50 to 70% of the total amount of protective colloid, the silver content of the emulsion remaining unchanged. To increase their efficiency further, the polymer-gelatin emulsions were saturated with hydrogen, which was passed through the liquid emulsion for a short period of time. When prepared, the emulsions were poured on a tri

  4. Molecularly imprinted polymer based quartz crystal microbalance sensor system for sensitive and label-free detection of synthetic cannabinoids in urine.

    Science.gov (United States)

    Battal, Dilek; Akgönüllü, Semra; Yalcin, M Serkan; Yavuz, Handan; Denizli, Adil

    2018-07-15

    Herein, we prepared a novel quartz crystal microbalance (QCM) sensor for synthetic cannabinoids (JWH-073, JWH-073 butanoic acid, JWH-018 and JWH-018 pentanoic acid,) detection. Firstly, the synthetic cannabinoid (SCs) imprinted (MIP) and non-imprinted (NIP) nanoparticles were synthesized by mini-emulsion polymerization system. The SCs-imprinted nanoparticles were first characterized by SEM, TEM, zeta-size and FTIR-ATR analysis and then were dropped onto the gold QCM surface. The SCs-imprinted QCM sensor was characterized by an ellipsometer, contact angle, and AFM. The limit of detection was found as 0.3, 0.45, 0.4, 0.2 pg/mL JWH-018, JWH-073, JWH-018 pentanoic acid and JWH-073 butanoic acid, respectively. The selectivity of the SCs-imprinted QCM sensor was shown by using JWH-018, JWH-018 pentanoic acid, JWH-073 and JWH-073 butanoic acid. According to the results, the SCs-imprinted QCM sensors show highly selective and sensitive in a broad range of synthetic cannabinoid concentrations (0.0005-1.0 ng/mL) in both aqueous and synthetic urine solutions. Copyright © 2018 Elsevier B.V. All rights reserved.

  5. Polymer-induced liquid precursor (PILP) phases of calcium carbonate formed in the presence of synthetic acidic polypeptides - relevance to biomineralization

    NARCIS (Netherlands)

    Schenk, A.S.; Zope, H.; Kim, Y.; Kros, A.; Sommerdijk, N.A.J.M.; Meldrum, F.C.

    2012-01-01

    Polymer-induced liquid precursor (PILP) phases of calcium carbonate have attracted significant interest due to possible applications in materials synthesis, and their resemblance to intermediates seen in biogenic mineralisation processes. Further, these PILP phases have been formed in vitro using

  6. iBodies: modular synthetic antibody mimetics based on hydrophilic polymers decorated with functional moieties as tools for molecular recognition, imaging and specific drug delivery

    Czech Academy of Sciences Publication Activity Database

    Šácha, Pavel; Dvořáková, Petra; Knedlík, Tomáš; Schimer, Jiří; Šubr, Vladimír; Ulbrich, Karel; Bušek, P.; Navrátil, Václav; Sedlák, František; Majer, Pavel; Šedo, A.; Konvalinka, Jan

    2017-01-01

    Roč. 284, Suppl 1 (2017), s. 340 ISSN 1742-464X. [FEBS Congress /42./ From Molecules to Cells and Back. 10.09.2017-14.09.2017, Jerusalem] Institutional support: RVO:61388963 ; RVO:61389013 Keywords : antibody mimetics * molecular recognition * polymer conjugates Subject RIV: CE - Biochemistry

  7. Composite Dos Attack Model

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  8. Polymers in cell encapsulation from an enveloped cell perspective

    NARCIS (Netherlands)

    de Vos, Paul; Lazarjani, Hamideh Aghajani; Poncelet, Denis; Faas, Marijke M.

    2014-01-01

    In the past two decades, many polymers have been proposed for producing immunoprotective capsules. Examples include the natural polymers alginate, agarose, chitosan, cellulose, collagen, and xanthan and synthetic polymers poly(ethylene glycol), polyvinyl alcohol, polyurethane, poly(ether-sulfone),

  9. Polymers – A New Open Access Scientific Journal on Polymer Science

    Directory of Open Access Journals (Sweden)

    Shu-Kun Lin

    2009-12-01

    Full Text Available Polymers is a new interdisciplinary, Open Access scientific journal on polymer science, published by Molecular Diversity Preservation International (MDPI. This journal welcomes manuscript submissions on polymer chemistry, macromolecular chemistry, polymer physics, polymer characterization and all related topics. Both synthetic polymers and natural polymers, including biopolymers, are considered. Manuscripts will be thoroughly peer-reviewed in a timely fashion, and papers will be published, if accepted, within 6 to 8 weeks after submission. [...

  10. Web server attack analyzer

    OpenAIRE

    Mižišin, Michal

    2013-01-01

    Web server attack analyzer - Abstract The goal of this work was to create prototype of analyzer of injection flaws attacks on web server. Proposed solution combines capabilities of web application firewall and web server log analyzer. Analysis is based on configurable signatures defined by regular expressions. This paper begins with summary of web attacks, followed by detection techniques analysis on web servers, description and justification of selected implementation. In the end are charact...

  11. Water Soluble Polymers for Pharmaceutical Applications

    Directory of Open Access Journals (Sweden)

    Veeran Gowda Kadajji

    2011-11-01

    Full Text Available Advances in polymer science have led to the development of novel drug delivery systems. Some polymers are obtained from natural resources and then chemically modified for various applications, while others are chemically synthesized and used. A large number of natural and synthetic polymers are available. In the present paper, only water soluble polymers are described. They have been explained in two categories (1 synthetic and (2 natural. Drug polymer conjugates, block copolymers, hydrogels and other water soluble drug polymer complexes have also been explained. The general properties and applications of different water soluble polymers in the formulation of different dosage forms, novel delivery systems and biomedical applications will be discussed.

  12. Seven Deadliest Microsoft Attacks

    CERN Document Server

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  13. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. ...

  14. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  15. Synthetic Cannabinoids

    Directory of Open Access Journals (Sweden)

    Aslihan Okan Ibiloglu

    2017-09-01

    Full Text Available Synthetic cannabinoids which is a subgroup of cannabinoids are commonly used for recreational drug use throughout the whole world. Although both marijuana and synthetic cannabinoids stimulate the same receptors, cannabinoid receptor 1 (CB1 and cannabinoid receptor 2 (CB2, studies have shown that synthetic cannabinoids are much more potent than marijuana. The longer use of synthetic cannabinoids can cause severe physical and psychological symptoms that might even result in death, similar to many known illicit drugs. Main treatment options mostly involve symptom management and supportive care. The aim of this article is to discuss clinical and pharmacological properties of the increasingly used synthetic cannabinoids. [Psikiyatride Guncel Yaklasimlar - Current Approaches in Psychiatry 2017; 9(3.000: 317-328

  16. Polymer architecture and drug delivery.

    Science.gov (United States)

    Qiu, Li Yan; Bae, You Han

    2006-01-01

    Polymers occupy a major portion of materials used for controlled release formulations and drug-targeting systems because this class of materials presents seemingly endless diversity in topology and chemistry. This is a crucial advantage over other classes of materials to meet the ever-increasing requirements of new designs of drug delivery formulations. The polymer architecture (topology) describes the shape of a single polymer molecule. Every natural, seminatural, and synthetic polymer falls into one of categorized architectures: linear, graft, branched, cross-linked, block, star-shaped, and dendron/dendrimer topology. Although this topic spans a truly broad area in polymer science, this review introduces polymer architectures along with brief synthetic approaches for pharmaceutical scientists who are not familiar with polymer science, summarizes the characteristic properties of each architecture useful for drug delivery applications, and covers recent advances in drug delivery relevant to polymer architecture.

  17. Plants under dual attack

    NARCIS (Netherlands)

    Ponzio, C.A.M.

    2016-01-01

    Though immobile, plants are members of complex environments, and are under constant threat from a wide range of attackers, which includes organisms such as insect herbivores or plant pathogens. Plants have developed sophisticated defenses against these attackers, and include chemical responses

  18. Heart attack - discharge

    Science.gov (United States)

    ... and lifestyle Cholesterol - drug treatment Controlling your high blood pressure Deep vein thrombosis - discharge Dietary fats explained Fast food tips Heart attack - discharge Heart attack - what to ask your doctor Heart bypass ... pacemaker - discharge High blood pressure - what to ask your doctor How to read ...

  19. [The use of semi-synthetic polymers in the formulation of sucking and chewable tablets containing sage extract and zinc gluconate].

    Science.gov (United States)

    Linka, Wojciech Andrzej; Golenia, Ewa; Zgoda, Marian Mikołaj; Kołodziejczyk, Michał Krzysztof

    2014-01-01

    Halitosis and gingivitis are most common pathologies (15-60% of population) which, if left untreated, lead to periodontal diseases and tooth loss. The aim of this study was to develop, based on polymers of dry sage extract and zinc gluconate, tablets intended for sucking and chewing that can be applied in the treatment of halitosis and gingivitis. Dried aqueous sage extract, zinc gluconate, Pharmagum M, Prosolv SMCC90 and SMCCHD90, Vivapur 102, sorbitol, mannitol, ludipress. Direct tableting. Testing pharmacopeial parameters and pharmaceutical availability (using basket and rotating disk methods) of tablets intended for sucking and chewing. Approximation of the obtained results. Grey and green color tablets were obtained with smooth and uniform surface, without stains, spalls or mechanical damage. The determined average mass (weight) of a tablet complied with the standard. The friability and crushing strength test revealed that tablets containing Prosolv SMCCHD90, Vivapur 102 and mannitol demonstrated the highest mechanical strength. Tablets containing these substances and intended for sucking had prolonged disintegration and release time. Tablets intended for chewing had a hardness at the level of 124 N.They demonstrated compressibility, low friability and prolonged release. The release profiles of tablets intended for sucking (v2) and those for chewing, obtained by basket and rotating disk methods, were similar. The addition of Prosolv SMCCHD90, Vivapur 102 and mannitol increased significantly the mechanical strength (higher hardness, lower friability), prolonged the disintegration time and slowed the release from the obtained tablets intended for sucking and chewing. The application of Prosolv SMCCHD90 in the formulation of tablets for chewing carries the risk for sorption of active components to the polymer structure. This process takes place in the early stage of the release. Rotating disk method used in pharmaceutical availability testing gives better results

  20. Heart Attack Payment - National

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – national data. This data set includes national-level data for payments associated with a 30-day episode of care for heart...

  1. Heart Attack Payment - Hospital

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – provider data. This data set includes provider data for payments associated with a 30-day episode of care for heart...

  2. Heart Attack Payment - State

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – state data. This data set includes state-level data for payments associated with a 30-day episode of care for heart...

  3. Cooperating attackers in neural cryptography.

    Science.gov (United States)

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  4. Synthetic environments

    Science.gov (United States)

    Lukes, George E.; Cain, Joel M.

    1996-02-01

    The Advanced Distributed Simulation (ADS) Synthetic Environments Program seeks to create robust virtual worlds from operational terrain and environmental data sources of sufficient fidelity and currency to interact with the real world. While some applications can be met by direct exploitation of standard digital terrain data, more demanding applications -- particularly those support operations 'close to the ground' -- are well-served by emerging capabilities for 'value-adding' by the user working with controlled imagery. For users to rigorously refine and exploit controlled imagery within functionally different workstations they must have a shared framework to allow interoperability within and between these environments in terms of passing image and object coordinates and other information using a variety of validated sensor models. The Synthetic Environments Program is now being expanded to address rapid construction of virtual worlds with research initiatives in digital mapping, softcopy workstations, and cartographic image understanding. The Synthetic Environments Program is also participating in a joint initiative for a sensor model applications programer's interface (API) to ensure that a common controlled imagery exploitation framework is available to all researchers, developers and users. This presentation provides an introduction to ADS and the associated requirements for synthetic environments to support synthetic theaters of war. It provides a technical rationale for exploring applications of image understanding technology to automated cartography in support of ADS and related programs benefitting from automated analysis of mapping, earth resources and reconnaissance imagery. And it provides an overview and status of the joint initiative for a sensor model API.

  5. Thermal-annealing effects on the structural and magnetic properties of 10% Fe-doped SnO{sub 2} nanoparticles synthetized by a polymer precursor method

    Energy Technology Data Exchange (ETDEWEB)

    Aragón, F.H., E-mail: fermin964@hotmail.com [Núcleo de Física Aplicada, Instituto de Física, Universidade de Brasília, Brasília DF 70910-900 (Brazil); Instituto de Ciências Biológicas, Pós-graduação em Nanociência e Nanobiotecnologia, Universidade de Brasília, Brasilia DF 70919-970 (Brazil); Coaquira, J.A.H. [Núcleo de Física Aplicada, Instituto de Física, Universidade de Brasília, Brasília DF 70910-900 (Brazil); Nagamine, L.C.C.M.; Cohen, R. [Instituto de Física, Universidade de São Paulo, São Paulo SP 05508-090 (Brazil); Silva, S.W. da [Núcleo de Física Aplicada, Instituto de Física, Universidade de Brasília, Brasília DF 70910-900 (Brazil); Instituto de Ciências Biológicas, Pós-graduação em Nanociência e Nanobiotecnologia, Universidade de Brasília, Brasilia DF 70919-970 (Brazil); and others

    2015-02-01

    In this work, we present the experimental results of Sn{sub 0.9}Fe{sub 0.1}O{sub 2} nanoparticles synthesized by a polymer precursor method. Studies were performed in the as-prepared (AP) and thermally-annealed (TA) samples. The X-ray diffraction (XRD) data analysis carried out using the Rietveld refinement method shows the formation of only the rutile-type structure in the AP sample and this phase remains stable for the TA sample. Additionally, the mean crystallite size shows an increase from ∼4 nm to ∼17 nm after the annealing and a clear reduction of the residual strain has also been determined. Micro-Raman spectroscopy measurements show the formation of an iron oxide phase (likely α-Fe{sub 2}O{sub 3}) after the thermal treatment. Magnetic measurements show a paramagnetic behavior for the AP sample and the coexistence of a weak ferromagnetism and paramagnetism for the TA sample. The magnetically-ordered contribution of the TA sample has been assigned to the formation of the hematite phase. DC and AC magnetic features of the TA sample are consistent with a cluster-glass behavior which seems to be related to the magnetic disorder of spins located at the particle surface. Those spins clusters seem to be formed due to the diffusion of iron ions from the core of the particle to the surface caused by the annealing process. - Highlights: • Thermal annealing effects in the 10% Fe-doped SnO{sub 2} nanoparticles have been studied. • XRD data analysis shows the formation of the rutile-type structure. • Raman measurements show the formation of small amount of α-Fe{sub 2}O{sub 3} after the annealing. • Paramagnetic and magnetically ordered phases were determined after the annealing. • Spin clusters likely at the particle surface have been formed after the annealing.

  6. Cyber Attacks, Information Attacks, and Postmodern Warfare

    Directory of Open Access Journals (Sweden)

    Valuch Jozef

    2017-06-01

    Full Text Available The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war. Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict, this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.

  7. Radioimmunoassay of synthetic steroids

    Energy Technology Data Exchange (ETDEWEB)

    Raynaud, J -P; Bucourt, R; Salmon, J

    1975-12-01

    The sensitivity of a radioimmunoassay depends on the intrinsic association constant of the interaction between ligand and antibody. Its specificity depends on the position of the chain which forms the link with the antigen. Thus, an antibody specific of estradiol has been obtained by coupling estradiol to albumin via a chain at position 7. For synthetic steroids the structure of which is sufficiency different from that of natural hormones, the requirements for a sensitive assay method not involving chromatography are simply maximum affinity and positioning of the couple at a site which does not undergo metabolic attack. These criteria were used to develop assays for R 2858 and R 2453 which obviate the need to administer radioactive product in clinical pharmacology. Cross-reaction with structural analogs may be used to assay competitors. Thus, R 2323 antibody, highly specific for endogenous steroids, may be used to assay other trienes such as R 1697 (trenbolone) and R 2010 (norgestrienone).

  8. Synthetic Rutile

    International Nuclear Information System (INIS)

    Burastero, J.

    1975-01-01

    This work is about the laboratory scale investigation of the conditions in the rutile synthetic production from one me nita in Aguas Dulces reservoir. The iron mineral is chlorinated and volatilized selectively leaving a residue enriched in titanium dioxide which can be used as a substitute of rutile mineral

  9. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  10. Research on the structure in solution of optically active synthetic polymers (propylene polysulphide, propylene polyoxide, tertio-butyl polysulphide); Recherche de la structure en solution de polymeres synthetiques, optiquement actifs (polysulfure de propylene, polyoxyde de propylene, polysulfure de tertiobutyle)

    Energy Technology Data Exchange (ETDEWEB)

    Sarrazin, Brigitte

    1971-03-15

    It was proposed to study the structure of sulphur-containing synthetic polymers, stereo-regular, optically active in solution and able to adopt a spiral conformation, with special reference to propylene polysulphide. Two methods were used, the first mathematical (conformational energy calculations) and the second physico-chemical, essentially spectroscopic. By conformational analysis it is possible to choose the most probable structures liable to be adopted by a given polymer in solution while the spectro-polarimetric study should, in principle, invalidate or confirm certain of these hypotheses. The conformational energy calculations showed that in fact there is no energy conformation low enough to be stable in solution. Strictly speaking however we can refer to a region of stability in which steric hindrance is low and many energy minima exist. These minima are indistinguishable both by their energy values and by their spatial localizations and are all enclosed in the region bounded by the barriers due to steric hindrance. This uncertainty does not arise from approximations made in the calculations, but from the multitude of stereochemical structure possible. Investigations into the variation of the optical rotary dispersion and the circular dichroism as a function of temperature indicated the existence of three or more equilibrium states in the dioxane. The spectra appear to be the summation of the optical activities of the numerous simultaneously possible conformations. It appears that polymers, such as propylene polysulphide or propylene polyoxide do not have stable structures in solution. These are molecules of great flexibility possessing a large number of degrees of freedom. These properties distinguish them from the natural polymers, carrying precise information, such as DNA which must consequently have stable conformations. (author) [French] On s'est propose d'etudier la structure de polymeres synthetiques soufres, stereoreguliers, optiquement actifs en

  11. The political attack ad

    Directory of Open Access Journals (Sweden)

    Palma Peña-Jiménez, Ph.D.

    2011-01-01

    Full Text Available During election campaigns the political spot has a clear objective: to win votes. This message is communicated to the electorate through television and Internet, and usually presents a negative approach, which includes a direct critical message against the opponent, rather than an exposition of proposals. This article is focused on the analysis of the campaign attack video ad purposely created to encourage the disapproval of the political opponent among voters. These ads focus on discrediting the opponent, many times, through the transmission of ad hominem messages, instead of disseminating the potential of the political party and the virtues and manifesto of its candidate. The article reviews the development of the attack ad since its first appearance, which in Spain dates back to 1996, when the famous Doberman ad was broadcast, and examines the most memorable campaign attack ads.

  12. A fatal elephant attack.

    Science.gov (United States)

    Hejna, Petr; Zátopková, Lenka; Safr, Miroslav

    2012-01-01

    A rare case of an elephant attack is presented. A 44-year-old man working as an elephant keeper was attacked by a cow elephant when he tripped over a foot chain while the animal was being medically treated. The man fell down and was consequently repeatedly attacked with elephant tusks. The man sustained multiple stab injuries to both groin regions, a penetrating injury to the abdominal wall with traumatic prolapse of the loops of the small bowel, multiple defects of the mesentery, and incomplete laceration of the abdominal aorta with massive bleeding into the abdominal cavity. In addition to the penetrating injuries, the man sustained multiple rib fractures with contusion of both lungs and laceration of the right lobe of the liver, and comminuted fractures of the pelvic arch and left femoral body. The man died shortly after he had been received at the hospital. The cause of death was attributed to traumatic shock. © 2011 American Academy of Forensic Sciences.

  13. Attacker Model Lab

    OpenAIRE

    2006-01-01

    tut quiz present Tutorial Quiz Presentation Interactive Media Element This interactive tutorial the two sub-classes of computer attackers: amateurs and professionals. It provides valuable insight into the nature of necessary protection measure for information assets. CS3600 Information Assurance: Introduction to Computer Security Course

  14. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... major stroke. It's important to call 9-1-1 immediately for any stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. The content in this ...

  15. Temporal Cyber Attack Detection.

    Energy Technology Data Exchange (ETDEWEB)

    Ingram, Joey Burton [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Draelos, Timothy J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Galiardi, Meghan [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Doak, Justin E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Rigorous characterization of the performance and generalization ability of cyber defense systems is extremely difficult, making it hard to gauge uncertainty, and thus, confidence. This difficulty largely stems from a lack of labeled attack data that fully explores the potential adversarial space. Currently, performance of cyber defense systems is typically evaluated in a qualitative manner by manually inspecting the results of the system on live data and adjusting as needed. Additionally, machine learning has shown promise in deriving models that automatically learn indicators of compromise that are more robust than analyst-derived detectors. However, to generate these models, most algorithms require large amounts of labeled data (i.e., examples of attacks). Algorithms that do not require annotated data to derive models are similarly at a disadvantage, because labeled data is still necessary when evaluating performance. In this work, we explore the use of temporal generative models to learn cyber attack graph representations and automatically generate data for experimentation and evaluation. Training and evaluating cyber systems and machine learning models requires significant, annotated data, which is typically collected and labeled by hand for one-off experiments. Automatically generating such data helps derive/evaluate detection models and ensures reproducibility of results. Experimentally, we demonstrate the efficacy of generative sequence analysis techniques on learning the structure of attack graphs, based on a realistic example. These derived models can then be used to generate more data. Additionally, we provide a roadmap for future research efforts in this area.

  16. Blocking of Brute Force Attack

    OpenAIRE

    M.Venkata Krishna Reddy

    2012-01-01

    A common threat Web developers face is a password-guessing attack known as a brute-force attack. A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works. If your Web site requires user authentication, you are a good target for a brute-force attack. An attacker can always discover a password through a brute-force attack, but the downside is that it co...

  17. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  18. High-throughput synthesis equipment applied to polymer research

    NARCIS (Netherlands)

    Hoogenboom, R.; Schubert, U.S.

    2005-01-01

    To speed up synthetic polymer research, a workflow dedicated to automated polymer synthesis and characterization was developed. The workflow consists of several synthesis robots with online and offline analytical equipment. For screening of reaction parameters and for library synthesis, robots

  19. Automated Discovery of Mimicry Attacks

    National Research Council Canada - National Science Library

    Giffin, Jonathon T; Jha, Somesh; Miller, Barton P

    2006-01-01

    .... These systems are useful only if they detect actual attacks. Previous research developed manually-constructed mimicry and evasion attacks that avoided detection by hiding a malicious series of system calls within a valid sequence allowed by the model...

  20. Heart Attack Symptoms in Women

    Science.gov (United States)

    ... fat, cholesterol and other substances (plaque). Watch an animation of a heart attack . Many women think the ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  1. Natural - synthetic - artificial!

    DEFF Research Database (Denmark)

    Nielsen, Peter E

    2010-01-01

    The terms "natural," "synthetic" and "artificial" are discussed in relation to synthetic and artificial chromosomes and genomes, synthetic and artificial cells and artificial life.......The terms "natural," "synthetic" and "artificial" are discussed in relation to synthetic and artificial chromosomes and genomes, synthetic and artificial cells and artificial life....

  2. Synthetic Cannabinoids.

    Science.gov (United States)

    Mills, Brooke; Yepes, Andres; Nugent, Kenneth

    2015-07-01

    Synthetic cannabinoids (SCBs), also known under the brand names of "Spice," "K2," "herbal incense," "Cloud 9," "Mojo" and many others, are becoming a large public health concern due not only to their increasing use but also to their unpredictable toxicity and abuse potential. There are many types of SCBs, each having a unique binding affinity for cannabinoid receptors. Although both Δ-tetrahydrocannabinol (THC) and SCBs stimulate the same receptors, cannabinoid receptor 1 (CB1) and cannabinoid receptor 2 (CB2), studies have shown that SCBs are associated with higher rates of toxicity and hospital admissions than is natural cannabis. This is likely due to SCBs being direct agonists of the cannabinoid receptors, whereas THC is a partial agonist. Furthermore, the different chemical structures of SCBs found in Spice or K2 may interact in unpredictable ways to elicit previously unknown, and the commercial products may have unknown contaminants. The largest group of users is men in their 20s who participate in polydrug use. The most common reported toxicities with SCB use based on studies using Texas Poison Control records are tachycardia, agitation and irritability, drowsiness, hallucinations, delusions, hypertension, nausea, confusion, dizziness, vertigo and chest pain. Acute kidney injury has also been strongly associated with SCB use. Treatment mostly involves symptom management and supportive care. More research is needed to identify which contaminants are typically found in synthetic marijuana and to understand the interactions between different SBCs to better predict adverse health outcomes.

  3. Attack Trees with Sequential Conjunction

    NARCIS (Netherlands)

    Jhawar, Ravi; Kordy, Barbara; Mauw, Sjouke; Radomirović, Sasa; Trujillo-Rasua, Rolando

    2015-01-01

    We provide the first formal foundation of SAND attack trees which are a popular extension of the well-known attack trees. The SAND at- tack tree formalism increases the expressivity of attack trees by intro- ducing the sequential conjunctive operator SAND. This operator enables the modeling of

  4. Polymer films

    Science.gov (United States)

    Granick, Steve; Sukhishvili, Svetlana A.

    2004-05-25

    A film contains a first polymer having a plurality of hydrogen bond donating moieties, and a second polymer having a plurality of hydrogen bond accepting moieties. The second polymer is hydrogen bonded to the first polymer.

  5. Synthetic LPS-Binding Polymer Nanoparticles

    Science.gov (United States)

    Jiang, Tian

    Lipopolysaccharide (LPS), one of the principal components of most gram-negative bacteria's outer membrane, is a type of contaminant that can be frequently found in recombinant DNA products. Because of its strong and even lethal biological effects, selective LPS removal from bioproducts solution is of particular importance in the pharmaceutical and health care industries. In this thesis, for the first time, a proof-of-concept study on preparing LPS-binding hydrogel-like NPs through facile one-step free-radical polymerization was presented. With the incorporation of various hydrophobic (TBAm), cationic (APM, GUA) monomers and cross-linkers (BIS, PEG), a small library of NPs was constructed. Their FITC-LPS binding behaviors were investigated and compared with those of commercially available LPS-binding products. Moreover, the LPS binding selectivity of the NPs was also explored by studying the NPs-BSA interactions. The results showed that all NPs obtained generally presented higher FITC-LPS binding capacity in lower ionic strength buffer than higher ionic strength. However, unlike commercial poly-lysine cellulose and polymyxin B agarose beads' nearly linear increase of FITC-LPS binding with particle concentration, NPs exhibited serious aggregation and the binding quickly saturated or even decreased at high particle concentration. Among various types of NPs, higher FITC-LPS binding capacity was observed for those containing more hydrophobic monomers (TBAm). However, surprisingly, more cationic NPs with higher content of APM exhibited decreased FITC-LPS binding in high ionic strength conditions. Additionally, when new cationic monomer and cross-linker, GUA and PEG, were applied to replace APM and BIS, the obtained NPs showed improved FITC-LPS binding capacity at low NP concentration. But compared with APM- and BIS-containing NPs, the FITC-LPS binding capacity of GUA- and PEG-containing NPs saturated earlier. To investigate the NPs' binding to proteins, we tested the NPs-bovine serum albumin (BSA) binding, which showed that, different from NPs FITC-LPS interactions, variation of TBAm's content in NPs had very little influence on BSA binding, instead, more cationic NPs with higher content of APM were found to possess higher BSA binding. Additionally, GUA-containing NPs exhibited particularly high BSA binding capacity, especially under low ionic strength conditions. In the current formulations, the aggregation and saturation effects make NPs unsuitable in practical applications. Nevertheless, we anticipate that by attaching NPs onto certain substrates, particles may be effectively separated from each other, and the NPs' LPS binding capacity could potentially be further improved.

  6. Coupling of Active Components to Synthetic Polymers

    DEFF Research Database (Denmark)

    Overgaard, Anne Kathrine Kattenhøj

    Arbejdet har fokuseret på fremstilling af kunstig ekstracellulær matrix (ECM) til fremme af den naturlige biologiske helingsproces ved vævsgendannelse efter store vævsskader. Særlig opmærksomhed har været på kemisk kobling af dermatan sulfat (DS), en naturlig glyco-saminoglycan (GAG), med en biok...

  7. Routing of individual polymers in designed patterns

    DEFF Research Database (Denmark)

    Knudsen, Jakob Bach; Liu, Lei; Kodal, Anne Louise Bank

    2015-01-01

    Synthetic polymers are ubiquitous in the modern world, but our ability to exert control over the molecular conformation of individual polymers is very limited. In particular, although the programmable self-assembly of oligonucleotides and proteins into artificial nanostructures has been...... demonstrated, we currently lack the tools to handle other types of synthetic polymers individually and thus the ability to utilize and study their single-molecule properties. Here we show that synthetic polymer wires containing short oligonucleotides that extend from each repeat can be made to assemble...... into arbitrary routings. The wires, which can be more than 200 nm in length, are soft and bendable, and the DNA strands allow individual polymers to self-assemble into predesigned routings on both two- and three-dimensional DNA origami templates. The polymers are conjugated and potentially conducting, and could...

  8. Routing of individual polymers in designed patterns

    Science.gov (United States)

    Knudsen, Jakob Bach; Liu, Lei; Bank Kodal, Anne Louise; Madsen, Mikael; Li, Qiang; Song, Jie; Woehrstein, Johannes B.; Wickham, Shelley F. J.; Strauss, Maximilian T.; Schueder, Florian; Vinther, Jesper; Krissanaprasit, Abhichart; Gudnason, Daniel; Smith, Anton Allen Abbotsford; Ogaki, Ryosuke; Zelikin, Alexander N.; Besenbacher, Flemming; Birkedal, Victoria; Yin, Peng; Shih, William M.; Jungmann, Ralf; Dong, Mingdong; Gothelf, Kurt V.

    2015-10-01

    Synthetic polymers are ubiquitous in the modern world, but our ability to exert control over the molecular conformation of individual polymers is very limited. In particular, although the programmable self-assembly of oligonucleotides and proteins into artificial nanostructures has been demonstrated, we currently lack the tools to handle other types of synthetic polymers individually and thus the ability to utilize and study their single-molecule properties. Here we show that synthetic polymer wires containing short oligonucleotides that extend from each repeat can be made to assemble into arbitrary routings. The wires, which can be more than 200 nm in length, are soft and bendable, and the DNA strands allow individual polymers to self-assemble into predesigned routings on both two- and three-dimensional DNA origami templates. The polymers are conjugated and potentially conducting, and could therefore be used to create molecular-scale electronic or optical wires in arbitrary geometries.

  9. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  10. Synthetic Brainbows

    KAUST Repository

    Wan, Y.

    2013-06-01

    Brainbow is a genetic engineering technique that randomly colorizes cells. Biological samples processed with this technique and imaged with confocal microscopy have distinctive colors for individual cells. Complex cellular structures can then be easily visualized. However, the complexity of the Brainbow technique limits its applications. In practice, most confocal microscopy scans use different florescence staining with typically at most three distinct cellular structures. These structures are often packed and obscure each other in rendered images making analysis difficult. In this paper, we leverage a process known as GPU framebuffer feedback loops to synthesize Brainbow-like images. In addition, we incorporate ID shuffing and Monte-Carlo sampling into our technique, so that it can be applied to single-channel confocal microscopy data. The synthesized Brainbow images are presented to domain experts with positive feedback. A user survey demonstrates that our synthetic Brainbow technique improves visualizations of volume data with complex structures for biologists.

  11. Synthetic Botany.

    Science.gov (United States)

    Boehm, Christian R; Pollak, Bernardo; Purswani, Nuri; Patron, Nicola; Haseloff, Jim

    2017-07-05

    Plants are attractive platforms for synthetic biology and metabolic engineering. Plants' modular and plastic body plans, capacity for photosynthesis, extensive secondary metabolism, and agronomic systems for large-scale production make them ideal targets for genetic reprogramming. However, efforts in this area have been constrained by slow growth, long life cycles, the requirement for specialized facilities, a paucity of efficient tools for genetic manipulation, and the complexity of multicellularity. There is a need for better experimental and theoretical frameworks to understand the way genetic networks, cellular populations, and tissue-wide physical processes interact at different scales. We highlight new approaches to the DNA-based manipulation of plants and the use of advanced quantitative imaging techniques in simple plant models such as Marchantia polymorpha. These offer the prospects of improved understanding of plant dynamics and new approaches to rational engineering of plant traits. Copyright © 2017 Cold Spring Harbor Laboratory Press; all rights reserved.

  12. Star-Branched Polymers (Star Polymers)

    KAUST Repository

    Hirao, Akira

    2015-09-01

    The synthesis of well-defined regular and asymmetric mixed arm (hereinafter miktoarm) star-branched polymers by the living anionic polymerization is reviewed in this chapter. In particular, much attention is being devoted to the synthetic development of miktoarm star polymers since 2000. At the present time, the almost all types of multiarmed and multicomponent miktoarm star polymers have become feasible by using recently developed iterative strategy. For example, the following well-defined stars have been successfully synthesized: 3-arm ABC, 4-arm ABCD, 5-arm ABCDE, 6-arm ABCDEF, 7-arm ABCDEFG, 6-arm ABC, 9-arm ABC, 12-arm ABC, 13-arm ABCD, 9-arm AB, 17-arm AB, 33-arm AB, 7-arm ABC, 15-arm ABCD, and 31-arm ABCDE miktoarm star polymers, most of which are quite new and difficult to synthesize by the end of the 1990s. Several new specialty functional star polymers composed of vinyl polymer segments and rigid rodlike poly(acetylene) arms, helical polypeptide, or helical poly(hexyl isocyanate) arms are introduced.

  13. The attack navigator

    DEFF Research Database (Denmark)

    Probst, Christian W.; Willemson, Jan; Pieters, Wolter

    2016-01-01

    The need to assess security and take protection decisions is at least as old as our civilisation. However, the complexity and development speed of our interconnected technical systems have surpassed our capacity to imagine and evaluate risk scenarios. This holds in particular for risks...... that are caused by the strategic behaviour of adversaries. Therefore, technology-supported methods are needed to help us identify and manage these risks. In this paper, we describe the attack navigator: a graph-based approach to security risk assessment inspired by navigation systems. Based on maps of a socio...

  14. Attacks on computer systems

    Directory of Open Access Journals (Sweden)

    Dejan V. Vuletić

    2012-01-01

    Full Text Available Computer systems are a critical component of the human society in the 21st century. Economic sector, defense, security, energy, telecommunications, industrial production, finance and other vital infrastructure depend on computer systems that operate at local, national or global scales. A particular problem is that, due to the rapid development of ICT and the unstoppable growth of its application in all spheres of the human society, their vulnerability and exposure to very serious potential dangers increase. This paper analyzes some typical attacks on computer systems.

  15. Polymers for Protein Conjugation

    Directory of Open Access Journals (Sweden)

    Gianfranco Pasut

    2014-01-01

    Full Text Available Polyethylene glycol (PEG at the moment is considered the leading polymer for protein conjugation in view of its unique properties, as well as to its low toxicity in humans, qualities which have been confirmed by its extensive use in clinical practice. Other polymers that are safe, biodegradable and custom-designed have, nevertheless, also been investigated as potential candidates for protein conjugation. This review will focus on natural polymers and synthetic linear polymers that have been used for protein delivery and the results associated with their use. Genetic fusion approaches for the preparation of protein-polypeptide conjugates will be also reviewed and compared with the best known chemical conjugation ones.

  16. Recent "phishing" attacks

    CERN Multimedia

    IT Department

    2009-01-01

    Over the last few weeks there has been a marked increase in the number of attacks on CERN made by cybercriminals. Typical attacks arrive in the form of e-mail messages purporting to come from the CERN Help Desk, Mail Service, or some similarly official-sounding entity and suggest that there is a problem with your account, such as it being over-quota. They then ask you to click on a link or to reply and give your password. Please don’t! Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. NEVER provide your password or other details if these are requested. These messages try to trick you into clicking on Web links which will help them to install malicious software on your computer, and anti-virus software cannot be relied on to detect all cases. In case of questions on this topic, you may contact mailto:helpdesk@cern.ch. CERN Comput...

  17. Synthetic Astrobiology

    Science.gov (United States)

    Rothschild, Lynn J.

    2017-01-01

    "Are we alone?" is one of the primary questions of astrobiology, and whose answer defines our significance in the universe. Unfortunately, this quest is hindered by the fact that we have only one confirmed example of life, that of earth. While this is enormously helpful in helping to define the minimum envelope for life, it strains credulity to imagine that life, if it arose multiple times, has not taken other routes. To help fill this gap, our lab has begun using synthetic biology - the design and construction of new biological parts and systems and the redesign of existing ones for useful purposes - as an enabling technology. One theme, the "Hell Cell" project, focuses on creating artificial extremophiles in order to push the limits for Earth life, and to understand how difficult it is for life to evolve into extreme niches. In another project, we are re-evolving biotic functions using only the most thermodynamically stable amino acids in order to understand potential capabilities of an early organism with a limited repertoire of amino acids.

  18. New trends in radiation processing of polymers

    International Nuclear Information System (INIS)

    Chmielewski, Andrzej G.

    2005-01-01

    Nowadays, the modification of polymers covers radiation cross-linking, radiation induced polymerization (graft polymerization and curing) and the degradation of polymers. The success of radiation technology for the processing of synthetic polymers can be attributed to two reasons, namely the easiness of processing in various shapes and sizes and, secondly, most of these polymers undergo cross-linking reaction upon exposure to radiation. years, natural polymers are being looked at again with renewed interest because of their unique characteristics like inherent biocompatibility, biodegradability and easy availability. However the recent progress in the field regards development of new processing methods and technical solutions. No other break trough technologies or products based on synthetic polymers are reported recently. The future progress, both from scientific and practical points of view, concerns nanotechnology and natural polymer processing. Overview of the subject, including the works performed in the Institute of the author is presented in the paper. (author)

  19. Cyber Attacks and Combat Behavior

    Directory of Open Access Journals (Sweden)

    Carataș Maria Alina

    2017-01-01

    Full Text Available Cyber terrorism is an intangible danger, a real over the corner threat in the life of individuals,organizations, and governments and is getting harder to deal with its damages. The motivations forthe cyber-attacks are different, depending on the terrorist group, from cybercrime to hacktivism,attacks over the authorities’ servers. Organizations constantly need to find new ways ofstrengthening protection against cyber-attacks, assess their cyber readiness, expand the resiliencecapacity and adopts international security regulations.

  20. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  1. Radiation Synthesis of Superabsorbent Polymers Based on Natural Polymers

    International Nuclear Information System (INIS)

    Sen, Murat; Hayrabolulu, Hande

    2010-01-01

    The objectives of proposed research contract were first synthesize superabsorbent polymers based on natural polymers to be used as disposable diapers and soil conditioning materials in agriculture, horticulture and other super adsorbent using industries. We have planned to use the natural polymers; locust beam gum, tara gum, guar gum and sodium alginate on the preparation of natural superabsorbent polymers(SAP). The aqueous solution of natural polymers and their blends with trace amount of monomer and cross-linking agents will be irradiated in paste like conditions by gamma rays for the preparation of cross-linked superabsorbent systems. The water absorption and deswellling capacity of prepared super adsorbents and retention capacity, absorbency under load, suction power, swelling pressure and pet-rewet properties will be determined. Use of these materials instead of synthetic super absorbents will be examined by comparing the performance of finished products. The experimental studies achieved in the second year of project mainly on the effect of radiation on the chemistry of sodium alginate polymers in different irradiation conditions and structure-property relationship particularly with respect to radiation induced changes on the molecular weight of natural polymers and preliminary studies on the synthesis of natural-synthetic hydride super adsorbent polymers were given in details

  2. Crony Attack: Strategic Attack’s Silver Bullet

    Science.gov (United States)

    2006-11-01

    physical assets or financial assets. The form of crony attack that most closely resembles classic strategic attack is to deny, degrade, or destroy a money...February 1951. Reprinted in Airpower Studies Coursebook , Air Command and Staff College, Maxwell AFB, AL, 2002, 152–58. Hirsch, Michael. “NATO’s Game of

  3. Expected and unexpected achievements and trends in radiation processing of polymers

    International Nuclear Information System (INIS)

    Czvikovszky, T.

    2002-01-01

    Complete text of publication follows. The last four decades produced exponential development in the polymer processing. Radiation processing yielded a similar pathway of development in the beginning, mostly in the radiation crosslinking of polymers and in the radiation sterilization of polymer products. Some expectations on several related fields such as radiation grafting, surface coating of polymer films, etc., have not really been fulfilled. There are some unexpected results in the developments of the radiation chemistry of polymers utilized well in the polymer processing today. The most dynamical developments of the microelectronics in our days is based on the efficient utilization of radiation-crosslinkable negative photoresist polymers and the radiation degradable positive photoresist polymers. Rapid prototyping and rapid tooling are indispensable methods in the continuously renewing manufacturing technologies of metal and plastic parts for almost all the industrial branches. Rapid prototyping allows to make a real polymeric part of an automobile or of a mobile phone directly from the computer assisted design draft on the monitor, without any human interference. The selective laser lithography is using radiation-reactive oligomers for this purpose. Polymer composite manufacturing is also profited in many ways from the experiences of radiation technology. High-tech composites of advanced fibers such as graphite, Kevlar, HOPE and other ones require well-engineered interface between reinforcing fiber and matrix. This interface is the key factor, especially in the case of injection-moldable composites of short fibers and thermoplastics, and this interface can greatly be improved through ionizing radiation. Our recent results in this field confirmed substantial benefits in the case of carbon fiber reinforced structures and in the case of natural fiber reinforced composites as well. Compatibilization through radiation-reactive monomers and oligomers is attacking

  4. Invisible Trojan-horse attack

    DEFF Research Database (Denmark)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin

    2017-01-01

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance...

  5. When Sinuses Attack! (For Kids)

    Science.gov (United States)

    ... First Aid & Safety Doctors & Hospitals Videos Recipes for Kids Kids site Sitio para niños How the Body Works ... Search English Español When Sinuses Attack! KidsHealth / For Kids / When Sinuses Attack! What's in this article? What ...

  6. Invisible Trojan-horse attack.

    Science.gov (United States)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin; Makarov, Vadim

    2017-08-21

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance against Scarani-Ac´ın-Ribordy-Gisin (SARG04) QKD protocol at 1924 nm versus that at 1536 nm. The attack strategy was proposed earlier but found to be unsuccessful at the latter wavelength, as reported in N. Jain et al., New J. Phys. 16, 123030 (2014). However at 1924 nm, we show experimentally that the noise response of the detectors to bright pulses is greatly reduced, and show by modeling that the same attack will succeed. The invisible nature of the attack poses a threat to the security of practical QKD if proper countermeasures are not adopted.

  7. Nanocomposites from polymers and layered minerals

    NARCIS (Netherlands)

    Fischer, H.R.; Gielgens, L.H.; Koster, T.P.M.

    1999-01-01

    Composites consisting of polymer matrix materials and natural or synthetic layered minerals e.g. clays were prepared by using special compatibilizing agents betsveen these two intrinsically non-miscible components. Block or graft copolymers combining one part of the polymer that is identically

  8. Low band gap polymers for organic photovoltaics

    DEFF Research Database (Denmark)

    Bundgaard, Eva; Krebs, Frederik C

    2007-01-01

    Low band gap polymer materials and their application in organic photovoltaics (OPV) are reviewed. We detail the synthetic approaches to low band gap polymer materials starting from the early methodologies employing quinoid homopolymer structures to the current state of the art that relies...

  9. Polymer compound

    NARCIS (Netherlands)

    1995-01-01

    A Polymer compound comprising a polymer (a) that contains cyclic imidesgroups and a polymer (b) that contains monomer groups with a 2,4-diamino-1,3,5-triazine side group. According to the formula (see formula) whereby themole percentage ratio of the cyclic imides groups in the polymer compoundwith

  10. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  11. Shark Attack Project - Marine Attack at Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Adrianus J

    2005-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  12. Polymer electronics

    CERN Document Server

    Hsin-Fei, Meng

    2013-01-01

    Polymer semiconductor is the only semiconductor that can be processed in solution. Electronics made by these flexible materials have many advantages such as large-area solution process, low cost, and high performance. Researchers and companies are increasingly dedicating time and money in polymer electronics. This book focuses on the fundamental materials and device physics of polymer electronics. It describes polymer light-emitting diodes, polymer field-effect transistors, organic vertical transistors, polymer solar cells, and many applications based on polymer electronics. The book also disc

  13. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...... the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  14. Rheological characteristics of synthetic road binders

    Energy Technology Data Exchange (ETDEWEB)

    Gordon D. Airey; Musarrat H. Mohammed; Caroline Fichter [University of Nottingham, Nottingham (United Kingdom)

    2008-08-15

    This paper deals with the synthesis of polymer binders from monomers that could in future be derived from renewable resources. These binders consist of polyethyl acrylate (PEA) of different molecular weight, polymethyl acrylate (PMA) and polybutyl acrylate (PBA), which were synthesised from ethyl acrylate, methyl acrylate and butyl acrylate, respectively, by atom transfer radical polymerization (ATRP). The fundamental rheological properties of these binders were determined by means of a dynamic shear rheometer (DSR) using a combination of temperature and frequency sweeps. The results indicate that PEA has rheological properties similar to that of 100/150 penetration grade bitumen, PMA similar rheological properties to that of 10/20 penetration grade bitumen, while PBA, due to its highly viscous nature and low complex modulus, cannot be used on its own as an asphalt binder. The synthetic binders were also combined with conventional penetration grade bitumen to produce a range of bitumen-synthetic polymer binder blends. These blends were batched by mass in the ratio of 1:1 or 3:1 and subjected to the same DSR rheological testing as the synthetic binders. The blends consisting of a softer bitumen (70/100 pen or 100/150 pen) with a hard synthetic binder (PMA) tended to be more compatible and therefore stable and produced rheological properties that combined the properties of the two components. The synthetic binders and particularly the extended bitumen samples (blends) produced rheological properties that showed similar characteristics to elastomeric SBS PMBs. 30 refs., 12 figs., 2 tabs.

  15. Controlled Release from Recombinant Polymers

    Science.gov (United States)

    Price, Robert; Poursaid, Azadeh; Ghandehari, Hamidreza

    2014-01-01

    Recombinant polymers provide a high degree of molecular definition for correlating structure with function in controlled release. The wide array of amino acids available as building blocks for these materials lend many advantages including biorecognition, biodegradability, potential biocompatibility, and control over mechanical properties among other attributes. Genetic engineering and DNA manipulation techniques enable the optimization of structure for precise control over spatial and temporal release. Unlike the majority of chemical synthetic strategies used, recombinant DNA technology has allowed for the production of monodisperse polymers with specifically defined sequences. Several classes of recombinant polymers have been used for controlled drug delivery. These include, but are not limited to, elastin-like, silk-like, and silk-elastinlike proteins, as well as emerging cationic polymers for gene delivery. In this article, progress and prospects of recombinant polymers used in controlled release will be reviewed. PMID:24956486

  16. Forensics Investigation of Web Application Security Attacks

    OpenAIRE

    Amor Lazzez; Thabet Slimani

    2015-01-01

    Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the sec...

  17. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security......Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of several primitives in this model. We show that a secret-sharing scheme that is secure with threshold $t$ in the standard model is secure against superposition attacks if and only if the threshold is lowered to $t/2$. We use this result to give zero-knowledge proofs for all of NP in the common reference...

  18. Genetic attack on neural cryptography.

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  19. Panic Attacks and Panic Disorder

    Science.gov (United States)

    ... Major changes in your life, such as a divorce or the addition of a baby Smoking or ... quality of life. Complications that panic attacks may cause or be linked to include: Development of specific ...

  20. Genetic attack on neural cryptography

    International Nuclear Information System (INIS)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-01-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size

  1. Genetic attack on neural cryptography

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  2. What Is a Heart Attack?

    Science.gov (United States)

    ... medical center. Support from family and friends also can help relieve stress and anxiety. Let your loved ones know how you feel and what they can do to help you. Risk of a Repeat Heart Attack Once ...

  3. Synthetic biology of microbes synthesizing polyhydroxyalkanoates (PHA

    Directory of Open Access Journals (Sweden)

    Guo-Qiang Chen

    2016-12-01

    Full Text Available Microbial polyhydroxyalkanoates (PHA have been produced as bioplastics for various purposes. Under the support of China National Basic Research 973 Project, we developed synthetic biology methods to diversify the PHA structures into homo-, random, block polymers with improved properties to better meet various application requirements. At the same time, various pathways were assembled to produce various PHA from glucose as a simple carbon source. At the end, Halomonas bacteria were reconstructed to produce PHA in changing morphology for low cost production under unsterile and continuous conditions. The synthetic biology will advance the PHA into a bio- and material industry.

  4. Software-based Microarchitectural Attacks

    OpenAIRE

    Gruss, Daniel

    2017-01-01

    Modern processors are highly optimized systems where every single cycle of computation time matters. Many optimizations depend on the data that is being processed. Software-based microarchitectural attacks exploit effects of these optimizations. Microarchitectural side-channel attacks leak secrets from cryptographic computations, from general purpose computations, or from the kernel. This leakage even persists across all common isolation boundaries, such as processes, containers, and virtual ...

  5. OPERATION COBRA. Deliberate Attack, Exploitation

    Science.gov (United States)

    1984-05-25

    to attack Sens, then continue to Troyes , on the Seine River. CCA was in the north, crossing the Loing River at Souppes against light resistance and...advanced from Troyes and prepared positions close to Sens. Under strong artillery support, a task force from CCA (TF Oden) attacked the enemy frontally...movement towards the Seine River on 24 August with an advance toward Troyes . Facing the combat command were what remained of the 51st SS Brigade, light

  6. Polymer Directed Protein Assemblies

    Directory of Open Access Journals (Sweden)

    Patrick van Rijn

    2013-05-01

    Full Text Available Protein aggregation and protein self-assembly is an important occurrence in natural systems, and is in some form or other dictated by biopolymers. Very obvious influences of biopolymers on protein assemblies are, e.g., virus particles. Viruses are a multi-protein assembly of which the morphology is dictated by poly-nucleotides namely RNA or DNA. This “biopolymer” directs the proteins and imposes limitations on the structure like the length or diameter of the particle. Not only do these bionanoparticles use polymer-directed self-assembly, also processes like amyloid formation are in a way a result of directed protein assembly by partial unfolded/misfolded biopolymers namely, polypeptides. The combination of proteins and synthetic polymers, inspired by the natural processes, are therefore regarded as a highly promising area of research. Directed protein assembly is versatile with respect to the possible interactions which brings together the protein and polymer, e.g., electrostatic, v.d. Waals forces or covalent conjugation, and possible combinations are numerous due to the large amounts of different polymers and proteins available. The protein-polymer interacting behavior and overall morphology is envisioned to aid in clarifying protein-protein interactions and are thought to entail some interesting new functions and properties which will ultimately lead to novel bio-hybrid materials.

  7. Plant synthetic biology.

    Science.gov (United States)

    Liu, Wusheng; Stewart, C Neal

    2015-05-01

    Plant synthetic biology is an emerging field that combines engineering principles with plant biology toward the design and production of new devices. This emerging field should play an important role in future agriculture for traditional crop improvement, but also in enabling novel bioproduction in plants. In this review we discuss the design cycles of synthetic biology as well as key engineering principles, genetic parts, and computational tools that can be utilized in plant synthetic biology. Some pioneering examples are offered as a demonstration of how synthetic biology can be used to modify plants for specific purposes. These include synthetic sensors, synthetic metabolic pathways, and synthetic genomes. We also speculate about the future of synthetic biology of plants. Copyright © 2015 Elsevier Ltd. All rights reserved.

  8. Synthetic Cathinones ("Bath Salts")

    Science.gov (United States)

    ... Alcohol Club Drugs Cocaine Fentanyl Hallucinogens Inhalants Heroin Marijuana MDMA (Ecstasy/Molly) Methamphetamine Opioids Over-the-Counter Medicines Prescription Medicines Steroids (Anabolic) Synthetic Cannabinoids (K2/Spice) Synthetic Cathinones (Bath Salts) Tobacco/ ...

  9. Hydrolysis of synthetic mixed-acid phosphatides by phospholipase A from human pancreas

    NARCIS (Netherlands)

    Deenen, L.L.M. van; Haas, Gerard H. de; Heemskerk, C.H.Th.

    1963-01-01

    An investigation was made into the action of a human pancreatic phospholipase A on various synthetic phosphatides. L-α-Phosphatidyl ethanolamines were readily hydrolysed in an aqueous system by this enzyme. Synthetic lecithins, however, were not attacked in an appreciable rate by the mammalian

  10. Annotated Bibliography: Polymers in Concrete.

    Science.gov (United States)

    1982-10-01

    Berka , L., "Determination of the Creeping and Relaxation Functions . from the Results of the Creeping and Relaxation Tests," RILE. Symposium on Synthetic...However, for both foamed glass and . Mearlcrete concretes the agreement between prediction and experiment is not too bad . The reason for the serious...chemical resistance of various concretes is in the following order: (good) PIAC > AC > WCC ( bad ). The aggressive chemical agents that attack markedly

  11. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  12. PHOTOREFRACTIVE POLYMERS

    NARCIS (Netherlands)

    Morichere, D; Malliaras, G.G; Krasnikov, V.V.; Bolink, H.J; Hadziioannou, G

    The use of polymers as photorefractive materials offers many advantages : flexibility in synthesis, doping, processing and low cost. The required functionalities responsible for photorefractivity, namely charge generation, transport, trapping and linear electrooptic effect are given in the polymer

  13. Photorefractive polymers

    NARCIS (Netherlands)

    Bolink, Hendrik Jan; Hadziioannou, G

    1997-01-01

    This thesis describes the synthesis and properties of photorefractive polymers. Photorefractive polymers are materials in which the refractive index can be varied by the interaction with light. Unlike in numerous other photosensitive materials, in photorefractive materials this occurs via

  14. Development of partially biodegradable foams from PP/HMSPP blends with natural and synthetic polymers; Desenvolvimento de espumas parcialmente biodegradaveis a partir de blendas de PP/HMSPP com polimeros naturais e sinteticos

    Energy Technology Data Exchange (ETDEWEB)

    Cardoso, Elizabeth Carvalho Leite

    2014-07-01

    Polymers are used in various application and in different industrial areas providing enormous quantities of wastes in environment. Among diverse components of residues in landfills are polymeric materials, including Polypropylene, which contribute with 20 to 30% of total volume of solid residues. As polymeric materials are immune to microbial degradation, they remain in soil and in landfills as a semi-permanent residue. Environmental concerning in litter reduction is being directed to renewable polymers development for manufacturing of polymeric foams. Foamed polymers are considered future materials, with a wide range of applications; high density structural foams are specially used in civil construction, in replacement of metal, woods and concrete with a final purpose of reducing materials costs. At present development, it was possible the incorporation of PP/HMSPP polymeric matrix blends with sugarcane bagasse, PHB and PLA, in structural foams production. Thermal degradation at 100, 120 and 160 deg C temperatures was not enough to induce biodegradability. Gamma irradiation degradation, at 50, 100, 200 and 500 kGy showed effective for biodegradability induction. Irradiated bagasse blends suffered surface erosion, in favor of water uptake and consequently, a higher biodegradation in bulk structure. (author)

  15. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error-prone and impractica......Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error......-prone and impracticable for large systems. Nonetheless, the automated generation of attack trees has only been explored in connection to computer networks and levering rich models, whose analysis typically leads to an exponential blow-up of the state space. We propose a static analysis approach where attack trees...... are automatically inferred from a process algebraic specification in a syntax-directed fashion, encompassing a great many application domains and avoiding incurring systematically an exponential explosion. Moreover, we show how the standard propositional denotation of an attack tree can be used to phrase...

  16. Polymer and polymer-hybrid nanoparticles from synthesis to biomedical applications

    CERN Document Server

    Rangelov, Stanislav

    2013-01-01

    Polymeric and hybrid nanoparticles have received increased scientific interest in terms of basic research as well as commercial applications, promising a variety of uses for nanostructures in fields including bionanotechnology and medicine. Condensing the relevant research into a comprehensive reference, Polymer and Polymer-Hybrid Nanoparticles: From Synthesis to Biomedical Applications covers an array of topics from synthetic procedures and macromolecular design to possible biomedical applications of nanoparticles and materials based on original and unique polymers. The book presents a well-r

  17. Development of polymers for large scale roll-to-roll processing of polymer solar cells

    DEFF Research Database (Denmark)

    Carlé, Jon Eggert

    Development of polymers for large scale roll-to-roll processing of polymer solar cells Conjugated polymers potential to both absorb light and transport current as well as the perspective of low cost and large scale production has made these kinds of material attractive in solar cell research....... The research field of polymer solar cells (PSCs) is rapidly progressing along three lines: Improvement of efficiency and stability together with the introduction of large scale production methods. All three lines are explored in this work. The thesis describes low band gap polymers and why these are needed....... Polymer of this type display broader absorption resulting in better overlap with the solar spectrum and potentially higher current density. Synthesis, characterization and device performance of three series of polymers illustrating how the absorption spectrum of polymers can be manipulated synthetically...

  18. Polymer Brushes

    NARCIS (Netherlands)

    Vos, de W.M.; Kleijn, J.M.; Keizer, de A.; Cosgrove, T.; Cohen Stuart, M.A.

    2010-01-01

    A polymer brush can be defined as a dense array of polymers end-attached to an interface that stretch out into the surrounding medium. Polymer brushes have been investigated for the past 30 years and have shown to be an extremely useful tool to control interfacial properties. This review is intended

  19. An Analysis of Attacks on Blockchain Consensus

    OpenAIRE

    Bissias, George; Levine, Brian Neil; Ozisik, A. Pinar; Andresen, Gavin

    2016-01-01

    We present and validate a novel mathematical model of the blockchain mining process and use it to conduct an economic evaluation of the double-spend attack, which is fundamental to all blockchain systems. Our analysis focuses on the value of transactions that can be secured under a conventional double-spend attack, both with and without a concurrent eclipse attack. Our model quantifies the importance of several factors that determine the attack's success, including confirmation depth, attacke...

  20. Recurrent spontaneous attacks of dizziness.

    Science.gov (United States)

    Lempert, Thomas

    2012-10-01

    This article describes the common causes of recurrent vertigo and dizziness that can be diagnosed largely on the basis of history. Ninety percent of spontaneous recurrent vertigo and dizziness can be explained by six disorders: (1) Ménière disease is characterized by vertigo attacks, lasting 20 minutes to several hours, with concomitant hearing loss, tinnitus, and aural fullness. Aural symptoms become permanent during the course of the disease. (2) Attacks of vestibular migraine may last anywhere from minutes to days. Most patients have a previous history of migraine headaches, and many experience migraine symptoms during the attack. (3) Vertebrobasilar TIAs affect older adults with vascular risk factors. Most attacks last less than 1 hour and are accompanied by other symptoms from the posterior circulation territory. (4) Vestibular paroxysmia is caused by vascular compression of the eighth cranial nerve. It manifests itself with brief attacks of vertigo that recur many times per day, sometimes with concomitant cochlear symptoms. (5) Orthostatic hypotension causes brief episodes of dizziness lasting seconds to a few minutes after standing up and is relieved by sitting or lying down. In older adults, it may be accompanied by supine hypertension. (6) Panic attacks usually last minutes, occur in specific situations, and are accompanied by choking, palpitations, tremor, heat, and anxiety. Less common causes of spontaneous recurrent vertigo and dizziness include perilymph fistula, superior canal dehiscence, autoimmune inner ear disease, otosclerosis, cardiac arrhythmia, and medication side effects. Neurologists need to venture into otolaryngology, internal medicine, and psychiatry to master the differential diagnosis of recurrent dizziness.

  1. Identifying Vulnerabilities and Hardening Attack Graphs for Networked Systems

    Energy Technology Data Exchange (ETDEWEB)

    Saha, Sudip; Vullinati, Anil K.; Halappanavar, Mahantesh; Chatterjee, Samrat

    2016-09-15

    We investigate efficient security control methods for protecting against vulnerabilities in networked systems. A large number of interdependent vulnerabilities typically exist in the computing nodes of a cyber-system; as vulnerabilities get exploited, starting from low level ones, they open up the doors to more critical vulnerabilities. These cannot be understood just by a topological analysis of the network, and we use the attack graph abstraction of Dewri et al. to study these problems. In contrast to earlier approaches based on heuristics and evolutionary algorithms, we study rigorous methods for quantifying the inherent vulnerability and hardening cost for the system. We develop algorithms with provable approximation guarantees, and evaluate them for real and synthetic attack graphs.

  2. Mitigating Higher Ed Cyber Attacks

    Science.gov (United States)

    Rogers, Gary; Ashford, Tina

    2015-01-01

    In this presentation we will discuss the many and varied cyber attacks that have recently occurred in the higher ed community. We will discuss the perpetrators, the victims, the impact and how these institutions have evolved to meet this threat. Mitigation techniques and defense strategies will be covered as will a discussion of effective security…

  3. Detection of complex cyber attacks

    Science.gov (United States)

    Gregorio-de Souza, Ian; Berk, Vincent H.; Giani, Annarita; Bakos, George; Bates, Marion; Cybenko, George; Madory, Doug

    2006-05-01

    One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed. Similarly, an administrator may never make the link between deteriorating response times from the database server and an attacker exfiltrating trusted data, if these facts aren't presented together. Current Security Information Management Systems (SIMS) can collect and represent diverse data but lack sufficient correlation algorithms. By using a Process Query System, we were able to quickly bring together data flowing from many sources, including NIDS, HIDS, server logs, CPU load and memory usage, etc. We constructed PQS models that describe dynamic behavior of complicated attacks and failures, allowing us to detect and differentiate simultaneous sophisticated attacks on a target network. In this paper, we discuss the benefits of implementing such a multistage cyber attack detection system using PQS. We focus on how data from multiple sources can be combined and used to detect and track comprehensive network security events that go unnoticed using conventional tools.

  4. Evolvable synthetic neural system

    Science.gov (United States)

    Curtis, Steven A. (Inventor)

    2009-01-01

    An evolvable synthetic neural system includes an evolvable neural interface operably coupled to at least one neural basis function. Each neural basis function includes an evolvable neural interface operably coupled to a heuristic neural system to perform high-level functions and an autonomic neural system to perform low-level functions. In some embodiments, the evolvable synthetic neural system is operably coupled to one or more evolvable synthetic neural systems in a hierarchy.

  5. Synthetic sustained gene delivery systems.

    Science.gov (United States)

    Agarwal, Ankit; Mallapragada, Surya K

    2008-01-01

    Gene therapy today is hampered by the need of a safe and efficient gene delivery system that can provide a sustained therapeutic effect without cytotoxicity or unwanted immune responses. Bolus gene delivery in solution results in the loss of delivered factors via lymphatic system and may cause undesired effects by the escape of bioactive molecules to distant sites. Controlled gene delivery systems, acting as localized depot of genes, provide an extended sustained release of genes, giving prolonged maintenance of the therapeutic level of encoded proteins. They also limit the DNA degradation in the nuclease rich extra-cellular environment. While attempts have been made to adapt existing controlled drug delivery technologies, more novel approaches are being investigated for controlled gene delivery. DNA encapsulated in nano/micro spheres of polymers have been administered systemically/orally to be taken up by the targeted tissues and provide sustained release once internalized. Alternatively, DNA entrapped in hydrogels or scaffolds have been injected/implanted in tissues/cavities as platforms for gene delivery. The present review examines these different modalities for sustained delivery of viral and non-viral gene-delivery vectors. Design parameters and release mechanisms of different systems made with synthetic or natural polymers are presented along with their prospective applications and opportunities for continuous development.

  6. [From synthetic biology to synthetic humankind].

    Science.gov (United States)

    Nouvel, Pascal

    2015-01-01

    In this paper, we propose an historical survey of the expression "synthetic biology" in order to identify its main philosophical components. The result of the analysis is then used to investigate the meaning of the notion of "synthetic man". It is shown that both notions share a common philosophical background that can be summed up by the short but meaningful assertion: "biology is technology". The analysis allows us to distinguish two notions that are often confused in transhumanist literature: the notion of synthetic man and the notion of renewed man. The consequences of this crucial distinction are discussed. Copyright © 2015 Académie des sciences. Published by Elsevier SAS. All rights reserved.

  7. Liquid crystalline order in polymers

    CERN Document Server

    Blumstein, Alexandre

    1978-01-01

    Liquid Crystalline Order in Polymers examines the topic of liquid crystalline order in systems containing rigid synthetic macromolecular chains. Each chapter of the book provides a review of one important area of the field. Chapter 1 discusses scattering in polymer systems with liquid crystalline order. It also introduces the field of liquid crystals. Chapter 2 treats the origin of liquid crystalline order in macromolecules by describing the in-depth study of conformation of such macromolecules in their unassociated state. The chapters that follow describe successively the liquid crystalli

  8. Entangled Polymer Melts in Extensional Flow

    DEFF Research Database (Denmark)

    Hengeller, Ludovica

    Many commercial materials derived from synthetic polymers exhibit a complex response under different processing operations such as fiber formation, injection moulding,film blowing, film casting or coatings. They can be processed both in the solid or in the melted state. Often they may contain two...... or more different polymers in addition to additives, fillers or solvents in order to modify the properties of the final product. Usually, it is also desired to improve the processability. For example the supplement of a high molecular weight component improves the stability in elongational flows....... Understanding the behaviour of polymer melts and solutions in complex non-linearflows is crucial for the design of polymeric materials and polymer processes. Through rheological characterization, in shear and extensional flow, of model polymer systems,i.e. narrow molar mass distribution polymer melts...

  9. Polymer Electrolytes

    Science.gov (United States)

    Hallinan, Daniel T.; Balsara, Nitash P.

    2013-07-01

    This review article covers applications in which polymer electrolytes are used: lithium batteries, fuel cells, and water desalination. The ideas of electrochemical potential, salt activity, and ion transport are presented in the context of these applications. Potential is defined, and we show how a cell potential measurement can be used to ascertain salt activity. The transport parameters needed to fully specify a binary electrolyte (salt + solvent) are presented. We define five fundamentally different types of homogeneous electrolytes: type I (classical liquid electrolytes), type II (gel electrolytes), type III (dry polymer electrolytes), type IV (dry single-ion-conducting polymer electrolytes), and type V (solvated single-ion-conducting polymer electrolytes). Typical values of transport parameters are provided for all types of electrolytes. Comparison among the values provides insight into the transport mechanisms occurring in polymer electrolytes. It is desirable to decouple the mechanical properties of polymer electrolyte membranes from the ionic conductivity. One way to accomplish this is through the development of microphase-separated polymers, wherein one of the microphases conducts ions while the other enhances the mechanical rigidity of the heterogeneous polymer electrolyte. We cover all three types of conducting polymer electrolyte phases (types III, IV, and V). We present a simple framework that relates the transport parameters of heterogeneous electrolytes to homogeneous analogs. We conclude by discussing electrochemical stability of electrolytes and the effects of water contamination because of their relevance to applications such as lithium ion batteries.

  10. Polymer chemistry (revised edition)

    International Nuclear Information System (INIS)

    Kim, Jae Mum

    1987-02-01

    This book deals with polymer chemistry, which is divided into fourteen chapters. The contents of this book are development of polymer chemistry, conception of polymer, measurement of polymer chemistry, conception of polymer, measurement of polymer, molecule structure of polymer, thermal prosperities of solid polymer, basic theory of polymerization, radical polymerization, ion polymerization, radical polymerization, copolymerization, polymerization by step-reaction, polymer reaction, crown polymer and inorganic polymer on classification and process of creation such as polymeric sulfur and carbon fiber.

  11. Peacetime Use of Computer Network Attack

    National Research Council Canada - National Science Library

    Busby, Daniel

    2000-01-01

    .... PDD-63 alerts the nation to prepare for impending cyber attacks. This paper examines the nature, scale, and likelihood of cyber attacks posited in PDD-63 and finds that the country does not face an imminent "electronic Pearl Harbor...

  12. Women's Heart Disease: Heart Attack Symptoms

    Science.gov (United States)

    ... of this page please turn JavaScript on. Feature: Women's Heart Disease Heart Attack Symptoms Past Issues / Winter ... most common heart attack symptom in men and women is chest pain or discomfort. However, women also ...

  13. Stochastic Model of TCP SYN Attacks

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2011-08-01

    Full Text Available A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.Article in Lithuanian

  14. Robust Detection of Stepping-Stone Attacks

    National Research Council Canada - National Science Library

    He, Ting; Tong, Lang

    2006-01-01

    The detection of encrypted stepping-stone attack is considered. Besides encryption and padding, the attacker is capable of inserting chaff packets and perturbing packet timing and transmission order...

  15. Using an ontology for network attack planning

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-09-01

    Full Text Available The modern complexity of network attacks and their counter-measures (cyber operations) requires detailed planning. This paper presents a Network Attack Planning ontology which is aimed at providing support for planning such network operations within...

  16. Bio-based and recycled polymers for cleaner production : an assessment of plastics and fibres

    NARCIS (Netherlands)

    Shen, L.|info:eu-repo/dai/nl/310872022

    2011-01-01

    Today, almost all man-made plastics and fibres are produced from synthetic polymers. Synthetic polymers, made from petroleum which took millions of years to form, have three sustainability challenges: (i) the limited fossil fuel resources, (ii) the environmental impacts caused by non-degradable

  17. An Integrated Laboratory Approach toward the Preparation of Conductive Poly(phenylene vinylene) Polymers

    Science.gov (United States)

    Knoerzer, Timm A.; Balaich, Gary J.; Miller, Hannah A.; Iacono, Scott T.

    2014-01-01

    Poly(phenylene vinylene) (PPV) represents an important class of conjugated, conducting polymers that have been readily exploited in the preparation of organic electronic materials. In this experiment, students prepare a PPV polymer via a facile multistep synthetic sequence with robust spectroscopic evaluation of synthetic intermediates and the…

  18. Designing synthetic biology.

    Science.gov (United States)

    Agapakis, Christina M

    2014-03-21

    Synthetic biology is frequently defined as the application of engineering design principles to biology. Such principles are intended to streamline the practice of biological engineering, to shorten the time required to design, build, and test synthetic gene networks. This streamlining of iterative design cycles can facilitate the future construction of biological systems for a range of applications in the production of fuels, foods, materials, and medicines. The promise of these potential applications as well as the emphasis on design has prompted critical reflection on synthetic biology from design theorists and practicing designers from many fields, who can bring valuable perspectives to the discipline. While interdisciplinary connections between biologists and engineers have built synthetic biology via the science and the technology of biology, interdisciplinary collaboration with artists, designers, and social theorists can provide insight on the connections between technology and society. Such collaborations can open up new avenues and new principles for research and design, as well as shed new light on the challenging context-dependence-both biological and social-that face living technologies at many scales. This review is inspired by the session titled "Design and Synthetic Biology: Connecting People and Technology" at Synthetic Biology 6.0 and covers a range of literature on design practice in synthetic biology and beyond. Critical engagement with how design is used to shape the discipline opens up new possibilities for how we might design the future of synthetic biology.

  19. Electrospinning polymer blends for biomimetic scaffolds for ACL tissue engineering

    Science.gov (United States)

    Garcia, Vanessa Lizeth

    The anterior cruciate ligament (ACL) rupture is one of the most common knee injuries. Current ACL reconstructive strategies consist of using an autograft or an allograft to replace the ligament. However, limitations have led researchers to create tissue engineered grafts, known as scaffolds, through electrospinning. Scaffolds made of natural and synthetic polymer blends have the potential to promote cell adhesion while having strong mechanical properties. However, enzymes found in the knee are known to degrade tissues and affect the healing of intra-articular injuries. Results suggest that the natural polymers used in this study modify the thermal properties and tensile strength of the synthetic polymers when blended. Scanning electron microscopy display bead-free and enzyme biodegradability of the fibers. Raman spectroscopy confirms the presence of the natural and synthetic polymers in the scaffolds while, amino acid analysis present the types of amino acids and their concentrations found in the natural polymers.

  20. Attack Graph Construction for Security Events Analysis

    Directory of Open Access Journals (Sweden)

    Andrey Alexeevich Chechulin

    2014-09-01

    Full Text Available The paper is devoted to investigation of the attack graphs construction and analysis task for a network security evaluation and real-time security event processing. Main object of this research is the attack modeling process. The paper contains the description of attack graphs building, modifying and analysis technique as well as overview of implemented prototype for network security analysis based on attack graph approach.

  1. Cycloadditions in modern polymer chemistry.

    Science.gov (United States)

    Delaittre, Guillaume; Guimard, Nathalie K; Barner-Kowollik, Christopher

    2015-05-19

    Synthetic polymer chemistry has undergone two major developments in the last two decades. About 20 years ago, reversible-deactivation radical polymerization processes started to give access to a wide range of polymeric architectures made from an almost infinite reservoir of functional building blocks. A few years later, the concept of click chemistry revolutionized the way polymer chemists approached synthetic routes. Among the few reactions that could qualify as click, the copper-catalyzed azide-alkyne cycloaddition (CuAAC) initially stood out. Soon, many old and new reactions, including cycloadditions, would further enrich the synthetic macromolecular chemistry toolbox. Whether click or not, cycloadditions are in any case powerful tools for designing polymeric materials in a modular fashion, with a high level of functionality and, sometimes, responsiveness. Here, we wish to describe cycloaddition methodologies that have been reported in the last 10 years in the context of macromolecular engineering, with a focus on those developed in our laboratories. The overarching structure of this Account is based on the three most commonly encountered cycloaddition subclasses in organic and macromolecular chemistry: 1,3-dipolar cycloadditions, (hetero-)Diels-Alder cycloadditions ((H)DAC), and [2+2] cycloadditions. Our goal is to briefly describe the relevant reaction conditions, the advantages and disadvantages, and the realized polymer applications. Furthermore, the orthogonality of most of these reactions is highlighted because it has proven highly beneficial for generating unique, multifunctional polymers in a one-pot reaction. The overview on 1,3-dipolar cycloadditions is mostly centered on the application of CuAAC as the most travelled route, by far. Besides illustrating the capacity of CuAAC to generate complex polymeric architectures, alternative 1,3-dipolar cycloadditions operating without the need for a catalyst are described. In the area of (H)DA cycloadditions

  2. Synthetic cannabinoid: prevalence, mechanisms of addiction development, mental disorders associated with the use of synthetic cannabinoid

    Directory of Open Access Journals (Sweden)

    Antsyborov A.V.

    2017-04-01

    Full Text Available according to the authors among the new psychoactive substances, the number of which is growing every year, despite the measures aimed at the obstacles to their dissemination there discovered the most frequent violations of psychotic conditions associated with use of synthetic cannabinoid in clinical practice. On the black market, they are distributed through online shops, under the guise of herbal mixtures for Smoking. When ingested, this group of drugs at the peak of intoxication raises a number of mental (different according to the depth of impaired consciousness, auditory and visual hallucinations, panic attacks, acute psychotic paranoid disorders, catatonic stupor, polar affective disorders, acute polythematic delusional symptoms and somatic disorders (disorders of heart rhythm and conduction, acute ischemic disorders, hypertension, depression of respiratory activity, violation of thermoregulation, development of acute renal failure, vomiting, expressed cephalgia, clinic of hypokalemia. In the reviewed literature and authors own observations there have been discovered some cases of mental addiction development to synthetic cannabinoids. The analysis of new literature data and own clinical observations helped the authors to compare the psychotropic effects caused by this group of drugs, relative to other known surfactants. The toxic effects of CSC on the body greatly exceeds the use of plant cannabinoids, and it has almost the same effects as the synthetic cathinone’s. The speed of formation of psychological dependence is lower compared to synthetic cathinone. Developing current strategies for diagnosis, treatment, and rehabilitation of patients who use synthetic cannabinoids remains an important task for practical healthcare.

  3. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...

  4. Automated classification of computer network attacks

    CSIR Research Space (South Africa)

    Van Heerden, R

    2013-11-01

    Full Text Available according to the relevant types of attack scenarios depicted in the ontology. The two network attack instances are the Distributed Denial of Service attack on SpamHaus in 2013 and the theft of 42 million Rand ($6.7 million) from South African Postbank...

  5. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    Science.gov (United States)

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  6. Rheological properties of PHPA polymer support fluids

    OpenAIRE

    Lam, Carlos; Martin, P J; Jefferis, S A

    2015-01-01

    Synthetic polymer fluids are becoming a popular replacement for bentonite slurries to support excavations for deep foundation elements. However, the rheological properties of the polymer fluids used in excavation support have not been studied in detail, and there is currently confusion about the choice of mathematical models for this type of fluid. To advance the current state of knowledge, a laboratory study has been performed to investigate the steady-shear viscosity and transient viscoelas...

  7. Surface and Bulk Modification of Synthetic Textiles to Improve Dyeability

    NARCIS (Netherlands)

    Agrawal, P. (Pramod); Parvinzadeh Gashti, M.; Willoughby, J.

    2011-01-01

    Synthetic fibers, mainly polyethylene terephthalate (PET), polyamide (PA), polyacrylonitrile (PAN) and polypropylene (PP), are the most widely used polymers in the textile industry. These fibers surpass the production of natural fibers with a market share of 54.4%. The advantages of these fibers are

  8. Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers

    NARCIS (Netherlands)

    Pieters, Wolter; Davarynejad, Mohsen

    2015-01-01

    Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of multiple steps and alternative paths. It is possible to derive properties of the overall attacks from properties of individual steps, such as cost for the attacker and probability of success. However, in

  9. Whispering through DDoS attack

    OpenAIRE

    Miralem Mehic; Jiri Slachta; Miroslav Voznak

    2016-01-01

    Denial of service (DoS) attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS) attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes o...

  10. Script-viruses Attacks on UNIX OS

    Directory of Open Access Journals (Sweden)

    D. M. Mikhaylov

    2010-06-01

    Full Text Available In this article attacks on UNIX OS are considered. Currently antivirus developers are concentrated on protecting systems from viruses that are most common and attack popular operating systems. If the system or its components are not often attacked then the antivirus products are not protecting these components as it is not profitable. The same situation is with script-viruses for UNIX OS as most experts consider that it is impossible for such viruses to get enough rights to attack. Nevertheless the main conclusion of this article is the fact that such viruses can be very powerful and can attack systems and get enough rights.

  11. Synthetic Defects for Vibrothermography

    Science.gov (United States)

    Renshaw, Jeremy; Holland, Stephen D.; Thompson, R. Bruce; Eisenmann, David J.

    2010-02-01

    Synthetic defects are an important tool used for characterizing the performance of nondestructive evaluation techniques. Viscous material-filled synthetic defects were developed for use in vibrothermography (also known as sonic IR) as a tool to improve inspection accuracy and reliability. This paper describes how the heat-generation response of these VMF synthetic defects is similar to the response of real defects. It also shows how VMF defects can be applied to improve inspection accuracy for complex industrial parts and presents a study of their application in an aircraft engine stator vane.

  12. Synthetic biological networks

    International Nuclear Information System (INIS)

    Archer, Eric; Süel, Gürol M

    2013-01-01

    Despite their obvious relationship and overlap, the field of physics is blessed with many insightful laws, while such laws are sadly absent in biology. Here we aim to discuss how the rise of a more recent field known as synthetic biology may allow us to more directly test hypotheses regarding the possible design principles of natural biological networks and systems. In particular, this review focuses on synthetic gene regulatory networks engineered to perform specific functions or exhibit particular dynamic behaviors. Advances in synthetic biology may set the stage to uncover the relationship of potential biological principles to those developed in physics. (review article)

  13. Protecting Cryptographic Memory against Tampering Attack

    DEFF Research Database (Denmark)

    Mukherjee, Pratyay

    In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks. In prac......In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks....... In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous works in the past decade. Tampering attacks are a class of such physical attacks where the attacker can change the memory/computation, gains additional (non-black-box) knowledge by interacting...... with the faulty device and then tries to break the security. Prior works show that generically approaching such problem is notoriously difficult. So, in this dissertation we attempt to solve an easier question, known as memory-tampering, where the attacker is allowed tamper only with the memory of the device...

  14. Synthesis of a Molecularly Imprinted Polymer for Dioxin

    Directory of Open Access Journals (Sweden)

    Magda Brattoli

    2006-08-01

    Full Text Available A molecularly imprinted polymer for recognising selectively 2,3,7,8-tetrachlorodibenzodioxin (TCDD was made by a new non-covalent method employing a“dummy” template. The proposed way represents a simplification of a synthetic schemeproposed by Lübke et al.[1] for covalent imprinting. Comparison of extraction yields of thenovel polymer, a non imprinted polymer and an imprinting polymer, prepared by theoriginal procedure demonstrates the binding capacity of the proposed polymer, which is inprinciple applicable to solid phase extraction (SPE of dioxin.

  15. Release behavior of drugs from various natural gums and polymers.

    Science.gov (United States)

    Singh, Anupama; Sharma, Pramod Kumar; Malviya, Rishabha

    2011-01-01

    Polymers are the high molecular weight compounds of natural or synthetic origin, widely used in drug delivery of formulations. These polymers are further classified as hydrophilic or hydrophobic in nature. Depending upon this characteristic, polymers exhibit different release behavior in different media. This property plays an important role in the selection of polymers for controlled, sustained or immediate release formulations. The review highlights the literatures related to the research made on several polymers regarding the release kinetics which made them a novel approach for modifying the action of the particular formulation.

  16. Polymer Brushes: Synthesis, Characterization, Applications

    Science.gov (United States)

    Advincula, Rigoberto C.; Brittain, William J.; Caster, Kenneth C.; Rühe, Jürgen

    2004-09-01

    Materials scientists, polymer chemists, surface physicists and materials engineers will find this book a complete and detailed treatise on the field of polymer brushes, their synthesis, characterization and manifold applications. In a first section, the various synthetic pathways and different surface materials are introduced and explained, followed by a second section covering important aspects of characterization and analysis in both flat surfaces and particles. These specific surface initiated polymerization (SIP) systems such as linear polymers, homopolymers, block copolymers, and hyperbranched polymers are unique compared to previously reported systems by chemisorption or physisorption. They have found their way in both large-scale and miniature applications of polymer brushes, which is covered in the last section. Such 'hairy' surfaces offer fascinating opportunities for addressing numerous problems of both academic and, in particular, industrial interest: high-quality, functional or protective coatings, composite materials, surface engineered particles, metal-organic interfaces, biological applications, micro-patterning, colloids, nanoparticles, functional devices, and many more. It is the desire of the authors that this book will be of benefit to readers who want to "brush-up on polymers".

  17. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2015-01-01

    through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based......Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identified...... on invalidating policies in the system model by identifying possible sequences of actions that lead to an attack. The generated attacks are precise enough to illustrate the threat, and they are general enough to hide the details of individual steps....

  18. Whispering through DDoS attack

    Directory of Open Access Journals (Sweden)

    Miralem Mehic

    2016-03-01

    Full Text Available Denial of service (DoS attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes of hiding data or concealing the existing covert channel. In addition, in this paper we analyzed the possibility of detection of such covert communication with the well-known statistical method. Also, we proposed the coordination mechanisms of the attack which may be used. A lot of research has been done in order to describe and prevent DDoS attacks, yet research on steganography on this field is still scarce.

  19. Network Protection Against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Petr Dzurenda

    2015-03-01

    Full Text Available The paper deals with possibilities of the network protection against Distributed Denial of Service attacks (DDoS. The basic types of DDoS attacks and their impact on the protected network are presented here. Furthermore, we present basic detection and defense techniques thanks to which it is possible to increase resistance of the protected network or device against DDoS attacks. Moreover, we tested the ability of current commercial Intrusion Prevention Systems (IPS, especially Radware DefensePro 6.10.00 product against the most common types of DDoS attacks. We create five scenarios that are varied in type and strength of the DDoS attacks. The attacks intensity was much greater than the normal intensity of the current DDoS attacks.

  20. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  1. Cache timing attacks on recent microarchitectures

    DEFF Research Database (Denmark)

    Andreou, Alexandres; Bogdanov, Andrey; Tischhauser, Elmar Wolfgang

    2017-01-01

    Cache timing attacks have been known for a long time, however since the rise of cloud computing and shared hardware resources, such attacks found new potentially devastating applications. One prominent example is S$A (presented by Irazoqui et al at S&P 2015) which is a cache timing attack against...... AES or similar algorithms in virtualized environments. This paper applies variants of this cache timing attack to Intel's latest generation of microprocessors. It enables a spy-process to recover cryptographic keys, interacting with the victim processes only over TCP. The threat model is a logically...... separated but CPU co-located attacker with root privileges. We report successful and practically verified applications of this attack against a wide range of microarchitectures, from a two-core Nehalem processor (i5-650) to two-core Haswell (i7-4600M) and four-core Skylake processors (i7-6700). The attack...

  2. BioArtificial polymers

    Science.gov (United States)

    Szałata, Kamila; Gumi, Tania

    2017-07-01

    Nowadays, the polymer science has impact in practically all life areas. Countless benefits coming from the usage of materials with high mechanical and chemical resistance, variety of functionalities and potentiality of modification drive to the development of new application fields. Novel approaches of combining these synthetic substances with biomolecules lead to obtain multifunctional hybrid conjugates which merge the bioactivity of natural component with outstanding properties of artificial polymer. Over the decades, an immense progress in bioartificial composites domain allowed to reach a high level of knowledge in terms of natural-like systems engineering, leading to diverse strategies of biomolecule immobilization. Together with different available options, including covalent and noncovalent attachment, come various challenges, related mainly with maintaining the biological activity of fixed molecules. Even though the amount of applications that achieve commercial status is still not substantial, and is expanding continuously in the disciplines like "smart materials," biosensors, delivery systems, nanoreactors and many others. A huge number of remarkable developments reported in the literature present a potential of bioartificial conjugates as a fabrics with highly controllable structure and multiple functionalities, serving as a powerful nanotechnological tool. This novel approach brings closer biologists, chemists and engineers, who sharing their effort and complementing the knowledge can revolutionize the field of bioartificial polymer science.

  3. Preparation and development of FeS2 Quantum Dots on SiO2 nanostructures immobilized in biopolymers and synthetic polymers as nanoparticles and nanofibers catalyst for antibiotic degradation.

    Science.gov (United States)

    Gao, Wei; Razavi, Razieh; Fakhri, Ali

    2018-03-22

    The FeS 2 Quantum Dots (QDs) decorated SiO 2 nanostructure were prepared by hydrothermal synthesis method. Chitosan and polypyrrole as polymers were used for the immobilization process. The characteristic structure of prepared samples was analyzed using several techniques such as X-ray diffraction, scanning and transmittance electron microscopy, photoluminescence and UV-vis spectroscopy. The mean crystallite sizes of FeS 2 QDs/SiO 2 nanocomposites, FeS 2 QDs/SiO 2 -chitosan nanocomposites and FeS 2 QDs/SiO 2 -polypyrrole nanohybrids are 56.12, 76.38, and 83.24nm, respectively. The band gap energy of FeS 2 QDs/SiO 2 nanocomposites, FeS 2 QDs/SiO 2 -chitosan nanocomposites and FeS 2 QDs/SiO 2 -polypyrrole nanohybrids were found out to be 3.0, 2.8, and 2.7eV, respectively. The photocatalysis properties were investigated by degradation of ampicillin under UV light illumination. The effect of experimental variables, such as, pH and time, on photo-degradation efficiency was studied. The results show that the three prepared samples nanopowders under UV light was in pH3 at 60min. As it could be seen that the amount of ampicillin degradation was increased with the loading of FeS 2 QDs on SiO 2 and FeS 2 QDs/SiO 2 on chitosan nanoparticles and polypyrrole nanofiber. The antibacterial experiment was investigated under visible light illumination and the FeS 2 QDs/SiO 2 -chitosan nanocomposites and FeS 2 QDs/SiO 2 -polypyrrole nanohybrids demonstrate good antibacterial compared to FeS 2 QDs/SiO 2 nanocomposites. Copyright © 2018 Elsevier B.V. All rights reserved.

  4. Synthesis of regioregular pentacene-containing conjugated polymers

    KAUST Repository

    Okamoto, Toshihiro; Jiang, Ying; Becerril, Hector A.; Hong, Sanghyun; Senatore, Michelle L.; Tang, Ming L.; Toney, Michael F.; Siegrist, Theo; Bao, Zhenan

    2011-01-01

    We report the synthesis and characterization of a new class of regioregular pentacene-containing conjugated polymers via our synthetic routes reported previously. We found that our regioregular pentacene polymers showed improved ordering than their regiorandom counterpart as well as ambipolar OFET performance. © 2011 The Royal Society of Chemistry.

  5. Natural and synthetic biomaterials for controlled drug delivery.

    Science.gov (United States)

    Kim, Jang Kyoung; Kim, Hyung Jin; Chung, Jee-Young; Lee, Jong-Hwan; Young, Seok-Beom; Kim, Yong-Hee

    2014-01-01

    A wide variety of delivery systems have been developed and many products based on the drug delivery technology are commercially available. The development of controlled-release technologies accelerated new dosage form design by altering pharmacokinetic and pharmacodynamics profiles of given drugs, resulting in improved efficacy and safety. Various natural or synthetic polymers have been applied to make matrix, reservoir or implant forms due to the characteristics of polymers, especially ease of control for modifications of biocompatibility, biodegradation, porosity, charge, mechanical strength and hydrophobicity/hydrophilicity. Hydrogel is a hydrophilic, polymeric network capable of imbibing large amount of water and biological fluids. This review article introduces various applications of natural and synthetic polymer-based hydrogels from pharmaceutical, biomedical and bioengineering points of view.

  6. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  7. Attack-Resistant Trust Metrics

    Science.gov (United States)

    Levien, Raph

    The Internet is an amazingly powerful tool for connecting people together, unmatched in human history. Yet, with that power comes great potential for spam and abuse. Trust metrics are an attempt to compute the set of which people are trustworthy and which are likely attackers. This chapter presents two specific trust metrics developed and deployed on the Advogato Website, which is a community blog for free software developers. This real-world experience demonstrates that the trust metrics fulfilled their goals, but that for good results, it is important to match the assumptions of the abstract trust metric computation to the real-world implementation.

  8. Models for synthetic biology.

    Science.gov (United States)

    Kaznessis, Yiannis N

    2007-11-06

    Synthetic biological engineering is emerging from biology as a distinct discipline based on quantification. The technologies propelling synthetic biology are not new, nor is the concept of designing novel biological molecules. What is new is the emphasis on system behavior. The objective is the design and construction of new biological devices and systems to deliver useful applications. Numerous synthetic gene circuits have been created in the past decade, including bistable switches, oscillators, and logic gates, and possible applications abound, including biofuels, detectors for biochemical and chemical weapons, disease diagnosis, and gene therapies. More than fifty years after the discovery of the molecular structure of DNA, molecular biology is mature enough for real quantification that is useful for biological engineering applications, similar to the revolution in modeling in chemistry in the 1950s. With the excitement that synthetic biology is generating, the engineering and biological science communities appear remarkably willing to cross disciplinary boundaries toward a common goal.

  9. Technical Assessment: Synthetic Biology

    Science.gov (United States)

    2015-01-01

    Pfizer, Bausch & Lomb, Coca - Cola , and other Fortune 500 companies 8 Data estimated by the... financial prize for ideas to drive forward the production of a sensor relying on synthetic organisms that can detect exposure to 500 specific chemicals

  10. Polymers for enhanced oil recovery: fundamentals and selection criteria.

    Science.gov (United States)

    Rellegadla, Sandeep; Prajapat, Ganshyam; Agrawal, Akhil

    2017-06-01

    With a rising population, the demand for energy has increased over the years. As per the projections, both fossil fuel and renewables will remain as major energy source (678 quadrillion BTU) till 2030 with fossil fuel contributing 78% of total energy consumption. Hence, attempts are continuously made to make fossil fuel production more sustainable and cheaper. From the past 40 years, polymer flooding has been carried out in marginal oil fields and have proved to be successful in many cases. The common expectation from polymer flooding is to obtain 50% ultimate recovery with 15 to 20% incremental recovery over secondary water flooding. Both naturally derived polymers like xanthan gum and synthetic polymers like partially hydrolyzed polyacrylamide (HPAM) have been used for this purpose. Earlier laboratory and field trials revealed that salinity and temperature are the major issues with the synthetic polymers that lead to polymer degradation and adsorption on the rock surface. Microbial degradation and concentration are major issues with naturally derived polymers leading to loss of viscosity and pore throat plugging. Earlier studies also revealed that polymer flooding is successful in the fields where oil viscosity is quite higher (up to 126 cp) than injection water due to improvement in mobility ratio during polymer flooding. The largest successful polymer flood was reported in China in 1990 where both synthetic and naturally derived polymers were used in nearly 20 projects. The implementation of these projects provides valuable suggestions for further improving the available processes in future. This paper examines the selection criteria of polymer, field characteristics that support polymer floods and recommendation to design a large producing polymer flooding.

  11. Unconventional, amphiphilic polymers based on chiral polyethylene oxide derivatives I. Synthesis and Characterization.

    NARCIS (Netherlands)

    Janssen, H.M.; Peeters, E.; Zundert, van M.F.; Genderen, van M.H.P.; Meijer, E.W.

    1997-01-01

    The first representatives of a new class of synthetic, amphiphilic polymers based on poly(ethylene oxide) are introduced. These polymers are constituted in a similar way to that for coiled-coil-forming peptides: the polymers possess a regular repeat of apolar (A) residues in a polar (P) sequence of

  12. Migraine attacks the Basal Ganglia

    Directory of Open Access Journals (Sweden)

    Bigal Marcelo

    2011-09-01

    Full Text Available Abstract Background With time, episodes of migraine headache afflict patients with increased frequency, longer duration and more intense pain. While episodic migraine may be defined as 1-14 attacks per month, there are no clear-cut phases defined, and those patients with low frequency may progress to high frequency episodic migraine and the latter may progress into chronic daily headache (> 15 attacks per month. The pathophysiology of this progression is completely unknown. Attempting to unravel this phenomenon, we used high field (human brain imaging to compare functional responses, functional connectivity and brain morphology in patients whose migraine episodes did not progress (LF to a matched (gender, age, age of onset and type of medication group of patients whose migraine episodes progressed (HF. Results In comparison to LF patients, responses to pain in HF patients were significantly lower in the caudate, putamen and pallidum. Paradoxically, associated with these lower responses in HF patients, gray matter volume of the right and left caudate nuclei were significantly larger than in the LF patients. Functional connectivity analysis revealed additional differences between the two groups in regard to response to pain. Conclusions Supported by current understanding of basal ganglia role in pain processing, the findings suggest a significant role of the basal ganglia in the pathophysiology of the episodic migraine.

  13. Anger attacks in obsessive compulsive disorder

    Directory of Open Access Journals (Sweden)

    Nitesh Prakash Painuly

    2011-01-01

    Full Text Available Background: Research on anger attacks has been mostly limited to depression, and only a few studies have focused on anger attacks in obsessive compulsive disorder. Materials and Methods: In a cross-sectional study all new obsessive compulsive disorder patients aged 20-60 years attending an outpatient clinic were assessed using the anger attack questionnaire, irritability, depression and anxiety scale (for the direction of the aggressive behavior and quality of life (QOL. Results: The sample consisted of 42 consecutive subjects with obsessive compulsive disorder, out of which 21 (50% had anger attacks. The obsessive compulsive disorder subjects with and without anger attacks did not show significant differences in terms of sociodemographic variables, duration of illness, treatment, and family history. However, subjects with anger attacks had significantly higher prevalence of panic attacks and comorbid depression. Significantly more subjects with anger attacks exhibited aggressive acts toward spouse, parents, children, and other relatives in the form of yelling and threatening to hurt, trying to hurt, and threatening to leave. However, the two groups did not differ significantly in terms of QOL, except for the psychological domain being worse in the subjects with anger attacks. Conclusion: Anger attacks are present in half of the patients with obsessive compulsive disorder, and they correlate with the presence of comorbid depression.

  14. Polymer Nanocomposites

    Indian Academy of Sciences (India)

    methods for the synthesis of polymer nanocomposites. In this article we .... ers, raw materials recovery, drug delivery and anticorrosion .... region giving rise to dose-packed absorption bands called an IR ... using quaternary ammonium salts.

  15. Interaction of polymer with discotic clay particles

    International Nuclear Information System (INIS)

    Auvray, L.; Lal, J.

    1999-01-01

    Normally synthetic well defined monodisperse discotic laponite clays are known to form a gel phase at mass concentrations as low as a few percent in distilled water. Hydrosoluble polymer polyethylene oxide was added to this intriguing clay system, it was observed that it either prevents gelation or slows it down extremely depending on the polymer weight, concentration or the laponite concentration. Small Angle Neutron scattering (SANS) was used to study these systems because only by isotopic labeling can the structure of the adsorbed polymer layers be determined. The contrast variation technique is specifically used to determine separately the different partial structure factors of the clay and polymer. In this way the signal of the adsorbed chains is separated from the signal of the free chains in the dilute regime. Attempts have also been made to characterize the structure in the concentrated regime of laponite with polymer

  16. Thiolated polymers as mucoadhesive drug delivery systems.

    Science.gov (United States)

    Duggan, Sarah; Cummins, Wayne; O' Donovan, Orla; Hughes, Helen; Owens, Eleanor

    2017-03-30

    Mucoadhesion is the process of binding a material to the mucosal layer of the body. Utilising both natural and synthetic polymers, mucoadhesive drug delivery is a method of controlled drug release which allows for intimate contact between the polymer and a target tissue. It has the potential to increase bioavailability, decrease potential side effects and offer protection to more sensitive drugs such as proteins and peptide based drugs. The thiolation of polymers has, in the last number of years, come to the fore of mucoadhesive drug delivery, markedly improving mucoadhesion due to the introduction of free thiol groups onto the polymer backbone while also offering a more cohesive polymeric matrix for the slower and more controlled release of drug. This review explores the concept of mucoadhesion and the recent advances in both the polymers and the methods of thiolation used in the synthesis of mucoadhesive drug delivery devices. Copyright © 2017 Elsevier B.V. All rights reserved.

  17. Conjugated Polymers Atypically Prepared in Water

    Science.gov (United States)

    Invernale, Michael A.; Pendergraph, Samuel A.; Yavuz, Mustafa S.; Ombaba, Matthew; Sotzing, Gregory A.

    2010-01-01

    Processability remains a fundamental issue for the implementation of conducting polymer technology. A simple synthetic route towards processable precursors to conducting polymers (main chain and side chain) was developed using commercially available materials. These soluble precursor systems were converted to conjugated polymers electrochemically in aqueous media, offering a cheaper and greener method of processing. Oxidative conversion in aqueous and organic media each produced equivalent electrochromics. The precursor method enhances the yield of the electrochromic polymer obtained over that of electrodeposition, and it relies on a less corruptible electrolyte bath. However, electrochemical conversion of the precursor polymers often relies on organic salts and solvents. The ability to achieve oxidative conversion in brine offers a less costly and a more environmentally friendly processing step. It is also beneficial for biological applications. The electrochromics obtained herein were evaluated for electronic, spectral, and morphological properties. PMID:20959869

  18. Temperature- and light-responsive smart polymer materials.

    Science.gov (United States)

    Jochum, Florian D; Theato, Patrick

    2013-09-07

    Stimuli-responsive polymers have been attracting great interest within the scientific community for several decades. The unique feature to respond to small changes in the environmental conditions has made this class of materials very promising for several applications in the field of nanoscience, nanotechnology and nanomedicine. So far, several different chemical, physical or biochemical stimuli have been investigated within natural or synthetic polymers. Very interesting and appealing seems to be the combination of several stimuli to tune the properties of these materials in manifold ways. Within this present review, we want to highlight the recent progress in the field of synthetic stimuli-responsive polymers combining temperature and light responsiveness.

  19. Atomic Oxygen Erosion Yield Dependence Upon Texture Development in Polymers

    Science.gov (United States)

    Banks, Bruce A.; Loftus, Ryan J.; Miller, Sharon K.

    2016-01-01

    The atomic oxygen erosion yield (volume of a polymer that is lost due to oxidation per incident atom) of polymers is typically assumed to be reasonably constant with increasing fluence. However polymers containing ash or inorganic pigments, tend to have erosion yields that decrease with fluence due to an increasing presence of protective particles on the polymer surface. This paper investigates two additional possible causes for erosion yields of polymers that are dependent upon atomic oxygen. These are the development of surface texture which can cause the erosion yield to change with fluence due to changes in the aspect ratio of the surface texture that develops and polymer specific atomic oxygen interaction parameters. The surface texture development under directed hyperthermal attack produces higher aspect ratio surface texture than isotropic thermal energy atomic oxygen attack. The fluence dependence of erosion yields is documented for low Kapton H (DuPont, Wilmington, DE) effective fluences for a variety of polymers under directed hyperthermal and isotropic thermal energy attack.

  20. Identification of Polymers in University Class Experiments.

    Science.gov (United States)

    Bowen, Humphry J. M.

    1990-01-01

    The apparatus, reagents, preliminary classification, nomenclature, acquisition, and procedures used in the identification of synthetic polymers are described. Specific tests for the identification of the presence of hydrocarbons, chlorine, fluorine, sulfur, and nitrogen and the absence of halogens and sulfur are discussed. (CW)

  1. DDOS ATTACK DETECTION SIMULATION AND HANDLING MECHANISM

    Directory of Open Access Journals (Sweden)

    Ahmad Sanmorino

    2013-11-01

    Full Text Available In this study we discuss how to handle DDoS attack that coming from the attacker by using detection method and handling mechanism. Detection perform by comparing number of packets and number of flow. Whereas handling mechanism perform by limiting or drop the packets that detected as a DDoS attack. The study begins with simulation on real network, which aims to get the real traffic data. Then, dump traffic data obtained from the simulation used for detection method on our prototype system called DASHM (DDoS Attack Simulation and Handling Mechanism. From the result of experiment that has been conducted, the proposed method successfully detect DDoS attack and handle the incoming packet sent by attacker.

  2. Model checking exact cost for attack scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2017-01-01

    Attack trees constitute a powerful tool for modelling security threats. Many security analyses of attack trees can be seamlessly expressed as model checking of Markov Decision Processes obtained from the attack trees, thus reaping the benefits of a coherent framework and a mature tool support....... However, current model checking does not encompass the exact cost analysis of an attack, which is standard for attack trees. Our first contribution is the logic erPCTL with cost-related operators. The extended logic allows to analyse the probability of an event satisfying given cost bounds and to compute...... the exact cost of an event. Our second contribution is the model checking algorithm for erPCTL. Finally, we apply our framework to the analysis of attack trees....

  3. Securing internet by eliminating DDOS attacks

    Science.gov (United States)

    Niranchana, R.; Gayathri Devi, N.; Santhi, H.; Gayathri, P.

    2017-11-01

    The major threat caused to the authorised usage of Internet is Distributed Denial of Service attack. The mechanisms used to prevent the DDoS attacks are said to overcome the attack’s ability in spoofing the IP packets source addresses. By utilising Internet Protocol spoofing, the attackers cause a consequential load over the networks destination for policing attack packets. To overcome the IP Spoofing level on the Internet, We propose an Inter domain Packet Filter (IPF) architecture. The proposed scheme is not based on global routing information. The packets with reliable source addresses are not rejected, the IPF frame work works in such a manner. The spoofing capability of attackers is confined by IPF, and also the filter identifies the source of an attack packet by minimal number of candidate network.

  4. Where can an Insider attack?

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof; Nielson, Flemming

    2006-01-01

    By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage...... to the targeted organisation. While the problem is well recognised in the security community as well as in law-enforcement and intelligence communities, the main resort still is to audit log files \\$\\backslash\\$emph{after the fact}. There has been little research into developing models, automated tools......, and techniques for analysing and solving (parts of) the problem. In this paper we first develop a formal model of systems, that can describe real-world scenarios. These high-level models are then mapped to acKlaim, a process algebra with support for access control, that is used to study and analyse properties...

  5. Transient ischemic attack: diagnostic evaluation.

    Science.gov (United States)

    Messé, Steven R; Jauch, Edward C

    2008-08-01

    A transient ischemic attack portends significant risk of a stroke. Consequently, the diagnostic evaluation in the emergency department is focused on identifying high-risk causes so that preventive strategies can be implemented. The evaluation consists of a facilitated evaluation of the patient's metabolic, cardiac, and neurovascular systems. At a minimum, the following tests are recommended: fingerstick glucose level, electrolyte levels, CBC count, urinalysis, and coagulation studies; noncontrast computed tomography (CT) of the head; electrocardiography; and continuous telemetry monitoring. Vascular imaging studies, such as carotid ultrasonography, CT angiography, or magnetic resonance angiography, should be performed on an urgent basis and prioritized according to the patient's risk stratification for disease. Consideration should be given for echocardiography if no large vessel abnormality is identified.

  6. Integrating cyber attacks within fault trees

    International Nuclear Information System (INIS)

    Nai Fovino, Igor; Masera, Marcelo; De Cian, Alessio

    2009-01-01

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  7. Visualizing Risks: Icons for Information Attack Scenarios

    National Research Council Canada - National Science Library

    Hosmer, Hilary

    2000-01-01

    .... Visual attack scenarios help defenders see system ambiguities, imprecision, vulnerabilities and omissions, thus speeding up risk analysis, requirements gathering, safeguard selection, cryptographic...

  8. Classifying network attack scenarios using an ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-03-01

    Full Text Available ) or to the target?s reputation. The Residue sub-phase refers to damage or artefacts of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example after the launch of a DDOS..., A. (1995). Hacking theft of $10 million from citibank revealed. Retrieved 10/10, 2011, from http://articles.latimes.com/1995-08-19/business/fi-36656_1_citibank-system Hurley, E. (2004). SCO site succumbs to DDoS attack. Retrieved 10/10, 2011, from...

  9. A computer network attack taxonomy and ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-01-01

    Full Text Available of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example, after the launch of a DDOS (Distributed Denial of Service) attack, zombie computers may still connect to the target...-scrap- value-of-a-hacked-pc-revisited/ . Lancor, L., & Workman, R. (2007). Using Google Hacking to Enhance Defense Strategies. ACM SIGCSE Bulletin, 39 (1), 491-495. Lau, F., Rubin, S. H., Smith, M. H., & Trajkovic, L. (2000). Distributed Denial of Service...

  10. Integrating cyber attacks within fault trees

    Energy Technology Data Exchange (ETDEWEB)

    Nai Fovino, Igor [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy)], E-mail: igor.nai@jrc.it; Masera, Marcelo [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy); De Cian, Alessio [Department of Electrical Engineering, University di Genova, Genoa (Italy)

    2009-09-15

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  11. Identification of Successive ``Unobservable'' Cyber Data Attacks in Power Systems Through Matrix Decomposition

    Science.gov (United States)

    Gao, Pengzhi; Wang, Meng; Chow, Joe H.; Ghiocel, Scott G.; Fardanesh, Bruce; Stefopoulos, George; Razanousky, Michael P.

    2016-11-01

    This paper presents a new framework of identifying a series of cyber data attacks on power system synchrophasor measurements. We focus on detecting "unobservable" cyber data attacks that cannot be detected by any existing method that purely relies on measurements received at one time instant. Leveraging the approximate low-rank property of phasor measurement unit (PMU) data, we formulate the identification problem of successive unobservable cyber attacks as a matrix decomposition problem of a low-rank matrix plus a transformed column-sparse matrix. We propose a convex-optimization-based method and provide its theoretical guarantee in the data identification. Numerical experiments on actual PMU data from the Central New York power system and synthetic data are conducted to verify the effectiveness of the proposed method.

  12. Polymer nanocomposites: polymer and particle dynamics

    KAUST Repository

    Kim, Daniel; Srivastava, Samanvaya; Narayanan, Suresh; Archer, Lynden A.

    2012-01-01

    Polymer nanocomposites containing nanoparticles smaller than the random coil size of their host polymer chains are known to exhibit unique properties, such as lower viscosity and glass transition temperature relative to the neat polymer melt. It has

  13. Antimocrobial Polymer

    Science.gov (United States)

    McDonald, William F.; Huang, Zhi-Heng; Wright, Stacy C.

    2005-09-06

    A polymeric composition having antimicrobial properties and a process for rendering the surface of a substrate antimicrobial are disclosed. The composition comprises a crosslinked chemical combination of (i) a polymer having amino group-containing side chains along a backbone forming the polymer, (ii) an antimicrobial agent selected from quaternary ammonium compounds, gentian violet compounds, substituted or unsubstituted phenols, biguanide compounds, iodine compounds, and mixtures thereof, and (iii) a crosslinking agent containing functional groups capable of reacting with the amino groups. In one embodiment, the polymer is a polyamide formed from a maleic anhydride or maleic acid ester monomer and alkylamines thereby producing a polyamide having amino substituted alkyl chains on one side of the polyamide backbone; the crosslinking agent is a phosphine having the general formula (A)3P wherein A is hydroxyalkyl; and the antimicrobial agent is chlorhexidine, dimethylchlorophenol, cetyl pyridinium chloride, gentian violet, triclosan, thymol, iodine, and mixtures thereof.

  14. Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0

    NARCIS (Netherlands)

    Gadyatskaya, Olga; Jhawar, Ravi; Kordy, P.T.; Lounis, Karim; Mauw, Sjouke; Trujillo-Rasua, Rolando

    2016-01-01

    In this tool demonstration paper we present the ADTool2.0: an open-source software tool for design, manipulation and analysis of attack trees. The tool supports ranking of attack scenarios based on quantitative attributes entered by the user; it is scriptable; and it incorporates attack trees with

  15. The work-averse cyber attacker model : theory and evidence from two million attack signatures

    NARCIS (Netherlands)

    Allodi, L.; Massacci, F.; Williams, J.

    The typical cyber attacker is assumed to be all powerful and to exploit all possible vulnerabilities. In this paper we present, and empirically validate, a novel and more realistic attacker model. The intuition of our model is that an attacker will optimally choose whether to act and weaponize a new

  16. Polymer electronics

    CERN Document Server

    Geoghegan, Mark

    2013-01-01

    Polymer electronics is the science behind many important new developments in technology, such as the flexible electronic display (e-ink) and many new developments in transistor technology. Solar cells, light-emitting diodes, and transistors are all areas where plastic electronics is likely to, or is already having, a serious impact on our daily lives. With polymer transistors and light-emitting diodes now being commercialised, there is a clear need for a pedagogic text thatdiscusses the subject in a clear and concise fashion suitable for senior undergraduate and graduate students. The content

  17. Attack Tree Generation by Policy Invalidation

    NARCIS (Netherlands)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, René Rydhof; Kammüller, Florian; Naeem Akram, R.; Jajodia, S.

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identi﬿cation. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identi﬿ed

  18. Evaluation of Crosstalk Attacks in Access Networks

    DEFF Research Database (Denmark)

    Wagner, Christoph; Eiselt, Michael; Grobe, Klaus

    2016-01-01

    WDM-PON systems regained interest as low-cost solution for metro and access networks. We present a comparative analysis of resilience of wavelength-selective and wavelength-routed architectures against crosstalk attackers. We compare the vulnerability of these architectures against attacks...

  19. Drammer : Deterministic Rowhammer attacks on mobile platforms

    NARCIS (Netherlands)

    Van Der Veen, Victor; Fratantonio, Yanick; Lindorfer, Martina; Gruss, Daniel; Maurice, Clémentine; Vigna, Giovanni; Bos, Herbert; Razavi, Kaveh; Giuffrida, Cristiano

    2016-01-01

    Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and completely subvert a system. However, existing efforts either describe probabilistic (and thus unreliable) attacks or rely on special (and often unavailable) memory management features to place victim objects

  20. Collaborative Attack Mitigation and Response: A survey

    NARCIS (Netherlands)

    Steinberger, Jessica; Sperotto, Anna; Baier, Harald; Pras, Aiko

    2015-01-01

    Over recent years, network-based attacks have become to one of the top causes of network infrastructure and service outages. To counteract a network-based attack, an approach is to move mitigation from the target network to the networks of Internet Service Providers (ISP). However, it remains

  1. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    2010-01-01

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...

  2. What Are Synthetic Cannabinoids?

    Science.gov (United States)

    ... years, synthetic cannabinoid mixtures have been easy to buy in drug paraphernalia shops, novelty stores, gas stations, and over ... abuse, authorities have made it illegal to sell, buy, or possess some of ... use is that standard drug tests cannot easily detect many of the chemicals ...

  3. Synthetic Aperture Sequential Beamforming

    DEFF Research Database (Denmark)

    Kortbek, Jacob; Jensen, Jørgen Arendt; Gammelmark, Kim Løkke

    2008-01-01

    A synthetic aperture focusing (SAF) technique denoted Synthetic Aperture Sequential Beamforming (SASB) suitable for 2D and 3D imaging is presented. The technique differ from prior art of SAF in the sense that SAF is performed on pre-beamformed data contrary to channel data. The objective is to im......A synthetic aperture focusing (SAF) technique denoted Synthetic Aperture Sequential Beamforming (SASB) suitable for 2D and 3D imaging is presented. The technique differ from prior art of SAF in the sense that SAF is performed on pre-beamformed data contrary to channel data. The objective...... is to improve and obtain a more range independent lateral resolution compared to conventional dynamic receive focusing (DRF) without compromising frame rate. SASB is a two-stage procedure using two separate beamformers. First a set of Bmode image lines using a single focal point in both transmit and receive...... is stored. The second stage applies the focused image lines from the first stage as input data. The SASB method has been investigated using simulations in Field II and by off-line processing of data acquired with a commercial scanner. The performance of SASB with a static image object is compared with DRF...

  4. Building synthetic cellular organization

    OpenAIRE

    Polka, Jessica K.; Silver, Pamela A.

    2013-01-01

    The elaborate spatial organization of cells enhances, restricts, and regulates protein–protein interactions. However, the biological significance of this organization has been difficult to study without ways of directly perturbing it. We highlight synthetic biology tools for engineering novel cellular organization, describing how they have been, and can be, used to advance cell biology.

  5. Towards a synthetic chloroplast.

    Directory of Open Access Journals (Sweden)

    Christina M Agapakis

    2011-04-01

    Full Text Available The evolution of eukaryotic cells is widely agreed to have proceeded through a series of endosymbiotic events between larger cells and proteobacteria or cyanobacteria, leading to the formation of mitochondria or chloroplasts, respectively. Engineered endosymbiotic relationships between different species of cells are a valuable tool for synthetic biology, where engineered pathways based on two species could take advantage of the unique abilities of each mutualistic partner.We explored the possibility of using the photosynthetic bacterium Synechococcus elongatus PCC 7942 as a platform for studying evolutionary dynamics and for designing two-species synthetic biological systems. We observed that the cyanobacteria were relatively harmless to eukaryotic host cells compared to Escherichia coli when injected into the embryos of zebrafish, Danio rerio, or taken up by mammalian macrophages. In addition, when engineered with invasin from Yersinia pestis and listeriolysin O from Listeria monocytogenes, S. elongatus was able to invade cultured mammalian cells and divide inside macrophages.Our results show that it is possible to engineer photosynthetic bacteria to invade the cytoplasm of mammalian cells for further engineering and applications in synthetic biology. Engineered invasive but non-pathogenic or immunogenic photosynthetic bacteria have great potential as synthetic biological devices.

  6. Synthetic Metabolic Pathways

    DEFF Research Database (Denmark)

    topics, lists of the necessary materials and reagents, step-by-step, readily reproducible laboratory protocols, and tips on troubleshooting and avoiding known pitfalls. Authoritative and practical, Synthetic Metabolic Pathways: Methods and Protocols aims to ensure successful results in the further study...

  7. Electroassembly of smart polymer structures (role of polyelectrolytes)

    Science.gov (United States)

    Wallace, Gordon G.; Adeloju, Samuel B.; Shaw, Shannon J.

    1997-02-01

    Polymers are ubiquitous in nature, owing to their use as both structural and active components in dynamic, living systems. From a synthetic point of view man has utilized the excellent structural properties of polymers (light weight/high strength) for some decades now. However, the integration of active functional polymers into engineered systems and structures is a more recent endeavour with numerous challenges still to be overcome. Conducting electroactive polymers such as polypyrroles, polythiophenes and polyanilines are a fascinating group of functional polymers. They are electronic conductors and in addition they response to chemical or electrical stimuli in a number of ways. They are truly electrofunctional polymers. This unique combination of properties has led to the use of conducting polymers for electronic components, chemical sensors and biosensors, membranes for solution or gas separations, electromechanical actuators, electro-optical devices, biomaterials capable of controlled release of drugs or stimulation of biological processes, and for corrosion protection.

  8. Combating Memory Corruption Attacks On Scada Devices

    Science.gov (United States)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  9. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  10. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  11. Production of synthetic hydrocarbon lube oil from highly waxy feedstocks

    Energy Technology Data Exchange (ETDEWEB)

    Xue, Q; Ding, Z; Zheng, Sh; Wu, W

    1980-01-01

    A feasible way to utilize the low value soft wax is to convert it into synthetic hydrocarbon lube oil by thermal cracking/polymerization route. The first commercial plant for this purpose has been in normal operation since 1970. It has been proved to be economically sound. The antioxidant response of the product polymer oil can be distinctly improved by hydro-refining. It has been found that the vacuum gas oil from highly waxy crude with or without furfural refining can be used as cracking stock. If high viscosity index polymer oil is desired, it is better to use slack wax as the cracking stock.

  12. Polymer physics

    CERN Document Server

    Gedde, Ulf W

    1999-01-01

    This book is the result of my teaching efforts during the last ten years at the Royal Institute of Technology. The purpose is to present the subject of polymer physics for undergraduate and graduate students, to focus the fundamental aspects of the subject and to show the link between experiments and theory. The intention is not to present a compilation of the currently available literature on the subject. Very few reference citations have thus been made. Each chapter has essentially the same structure: starling with an introduction, continuing with the actual subject, summarizing the chapter in 30D-500 words, and finally presenting problems and a list of relevant references for the reader. The solutions to the problems presented in Chapters 1-12 are given in Chapter 13. The theme of the book is essentially polymer science, with the exclusion of that part dealing directly with chemical reactions. The fundamentals in polymer science, including some basic polymer chemistry, are presented as an introduction in t...

  13. Antimicrobial polymers.

    Science.gov (United States)

    Jain, Anjali; Duvvuri, L Sailaja; Farah, Shady; Beyth, Nurit; Domb, Abraham J; Khan, Wahid

    2014-12-01

    Better health is basic requirement of human being, but the rapid growth of harmful pathogens and their serious health effects pose a significant challenge to modern science. Infections by pathogenic microorganisms are of great concern in many fields such as medical devices, drugs, hospital surfaces/furniture, dental restoration, surgery equipment, health care products, and hygienic applications (e.g., water purification systems, textiles, food packaging and storage, major or domestic appliances etc.) Antimicrobial polymers are the materials having the capability to kill/inhibit the growth of microbes on their surface or surrounding environment. Recently, they gained considerable interest for both academic research and industry and were found to be better than their small molecular counterparts in terms of enhanced efficacy, reduced toxicity, minimized environmental problems, resistance, and prolonged lifetime. Hence, efforts have focused on the development of antimicrobial polymers with all desired characters for optimum activity. In this Review, an overview of different antimicrobial polymers, their mechanism of action, factors affecting antimicrobial activity, and application in various fields are given. Recent advances and the current clinical status of these polymers are also discussed. © 2014 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  14. Recent Advances in Edible Polymer Based Hydrogels as a Sustainable Alternative to Conventional Polymers.

    Science.gov (United States)

    Ali, Akbar; Ahmed, Shakeel

    2018-06-26

    The over increasing demand of eco-friendly materials to counter various problems, such as environmental issues, economics, sustainability, biodegradability, and biocompatibility, open up new fields of research highly focusing on nature-based products. Edible polymer based materials mainly consisting of polysaccharides, proteins, and lipids could be a prospective contender to handle such problems. Hydrogels based on edible polymer offer many valuable properties compared to their synthetic counterparts. Edible polymers can contribute to the reduction of environmental contamination, advance recyclability, provide sustainability, and thereby increase its applicability along with providing environmentally benign products. This review is highly emphasizing on toward the development of hydrogels from edible polymer, their classification, properties, chemical modification, and their potential applications. The application of edible polymer hydrogels covers many areas including the food industry, agricultural applications, drug delivery to tissue engineering in the biomedical field and provide more safe and attractive products in the pharmaceutical, agricultural, and environmental fields, etc.

  15. Recent New Methodologies for Acetylenic Polymers with Advanced Functionalities.

    Science.gov (United States)

    Qiu, Zijie; Han, Ting; Lam, Jacky W Y; Tang, Ben Zhong

    2017-08-01

    Polymers synthesized from acetylenic monomers often possess electronically unsaturated fused rings and thus show versatile optoelectronic properties and advanced functionalities. To expand the family of acetylenic polymers, development of new catalyst systems and synthetic routes is critically important. We summarize herein recent research progress on development of new methodologies towards functional polymers using alkyne building blocks since 2014. The polymerizations are categorized by the number of monomer components, namely homopolymerizations, two-component polymerizations, and multicomponent polymerizations. The properties and applications of acetylenic polymers, such as aggregation-induced emission, fluorescent photopatterning, light refraction, chemosensing, mechanochromism, chain helicity, etc., are also discussed.

  16. Polymer/Silicate Nanocomposites Developed for Improved Thermal Stability and Barrier Properties

    Science.gov (United States)

    Campbell, Sandi G.

    2001-01-01

    The nanoscale reinforcement of polymers is becoming an attractive means of improving the properties and stability of polymers. Polymer-silicate nanocomposites are a relatively new class of materials with phase dimensions typically on the order of a few nanometers. Because of their nanometer-size features, nanocomposites possess unique properties typically not shared by more conventional composites. Polymer-layered silicate nanocomposites can attain a certain degree of stiffness, strength, and barrier properties with far less ceramic content than comparable glass- or mineral-reinforced polymers. Reinforcement of existing and new polyimides by this method offers an opportunity to greatly improve existing polymer properties without altering current synthetic or processing procedures.

  17. Adaptive cyber-attack modeling system

    Science.gov (United States)

    Gonsalves, Paul G.; Dougherty, Edward T.

    2006-05-01

    The pervasiveness of software and networked information systems is evident across a broad spectrum of business and government sectors. Such reliance provides an ample opportunity not only for the nefarious exploits of lone wolf computer hackers, but for more systematic software attacks from organized entities. Much effort and focus has been placed on preventing and ameliorating network and OS attacks, a concomitant emphasis is required to address protection of mission critical software. Typical software protection technique and methodology evaluation and verification and validation (V&V) involves the use of a team of subject matter experts (SMEs) to mimic potential attackers or hackers. This manpower intensive, time-consuming, and potentially cost-prohibitive approach is not amenable to performing the necessary multiple non-subjective analyses required to support quantifying software protection levels. To facilitate the evaluation and V&V of software protection solutions, we have designed and developed a prototype adaptive cyber attack modeling system. Our approach integrates an off-line mechanism for rapid construction of Bayesian belief network (BN) attack models with an on-line model instantiation, adaptation and knowledge acquisition scheme. Off-line model construction is supported via a knowledge elicitation approach for identifying key domain requirements and a process for translating these requirements into a library of BN-based cyber-attack models. On-line attack modeling and knowledge acquisition is supported via BN evidence propagation and model parameter learning.

  18. Situational awareness of a coordinated cyber attack

    Science.gov (United States)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  19. Radiological attacks and accidents. Medical consequences

    International Nuclear Information System (INIS)

    Sakuta, Hidenari

    2007-01-01

    Probability of the occurrence of radiological attacks appears to be elevated after the terrorist attacks against the United States on September 11 in 2001. There are a lot of scenarios of radiological attack: simple radiological device, radiological disperse device (RDD or dirty bomb), attacks against nuclear reactor, improvised nuclear device, and nuclear weapons. Of these, RDD attack is the most probable scenario, because it can be easily made and can generate enormous psychological and economic damages. Radiological incidents are occurring to and fro in the world, including several cases of theft to nuclear facilities and unsuccessful terrorist attacks against them. Recently, a former Russian spy has allegedly been killed using polonium-210. In addition, serious radiological accidents have occurred in Chernobyl, Goiania, and Tokai-mura. Planning, preparation, education, and training exercise appear to be essential factors to cope with radiological attacks and accidents effectively without feeling much anxiety. Triage and psychological first aid are prerequisite to manage and provide effective medial care for mass casualties without inducing panic. (author)

  20. Synthetic Electric Microbial Biosensors

    Science.gov (United States)

    2017-06-10

    domains and DNA-binding domains into a single protein for deregulation of down stream genes of have been favored [10]. Initially experiments with... Germany DISTRIBUTION A. Approved for public release: distribution unlimited.   Talk title: “Synthetic biology based microbial biosensors for the...toolbox” in Heidelberg, Germany Poster title: “Anaerobic whole cell microbial biosensors” Link: http://phdsymposium.embl.org/#home   September, 2014

  1. Classification of cyber attacks in South Africa

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-05-01

    Full Text Available various ATM's throughout South Africa. Two criminals, Motsoane and Masoleng, were arrested in February 2012 and both sentenced to 15 years in jail [36, 37]. 3.10 2013: IOL DDoS Anonymous Africa claimed responsibility for launching a Distributed Denial... of Service (DDoS) attack on the Independent Newspaper web site iol.co.za. The attack was in response to claims that the IOL group supports Zimbabwean president Robert Mugabe. The following taunt was sent to boast about the attack: “IOL bad boys bad boys...

  2. Attacker Modelling in Ubiquitous Computing Systems

    DEFF Research Database (Denmark)

    Papini, Davide

    in with our everyday life. This future is visible to everyone nowadays: terms like smartphone, cloud, sensor, network etc. are widely known and used in our everyday life. But what about the security of such systems. Ubiquitous computing devices can be limited in terms of energy, computing power and memory...... attacker remain somehow undened and still under extensive investigation. This Thesis explores the nature of the ubiquitous attacker with a focus on how she interacts with the physical world and it denes a model that captures the abilities of the attacker. Furthermore a quantitative implementation...

  3. Synthetic lubricants and high-performance functional fluids

    CERN Document Server

    Rudnick, Leslie R

    1999-01-01

    Offers state-of-the-art information on all the major synthetic fluids, describing established products as well as highly promising experimental fluids with commercial potential. This second edition contains chapters on polyinternalolefins, polymer esters, refrigeration lubes, polyphenyl ethers, highly refined mineral oils, automotive gear oils and industrial gear oils. The book also assesses automotive, industrial, aerospace, environmental, and commercial trends in Europe, Asia, South America, and the US.

  4. An Overview of the Glass Transition Temperature of Synthetic Polymers.

    Science.gov (United States)

    Beck, Keith R.; And Others

    1984-01-01

    Presents an overview of the glass-to-rubber transition, what it is, why it is important, and the major factors that influence it. Indicates that this information should be incorporated into chemistry curricula. (JN)

  5. Immunomodulating activities of soluble synthetic polymer-bound drugs

    Czech Academy of Sciences Publication Activity Database

    Říhová, Blanka

    2002-01-01

    Roč. 54, - (2002), s. 653-674 ISSN 0169-409X R&D Projects: GA ČR GA305/02/1425; GA AV ČR IBS5020101; GA AV ČR IAA4050201 Institutional research plan: CEZ:AV0Z5020903 Keywords : immunomodulation * immunomobilization * vaccination Subject RIV: EE - Microbiology, Virology Impact factor: 4.190, year: 2002

  6. Polymer blends

    Energy Technology Data Exchange (ETDEWEB)

    Allen, Scott D.; Naik, Sanjeev

    2017-08-22

    The present invention provides, among other things, extruded blends of aliphatic polycarbonates and polyolefins. In one aspect, provided blends comprise aliphatic polycarbonates such as poly(propylene carbonate) and a lesser amount of a crystalline or semicrystalline polymer. In certain embodiments, provided blends are characterized in that they exhibit unexpected improvements in their elongation properties. In another aspect, the invention provides methods of making such materials and applications of the materials in applications such as the manufacture of consumer packaging materials.

  7. In Silico Synthesis of Synthetic Receptors: A Polymerization Algorithm.

    Science.gov (United States)

    Cowen, Todd; Busato, Mirko; Karim, Kal; Piletsky, Sergey A

    2016-12-01

    Molecularly imprinted polymer (MIP) synthetic receptors have proposed and applied applications in chemical extraction, sensors, assays, catalysis, targeted drug delivery, and direct inhibition of harmful chemicals and pathogens. However, they rely heavily on effective design for success. An algorithm has been written which mimics radical polymerization atomistically, accounting for chemical and spatial discrimination, hybridization, and geometric optimization. Synthetic ephedrine receptors were synthesized in silico to demonstrate the accuracy of the algorithm in reproducing polymers structures at the atomic level. Comparative analysis in the design of a synthetic ephedrine receptor demonstrates that the new method can effectively identify affinity trends and binding site selectivities where commonly used alternative methods cannot. This new method is believed to generate the most realistic models of MIPs thus produced. This suggests that the algorithm could be a powerful new tool in the design and analysis of various polymers, including MIPs, with significant implications in areas of biotechnology, biomimetics, and the materials sciences more generally. © 2016 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  8. Polyphosphazenes - New polymers with inorganic backbone atoms

    Science.gov (United States)

    Allcock, H. R.

    1976-01-01

    Unique and useful properties of the class of nonhydrocarbon, nonhalocarbon, nonsilicone polymers known as polyphosphazenes are discussed at length. These polymers, with molecular weights to 4 million (degree of polymerization 15,000), can be fabricated as tubes, fibers, woven fabrics, flexible films, or plates, and many variants are stable to attack by water, bases, aqueous acids, jet fuels, oils, hydraulic fluids, gasoline, or other hydrocarbons. Rubbery polymers with these properties can be fashioned into flexible hose, fuel hose, gaskets, or O-rings. Since they do not provoke clotting reactions in blood, and reveal no carcinogenic effects to date, they are considered for internal prosthetic applications (replacement bone, temporary skin, heart valves), as biodegradable suturing material, as carriers for slow release of drugs, and as carriers for chemotherapeutic agents against cancers.

  9. YET ANOTHER ATTACK ON WAGES AND CONDITIONS.

    Science.gov (United States)

    McCarthy, Andrew

    2016-10-01

    An unobjectionable-sounding title obscures the real intent of the latest in a series of Bills which the federal Coalition government is attempting to legislate in its ongoing attempts to undermine employee wages and conditions and attack unions.

  10. A Unique Fatal Moose Attack Mimicking Homicide.

    Science.gov (United States)

    Gudmannsson, Petur; Berge, Johan; Druid, Henrik; Ericsson, Göran; Eriksson, Anders

    2018-03-01

    Fatalities caused by animal attacks are rare, but have the potential to mimic homicide. We present a case in which a moose attacked and killed a woman who was walking her dog in a forest. Autopsy showed widespread blunt trauma with a large laceration on one leg in which blades of grass were embedded. Flail chest was the cause of death. The case was initially conceived as homicide by means of a riding lawn mower. A review of the case by moose experts and analyses of biological trace material that proved to originate from moose, established the true source of injury. The dog probably provoked a moose, which, in response, stomped and gored the victim to death. The injuries resembled those previously reported from attacks by cattle and water buffalo. Fatal moose attacks constitute an extremely rare threat in boreal areas, but can be considered in traumatic deaths of unknown cause. © 2017 American Academy of Forensic Sciences.

  11. Diabetes - preventing heart attack and stroke

    Science.gov (United States)

    Diabetes complications - heart; Coronary artery disease - diabetes; CAD - diabetes; Cerebrovascular disease - diabetes ... People with diabetes have a higher chance of having heart attacks and strokes. Smoking and having high blood pressure and high ...

  12. Marine Attack on Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Ad

    2002-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  13. Heuristic attacks against graphical password generators

    CSIR Research Space (South Africa)

    Peach, S

    2010-05-01

    Full Text Available In this paper the authors explore heuristic attacks against graphical password generators. A new trend is emerging to use user clickable pictures to generate passwords. This technique of authentication can be successfully used for - for example...

  14. On localization attacks against cloud infrastructure

    Science.gov (United States)

    Ge, Linqiang; Yu, Wei; Sistani, Mohammad Ali

    2013-05-01

    One of the key characteristics of cloud computing is the device and location independence that enables the user to access systems regardless of their location. Because cloud computing is heavily based on sharing resource, it is vulnerable to cyber attacks. In this paper, we investigate a localization attack that enables the adversary to leverage central processing unit (CPU) resources to localize the physical location of server used by victims. By increasing and reducing CPU usage through the malicious virtual machine (VM), the response time from the victim VM will increase and decrease correspondingly. In this way, by embedding the probing signal into the CPU usage and correlating the same pattern in the response time from the victim VM, the adversary can find the location of victim VM. To determine attack accuracy, we investigate features in both the time and frequency domains. We conduct both theoretical and experimental study to demonstrate the effectiveness of such an attack.

  15. Using agility to combat cyber attacks.

    Science.gov (United States)

    Anderson, Kerry

    2017-06-01

    Some incident response practitioners feel that they have been locked in a battle with cyber criminals since the popular adoption of the internet. Initially, organisations made great inroads in preventing and containing cyber attacks. In the last few years, however, cyber criminals have become adept at eluding defence security technologies and rapidly modifying their exploit strategies for financial or political gains. Similar to changes in military combat tactics, cyber criminals utilise distributed attack cells, real-time communications, and rapidly mutating exploits to minimise the potential for detection. Cyber criminals have changed their attack paradigm. This paper describes a new incident response paradigm aimed at combating the new model of cyber attacks with an emphasis on agility to increase the organisation's ability to respond rapidly to these new challenges.

  16. Social engineering attack examples, templates and scenarios

    CSIR Research Space (South Africa)

    Mouton, Francois

    2016-06-01

    Full Text Available that are representative of real-world examples, whilst still being general enough to encompass several different real-world examples. The proposed social engineering attack templates cover all three types of communication, namely bidirectional communication...

  17. Compiling symbolic attacks to protocol implementation tests

    Directory of Open Access Journals (Sweden)

    Michael Rusinowitch

    2013-07-01

    Full Text Available Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically generating abstract attacks and converting them to concrete tests on protocol implementations. In particular we aim to improve previously proposed blackbox testing methods in order to discover automatically new attacks and vulnerabilities. As a proof of concept we have experimented our proposed architecture to detect a renegotiation vulnerability on some implementations of SSL/TLS, a protocol widely used for securing electronic transactions.

  18. The role of sleep in migraine attacks

    Directory of Open Access Journals (Sweden)

    Elaine Inamorato

    1993-11-01

    Full Text Available Migraine attacks may be precipitated by sleep deprivation or excessive sleep and sleep is also associated with relief of migraine attacks. In view of this variable relationship we studied the records of 159 consecutive outpatients of our Headache Unit. In 121 records there was reference to sleep involvement, in 55% by a single form and in 45% by more than one form. When only one form was related, relief was most common (70%. 30% of that group of patients had the migraine attack precipitated by sleep, 24% by deprivation and 6% by sleep excess. When the effects of sleep were multiple, these effects were as expected logically in 65%: «in accordance» group (e.g attack precipitated by sleep deprivation and relieved by sleep onset. In a second group, («conflicting» where the involvement was not logical, there were three different combinations of sleep involvement, possibly due to more than one pathophysiological mechanism.

  19. Opportunities in plant synthetic biology.

    Science.gov (United States)

    Cook, Charis; Martin, Lisa; Bastow, Ruth

    2014-05-01

    Synthetic biology is an emerging field uniting scientists from all disciplines with the aim of designing or re-designing biological processes. Initially, synthetic biology breakthroughs came from microbiology, chemistry, physics, computer science, materials science, mathematics, and engineering disciplines. A transition to multicellular systems is the next logical step for synthetic biologists and plants will provide an ideal platform for this new phase of research. This meeting report highlights some of the exciting plant synthetic biology projects, and tools and resources, presented and discussed at the 2013 GARNet workshop on plant synthetic biology.

  20. ATTACK WARNING: Costs to Modernize NORAD's Computer System Significantly Understated

    National Research Council Canada - National Science Library

    Cross, F

    1991-01-01

    ...) Integrated Tactical Warning and Attack Assessment (ITW/AA) system. These subsystems provide critical strategic surveillance and attack warning and assessment information to United States and Canadian leaders...

  1. RAPTOR: Ransomware Attack PredicTOR

    OpenAIRE

    Quinkert, Florian; Holz, Thorsten; Hossain, KSM Tozammel; Ferrara, Emilio; Lerman, Kristina

    2018-01-01

    Ransomware, a type of malicious software that encrypts a victim's files and only releases the cryptographic key once a ransom is paid, has emerged as a potentially devastating class of cybercrimes in the past few years. In this paper, we present RAPTOR, a promising line of defense against ransomware attacks. RAPTOR fingerprints attackers' operations to forecast ransomware activity. More specifically, our method learns features of malicious domains by looking at examples of domains involved in...

  2. Attack Helicopter Operations: Art or Science

    Science.gov (United States)

    1991-05-13

    ATTACK HELICOPTER OPERATIONS: ART OR SCIENCE ? BY LIEUTENANT COLONEL JAN CALLEN United States Army DISTRIBUTION STATEMENT A: Approved for public release...TASK IWORK UNIT ELEMENT NO. NO. NO. ACCESSION NC 11. TITLE (Include Socurity Classification) Attack Helicopter Operations: Art or Science ? 12. PERSONAL...OPERATIONS: ART OR SCIENCE ? AN INDIVIDUAL STUDY PROJECT by Lieutenant Colonel Jan Callen United States Army Colonel Greg Snelgrove Project Adviser U.S

  3. Protecting mobile agents from external replay attacks

    OpenAIRE

    Garrigues Olivella, Carles; Migas, Nikos; Buchanan, William; Robles, Sergi; Borrell Viader, Joan

    2014-01-01

    Peer-reviewed This paper presents a protocol for the protection of mobile agents against external replay attacks. This kind of attacks are performed by malicious platforms when dispatching an agent multiple times to a remote host, thus making it reexecute part of its itinerary. Current proposals aiming to address this problem are based on storing agent identifiers, or trip markers, inside agent platforms, so that future reexecutions can be detected and prevented. The problem of these solut...

  4. Semantic Identification Attacks on Web Browsing

    OpenAIRE

    Guha, Neel

    2016-01-01

    We introduce a Semantic Identification Attack, in which an adversary uses semantic signals about the pages visited in one browsing session to identify other browsing sessions launched by the same user. This attack allows an adver- sary to determine if two browsing sessions originate from the same user regardless of any measures taken by the user to disguise their browser or network. We use the MSNBC Anonymous Browsing data set, which contains a large set of user visits (labeled by category) t...

  5. Consciousness in Non-Epileptic Attack Disorder

    OpenAIRE

    Reuber, M.; Kurthen, M.

    2011-01-01

    Non-epileptic attack disorder (NEAD) is one of the most important differential diagnoses of epilepsy. Impairment of\\ud consciousness is the key feature of non-epileptic attacks (NEAs). The first half of this review summarises the clinical research\\ud literature featuring observations relating to consciousness in NEAD. The second half places this evidence in the wider context\\ud of the recent discourse on consciousness in neuroscience and the philosophy of mind. We argue that studies of consci...

  6. Cyber Security Audit and Attack Detection Toolkit

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  7. Computational Design of Molecularly Imprinted Polymers

    Science.gov (United States)

    Subrahmanyam, Sreenath; Piletsky, Sergey A.

    Artificial receptors have been in use for several decades as sensor elements, in affinity separation, and as models for investigation of molecular recognition. Although there have been numerous publications on the use of molecular modeling in characterization of their affinity and selectivity, very few attempts have been made on the application of molecular modeling in computational design of synthetic receptors. This chapter discusses recent successes in the use of computational design for the development of one particular branch of synthetic receptors - molecularly imprinted polymers.

  8. Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)

    Science.gov (United States)

    Ariwibowo, Sigit; Windarta, Susila

    2016-02-01

    In this paper we show that distinguisher on CBC-MAC can be applied to Encrypted Message Authentication Code (EMAC) scheme. EMAC scheme in general is vulnerable to distinguishing attack and second preimage attack. Distinguishing attack simulation on AES-EMAC using 225 message modifications, no collision have been found. According to second preimage attack simulation on AES-EMAC no collision found between EMAC value of S1 and S2, i.e. no second preimage found for messages that have been tested. Based on distinguishing attack simulation on truncated AES-EMAC we found collision in every message therefore we cannot distinguish truncated AES-EMAC with random function. Second-preimage attack is successfully performed on truncated AES-EMAC.

  9. Synthetic polyester-hydrolyzing enzymes from thermophilic actinomycetes.

    Science.gov (United States)

    Wei, Ren; Oeser, Thorsten; Zimmermann, Wolfgang

    2014-01-01

    Thermophilic actinomycetes produce enzymes capable of hydrolyzing synthetic polyesters such as polyethylene terephthalate (PET). In addition to carboxylesterases, which have hydrolytic activity predominantly against PET oligomers, esterases related to cutinases also hydrolyze synthetic polymers. The production of these enzymes by actinomycetes as well as their recombinant expression in heterologous hosts is described and their catalytic activity against polyester substrates is compared. Assays to analyze the enzymatic hydrolysis of synthetic polyesters are evaluated, and a kinetic model describing the enzymatic heterogeneous hydrolysis process is discussed. Structure-function and structure-stability relationships of actinomycete polyester hydrolases are compared based on molecular dynamics simulations and recently solved protein structures. In addition, recent progress in enhancing their activity and thermal stability by random or site-directed mutagenesis is presented. © 2014 Elsevier Inc. All rights reserved.

  10. Combined Heuristic Attack Strategy on Complex Networks

    Directory of Open Access Journals (Sweden)

    Marek Šimon

    2017-01-01

    Full Text Available Usually, the existence of a complex network is considered an advantage feature and efforts are made to increase its robustness against an attack. However, there exist also harmful and/or malicious networks, from social ones like spreading hoax, corruption, phishing, extremist ideology, and terrorist support up to computer networks spreading computer viruses or DDoS attack software or even biological networks of carriers or transport centers spreading disease among the population. New attack strategy can be therefore used against malicious networks, as well as in a worst-case scenario test for robustness of a useful network. A common measure of robustness of networks is their disintegration level after removal of a fraction of nodes. This robustness can be calculated as a ratio of the number of nodes of the greatest remaining network component against the number of nodes in the original network. Our paper presents a combination of heuristics optimized for an attack on a complex network to achieve its greatest disintegration. Nodes are deleted sequentially based on a heuristic criterion. Efficiency of classical attack approaches is compared to the proposed approach on Barabási-Albert, scale-free with tunable power-law exponent, and Erdős-Rényi models of complex networks and on real-world networks. Our attack strategy results in a faster disintegration, which is counterbalanced by its slightly increased computational demands.

  11. SCADA system vulnerabilities to cyber attack

    Energy Technology Data Exchange (ETDEWEB)

    Shaw, W. T. [Cyber Security Consulting (Canada)

    2004-10-01

    The susceptibility to terrorist attacks of computer-based supervisory control (SCADA) systems that are used to monitor and control water distribution systems, oil and gas pipelines and the electrical grid, is discussed. The discussion includes ways in which SCADA systems may be attacked and remedial actions that may be taken to reduce or eliminate the possibility of such attacks. Attacks may take the form of causing the system to generate false data to divert attention from impending system disasters, or commandeer the system to seriously disable it, or cause damage to the process or equipment being controlled by sending improper control commands. SCADA systems are also vulnerable to internal threats, either from an accidental action that results in damage, or an intentional action, as for example by a disgruntled employee, or ex-employee, usually by way of reprogramming an RTU or PLC by accessing the polling/communications circuit. Recent SCADA systems are much more susceptible to concerted cyber attacks because of the adoption of IT technologies and standards into the design of such systems. (Older systems are more likely to be unique designs, hence less susceptible to attack). As far as protection of SCADA systems is concerned, there are no technologies that would prevent a technologically sophisticated terrorist or disgruntled employee from doing major damage to the system, however, the IT world has developed a range of technologies for the protection of IT assets, and many of these same technologies can also be used to safeguard modern SCADA systems.

  12. Recent Advances in Glycerol Polymers: Chemistry and Biomedical Applications

    Science.gov (United States)

    Zhang, Heng

    2015-01-01

    Glycerol polymers are attracting increased attention due to the diversity of polymer compositions and architectures available. This article provides a brief chronological review on the current status of these polymers along with representative examples of their use for biomedical applications. First, we describe the underlying chemistry of glycerol, which provides access to a range of monomers for subsequent polymerizations. We then review the various synthetic methodologies to prepare glycerol-based polymers including polyethers, polycarbonates, polyesters, and so forth. Next, we describe several biomedical applications where glycerol polymers are being investigated including carriers for drug delivery, sealants or coatings for tissue repair, and agents possessing antibacterial activity. Fourth, we describe the growing market opportunity for the use of polymers in medicine. Finally we conclude and summarize the findings, as well as discuss potential opportunities for continued research efforts. PMID:25308354

  13. Synthetic Aperture Ultrasound Imaging

    DEFF Research Database (Denmark)

    Jensen, Jørgen Arendt; Nikolov, Svetoslav; Gammelmark, Kim Løkke

    2006-01-01

    The paper describes the use of synthetic aperture (SA) imaging in medical ultrasound. SA imaging is a radical break with today's commercial systems, where the image is acquired sequentially one image line at a time. This puts a strict limit on the frame rate and the possibility of acquiring...... a sufficient amount of data for high precision flow estimation. These constrictions can be lifted by employing SA imaging. Here data is acquired simultaneously from all directions over a number of emissions, and the full image can be reconstructed from this data. The talk will demonstrate the many benefits...

  14. Transition in synthetic jets

    Czech Academy of Sciences Publication Activity Database

    Tesař, Václav; Kordík, Jozef

    2012-01-01

    Roč. 187, NOV 2012 (2012), s. 105-117 ISSN 0924-4247 R&D Projects: GA TA ČR(CZ) TA02020795; GA ČR(CZ) GPP101/12/P556; GA ČR(CZ) GCP101/11/J019 Institutional research plan: CEZ:AV0Z20760514 Keywords : turbulence * synthetic jet * transition * velocity spectra Subject RIV: BK - Fluid Dynamics Impact factor: 1.841, year: 2012 http://www. science direct.com/ science /article/pii/S0924424712005031

  15. Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks

    Directory of Open Access Journals (Sweden)

    Apostolos P. Fournaris

    2017-07-01

    Full Text Available Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT and Operational Technology (OT systems that are meant to operate harmonically under a security critical framework. As security IT countermeasures are gradually been installed in many embedded system nodes, thus securing them from many well-know cyber attacks there is a lurking danger that is still overlooked. Apart from the software vulnerabilities that typical malicious programs use, there are some very interesting hardware vulnerabilities that can be exploited in order to mount devastating software or hardware attacks (typically undetected by software countermeasures capable of fully compromising any embedded system device. Real-time microarchitecture attacks such as the cache side-channel attacks are such case but also the newly discovered Rowhammer fault injection attack that can be mounted even remotely to gain full access to a device DRAM (Dynamic Random Access Memory. Under the light of the above dangers that are focused on the device hardware structure, in this paper, an overview of this attack field is provided including attacks, threat directives and countermeasures. The goal of this paper is not to exhaustively overview attacks and countermeasures but rather to survey the various, possible, existing attack directions and highlight the security risks that they can pose to security critical embedded systems as well as indicate their strength on compromising the Quality of Service (QoS such systems are designed to provide.

  16. Predicting Factors of Zone 4 Attack in Volleyball.

    Science.gov (United States)

    Costa, Gustavo C; Castro, Henrique O; Evangelista, Breno F; Malheiros, Laura M; Greco, Pablo J; Ugrinowitsch, Herbert

    2017-06-01

    This study examined 142 volleyball games of the Men's Super League 2014/2015 seasons in Brazil from which we analyzed 24-26 games of each participating team, identifying 5,267 Zone 4 attacks for further analysis. Within these Zone 4 attacks, we analyzed the association between the effect of the attack carried out and the separate effects of serve reception, tempo and type of attack. We found that the reception, tempo of attack, second tempo of attack, and power of diagonal attack were predictors of the attack effect in Zone 4. Moreover, placed attacks showed a tendency to not yield a score. In conclusion, winning points in high-level men's volleyball requires excellent receptions, a fast attack tempo and powerfully executed of attacks.

  17. Intracellular production of hydrogels and synthetic RNA granules by multivalent molecular interactions

    Science.gov (United States)

    Nakamura, Hideki; Lee, Albert A.; Afshar, Ali Sobhi; Watanabe, Shigeki; Rho, Elmer; Razavi, Shiva; Suarez, Allister; Lin, Yu-Chun; Tanigawa, Makoto; Huang, Brian; Derose, Robert; Bobb, Diana; Hong, William; Gabelli, Sandra B.; Goutsias, John; Inoue, Takanari

    2018-01-01

    Some protein components of intracellular non-membrane-bound entities, such as RNA granules, are known to form hydrogels in vitro. The physico-chemical properties and functional role of these intracellular hydrogels are difficult to study, primarily due to technical challenges in probing these materials in situ. Here, we present iPOLYMER, a strategy for a rapid induction of protein-based hydrogels inside living cells that explores the chemically inducible dimerization paradigm. Biochemical and biophysical characterizations aided by computational modelling show that the polymer network formed in the cytosol resembles a physiological hydrogel-like entity that acts as a size-dependent molecular sieve. We functionalize these polymers with RNA-binding motifs that sequester polyadenine-containing nucleotides to synthetically mimic RNA granules. These results show that iPOLYMER can be used to synthetically reconstitute the nucleation of biologically functional entities, including RNA granules in intact cells.

  18. Biodeterioration of synthetic materials - A brief review

    Energy Technology Data Exchange (ETDEWEB)

    Flemming, H.C. [Biofilm Centre, University of Duisburg-Essen, Geibelstr. 41, 47057 Duisburg (Germany)

    2010-12-15

    Although synthetic polymers are part of our global waste problem because they are not sufficiently biologically degraded, microorganisms can severely impair the properties and functions of these materials. It seems as if consumers do not really acknowledge this cause of problems and there is only sparse systematic research about. Damaging mechanisms include (i) covering of surfaces (biofouling) which may be enhanced by leaching of biodegradable additives, (ii) depletion of such additives which can lead to loss of material properties, (iii) intrusion into materials by fungal hyphae, (iv) water uptake, and (v) discoloration. The common countermeasure is the addition of biocides or simply to tolerate the effects of biodeterioration and live on with them. It is suggested to encourage further systematic research, and to develop integrated strategies in order to avoid problems, e.g., based on nutrient and water limitation whenever possible. (Copyright copyright 2010 WILEY-VCH Verlag GmbH and Co. KGaA, Weinheim)

  19. Freedom and Responsibility in Synthetic Genomics: The Synthetic Yeast Project

    OpenAIRE

    Sliva, Anna; Yang, Huanming; Boeke, Jef D.; Mathews, Debra J. H.

    2015-01-01

    First introduced in 2011, the Synthetic Yeast Genome (Sc2.0) Project is a large international synthetic genomics project that will culminate in the first eukaryotic cell (Saccharomyces cerevisiae) with a fully synthetic genome. With collaborators from across the globe and from a range of institutions spanning from do-it-yourself biology (DIYbio) to commercial enterprises, it is important that all scientists working on this project are cognizant of the ethical and policy issues associated with...

  20. Analog synthetic biology.

    Science.gov (United States)

    Sarpeshkar, R

    2014-03-28

    We analyse the pros and cons of analog versus digital computation in living cells. Our analysis is based on fundamental laws of noise in gene and protein expression, which set limits on the energy, time, space, molecular count and part-count resources needed to compute at a given level of precision. We conclude that analog computation is significantly more efficient in its use of resources than deterministic digital computation even at relatively high levels of precision in the cell. Based on this analysis, we conclude that synthetic biology must use analog, collective analog, probabilistic and hybrid analog-digital computational approaches; otherwise, even relatively simple synthetic computations in cells such as addition will exceed energy and molecular-count budgets. We present schematics for efficiently representing analog DNA-protein computation in cells. Analog electronic flow in subthreshold transistors and analog molecular flux in chemical reactions obey Boltzmann exponential laws of thermodynamics and are described by astoundingly similar logarithmic electrochemical potentials. Therefore, cytomorphic circuits can help to map circuit designs between electronic and biochemical domains. We review recent work that uses positive-feedback linearization circuits to architect wide-dynamic-range logarithmic analog computation in Escherichia coli using three transcription factors, nearly two orders of magnitude more efficient in parts than prior digital implementations.

  1. Synthetic lubricating oils

    Energy Technology Data Exchange (ETDEWEB)

    Rodriguez Jurado, J

    1953-01-01

    A yellow solid petroleum paraffin d/sup 60/ 0.808, I number 3.5, average molecular weight 350, chlorinated and condensed with benzene, xylene, or naphthalene by the Friedel and Crafts reaction, in the presence of anhydrous AlCl/sub 3/ or activated Al, gave synthetic lubricating oils. Xylene was the preferred aromatic compound, naphthalene required the use of less completely chlorinated paraffin, benzene produced resins difficult to remove and gave darker oils with excessive green fluorescence. Activated Al rather than anhydrous AlCl/sub 3/ gave darker oils with higher viscosity and Conradson C values. Tar from the low-temperature distillation of lignite, used as a source of a paraffin fraction melting 40/sup 0/ to 48/sup 0/ (chlorinated to 26.5 percent Cl) and an aromatic fraction, 45 percent aromatic compounds by volume (mainly polysubstituted benzenes), I number 10, was converted to a similar synthetic lubricant with the following properties: Kinematic viscosity at 210/sup 0/ F., 50.4 centistokes; viscosity index, 92; Conradson C, 1.5 percent; solidification point, 9/sup 0/; S, 0.41 percent.

  2. Coloring of synthetic fluorite

    International Nuclear Information System (INIS)

    Birsoy, R.

    1980-01-01

    A synthetic fluorite of the Harshaw Chemical Company is analyzed for rare earth elements, yttrium, and sodium. Samples of this fluorite are irradiated with X-rays, γ-rays, neutrons, electrons, protons, and α-particles at different energies, and their absorption spectra are analyzed. Analyzing the thermal bleaching of these radiation-coloured fluorites shows that both, impurities and radiation play a part in the coloration of synthetic fluorite. However, the main contribution comes from the radiation induced lattice defects. In the visible region spectra, the colour centre of the 5800 to 5900 A absorption band is probably mainly related with large aggregates of F-centres. The 5450 and the 5300 A absorption bands are mainly related to monovalent and divalent ion impurities and their association with lattice defects. The 3800 A absorption band seems to be related with F-centre aggregates. However, the contribution from the rare earth elements related complex color centres also plays some part for the production of this absorption band. These results indicate that the color centres of different origin can absorb light at the same wavelength. (author)

  3. ROLE OF NATURAL POLYMER IN SUSTAINED AND CONTROLLED RELEASE

    OpenAIRE

    Vaishali S. Kadam, G. R. Shendarkar

    2017-01-01

    Now a day there has been an important development in different dosage forms for existing and newly designed drugs and natural products, and synthetic as well as semi-synthetic excipients always need to be used for a variety of purposes. Gums and mucilages are widely used as natural materials for conventional and novel dosage forms. With the increasing interest in polymers of natural origin, the pharmaceutical world has compliance to use most of them in their formulations. Moreover, the tremen...

  4. Nonepileptic attack disorder among married women.

    Science.gov (United States)

    Dhanaraj, M; Rangaraj, R; Arulmozhi, T; Vengatesan, A

    2005-06-01

    To study the clinical features, precipitating stressful life events and prognosis of nonepileptic attack disorder (NEAD) among married women. Prospective cohort study with 1-year follow-up. A tertiary care teaching hospital. Of the 1020 patients with epilepsy referred to the epilepsy clinic during 2002-2003, 30 were married women with NEAD. The diagnostic criteria for NEAD included normal EEG during ictal and post-ictal phase of the generalized 'attack.' The data collected included clinical characteristics, semiology of the attacks, precipitating stressful events, and co-morbid psychiatric disorders. The control group included 30 age-matched married women with generalized tonic-clonic seizures. The long-term outcome and factors influencing the outcomes were analyzed. The mean duration of illness was 18 months, and the pattern of the attack was 'fall and lying still' in 53% and 'fall with generalized motor movements' in 47%. The frequency was one or more per week in 57% and occasionally in 43%. The important stressful events were matrimonial discord following illegal relationship of the husband with another woman (chi2 = 9.02, P = 0.003) and constant quarrel with other family members (chi2 = 5.19, P = 0.02). The prevalence of sexual abuse was low (7%). Co-morbid psychiatric disorder was observed in 70%. At the end of 1 year, 39% were free from the attack. Resolution of the stressful life events (chi2 = 4.52, P = 0.03) and lower frequency of attack at the time of reporting (chi2 = 3.88, P = 0.05) correlated with good outcomes. Among patients with NEAD in India, the major precipitating factors were matrimonial discord following illegal relationship of the husband with another woman and constant quarrel with other family members and not sexual abuse. Women with low frequency of attack at the time of reporting and the remission of the stressful events had better outcomes.

  5. Conjugated polymers developed from alkynes

    Institute of Scientific and Technical Information of China (English)

    Yajing Liu; Jacky W.Y.Lam; Ben Zhong Tang

    2015-01-01

    The numerous merits of conjugated polymers(CPs) have encouraged scientists to develop a variety of synthetic routes to CPs with diverse structures and functionalities. Among the large scope of substrates,alkyne plays an important role in constructing polymers with conjugated backbones. In addition to some well-developed reactions including Glaser–Hay and Sonogashira coupling, azide/thiol-yne click reaction and cyclotrimerization, some novel alkyne-based reactions have also been explored such as oxidative polycoupling, decarbonylative polycoupling and multicomponent tandem polymerizations. his review focuses on the recent progress on the synthetic methodology of CPs in the last ive years using monomers with two or more triple bonds and some of their high-technological applications. Selected examples of materials properties of these CPs are given in this review, such as luorescence response to chemical or physical stimuli, magnetism, white light emission, cell imaging and bioprobing. Finally, a short perspective is raised in regard to the outlook of the preparation methodologies, functionalities as well as potential applications of CPs in the future.

  6. Natural polymers, gums and mucilages as excipients in drug delivery.

    Science.gov (United States)

    Kumar, Shobhit; Gupta, Satish Kumar

    2012-01-01

    Use of natural polymers, gums and mucilages in drug delivery systems has been weighed down by the synthetic materials. Natural based excipients offered advantages such as non-toxicity, less cost and abundantly availablity. Aqueous solubility of natural excipients plays an important role in their selection for designing immediate, controlled or sustained release formulations. This review article provide an overview of natural gum, polymers and mucilages as excipients in dosage forms as well as novel drug delivery systems.

  7. Use of polymers in oil recovery processes

    Energy Technology Data Exchange (ETDEWEB)

    Stanislav, J.F.

    Water-soluble polymers are used extensively in various stages of gas and oil production operations, typical examples being enhanced oil recovery, water production control, and well drilling. A variety of polymetric materials, both naturally occurring and synthetic ones, are currently used; guar and cellulose derivatives, xanthan gum, polysaccharides, polyacrylamides and others. In this work, only the application of polymeric materials to enhanced recovery processes is discussed.

  8. Characterization of functional polymers by NMR

    International Nuclear Information System (INIS)

    Neto, Oscar H.S. A.S.; San Gil, Rosane A.S.; Nakayama, T.; Costa Neto, Claudio

    1993-01-01

    Several synthetic polymers are used in the chemical analysis of complexes mixtures aiming to extract certain specific functional groups for further identification. This work describes the utilization of NMR in the characterization of one of the above mentioned compounds which will be used as reagent for the synthesis of another compound of the same type, which will be further used in the chemical analysis of alcohols and phenols. The methodology is described. The results are described and discussed

  9. 12 CFR 263.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  10. 12 CFR 509.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding....17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  11. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  12. Compartmentalization and Transport in Synthetic Vesicles

    Directory of Open Access Journals (Sweden)

    Christine eSchmitt

    2016-02-01

    Full Text Available Nano-scale vesicles have become a popular tool in life sciences. Besides liposomes that are generated from phospholipids of natural origin, polymersomes fabricated of synthetic block copolymers enjoy increasing popularity, as they represent more versatile membrane building blocks that can be selected based on their specific physicochemical properties, like permeability, stability or chemical reactivity.In this review, we focus on the application of simple and nested artificial vesicles in synthetic biology. First, we provide an introduction into the utilization of multi-compartmented vesosomes as compartmentalized nano-scale bioreactors. In the bottom-up development of protocells from vesicular nano-reactors, the specific exchange of pathway intermediates across compartment boundaries represents a bottleneck for future studies. To date, most compartmented bioreactors rely on unspecific exchange of substrates and products. This is either based on changes in permeability of the coblock polymer shell by physicochemical triggers or by the incorporation of unspecific porin proteins into the vesicle membrane. Since the incorporation of membrane transport proteins into simple and nested artificial vesicles offers the potential for specific exchange of substances between subcompartments, it opens new vistas in the design of protocells. Therefore we devote the main part of the review to summarize the technical advances in the use of phospholipids and block copolymers for the reconstitution of membrane proteins.

  13. Trace Attack against Biometric Mobile Applications

    Directory of Open Access Journals (Sweden)

    Sanaa Ghouzali

    2016-01-01

    Full Text Available With the exponential increase in the dependence on mobile devices in everyday life, there is a growing concern related to privacy and security issues in the Gulf countries; therefore, it is imperative that security threats should be analyzed in detail. Mobile devices store enormous amounts of personal and financial information, unfortunately without any security. In order to secure mobile devices against different threats, biometrics has been applied and shown to be effective. However, biometric mobile applications are also vulnerable to several types of attacks that can decrease their security. Biometric information itself is considered sensitive data; for example, fingerprints can leave traces in touched objects and facial images can be captured everywhere or accessed by the attacker if the facial image is stored in the mobile device (lost or stolen. Hence, an attacker can easily forge the identity of a legitimate user and access data on a device. In this paper, the effects of a trace attack on the sensitivity of biometric mobile applications are investigated in terms of security and user privacy. Experimental results carried out on facial and fingerprint mobile authentication applications using different databases have shown that these mobile applications are vulnerable to the proposed attack, which poses a serious threat to the overall system security and user privacy.

  14. Subclinical endophthalmitis following a rooster attack.

    Science.gov (United States)

    Lekse Kovach, Jaclyn; Maguluri, Srilakshmi; Recchia, Franco M

    2006-12-01

    Ocular injury resulting from rooster attacks is rarely reported in the literature. Sadly, the target of these attacks is most often children younger than 3 years old, whose naiveté of the aggressive, territorial behavior of birds can place them at risk. Acute sequelae of these attacks can result in a lifetime of visual impairment. The possibility of a subacute or occult infection is an unusual occurrence that must always be considered. In an effort to prevent future attacks and ocular casualties, we present a case of a 12-month-old boy who suffered an open globe following a rooster attack. The open globe was emergently repaired. One week later, a white cataract was noticed on examination in the absence of systemic or ocular signs of inflammation. Traumatic endophthalmitis and lenticular abscess were suspected during examination under anesthesia. Vitrectomy, lensectomy, and injection of intravitreal antibiotics were performed. Culture of lenticular and vitreous aspirates grew alpha-streptococcus. Alpha-streptococcal endophthalmitis can result from ocular injuries caused by rooster pecking. The infection may present insidiously and without typical ocular or systemic symptoms or signs. Management is challenging and may require surgery.

  15. Modeling attacking of high skills volleyball players

    Directory of Open Access Journals (Sweden)

    Vladimir Gamaliy

    2014-12-01

    Full Text Available Purpose: to determine the model indicators of technical and tactical actions in the attack highly skilled volleyball players. Material and Methods: the study used statistical data of major international competitions: Olympic Games – 2012 World Championships – 2010, World League – 2010–2014 European Championship – 2010–2014. A total of 130 analyzed games. Methods were used: analysis and generalization of scientific and methodological literature, analysis of competitive activity highly skilled volleyball players, teacher observation, modeling technical and tactical actions in attacking highly skilled volleyball players. Results: it was found that the largest volume application of technical and tactical actions in the attack belongs to the group tactics «supple movement», whose indicator is 21,3%. The smallest amount of application belongs to the group tactics «flight level» model whose indicators is 5,4%, the efficiency of 3,4%, respectively. It is found that the power service in the jump from model parameters used in 51,6% of cases, the planning targets – 21,7% and 4,4% planning to reduce. Attacks performed with the back line, on model parameters used in the amount of 20,8% efficiency –13,7%. Conclusions: we prove that the performance of technical and tactical actions in the attack can be used as model in the control system of training and competitive process highly skilled volleyball players

  16. Space Synthetic Biology Project

    Science.gov (United States)

    Howard, David; Roman, Monsi; Mansell, James (Matt)

    2015-01-01

    Synthetic biology is an effort to make genetic engineering more useful by standardizing sections of genetic code. By standardizing genetic components, biological engineering will become much more similar to traditional fields of engineering, in which well-defined components and subsystems are readily available in markets. Specifications of the behavior of those components and subsystems can be used to model a system which incorporates them. Then, the behavior of the novel system can be simulated and optimized. Finally, the components and subsystems can be purchased and assembled to create the optimized system, which most often will exhibit behavior similar to that indicated by the model. The Space Synthetic Biology project began in 2012 as a multi-Center effort. The purpose of this project was to harness Synthetic Biology principals to enable NASA's missions. A central target for application was to Environmental Control & Life Support (ECLS). Engineers from NASA Marshall Space Flight Center's (MSFC's) ECLS Systems Development Branch (ES62) were brought into the project to contribute expertise in operational ECLS systems. Project lead scientists chose to pursue the development of bioelectrochemical technologies to spacecraft life support. Therefore, the ECLS element of the project became essentially an effort to develop a bioelectrochemical ECLS subsystem. Bioelectrochemical systems exploit the ability of many microorganisms to drive their metabolisms by direct or indirect utilization of electrical potential gradients. Whereas many microorganisms are capable of deriving the energy required for the processes of interest (such as carbon dioxide (CO2) fixation) from sunlight, it is believed that subsystems utilizing electrotrophs will exhibit smaller mass, volume, and power requirements than those that derive their energy from sunlight. In the first 2 years of the project, MSFC personnel conducted modeling, simulation, and conceptual design efforts to assist the

  17. On the anatomy of social engineering attacks : A literature-based dissection of successful attacks

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    The aim of this studywas to explore the extent towhich persuasion principles are used in successful social engineering attacks. Seventy-four scenarioswere extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenariowas split into attack steps, containing

  18. Attacks on public telephone networks: technologies and challenges

    Science.gov (United States)

    Kosloff, T.; Moore, Tyler; Keller, J.; Manes, Gavin W.; Shenoi, Sujeet

    2003-09-01

    Signaling System 7 (SS7) is vital to signaling and control in America's public telephone networks. This paper describes a class of attacks on SS7 networks involving the insertion of malicious signaling messages via compromised SS7 network components. Three attacks are discussed in detail: IAM flood attacks, redirection attacks and point code spoofing attacks. Depending on their scale of execution, these attacks can produce effects ranging from network congestion to service disruption. Methods for detecting these denial-of-service attacks and mitigating their effects are also presented.

  19. Cross-site scripting attacks procedure and Prevention Strategies

    Directory of Open Access Journals (Sweden)

    Wang Xijun

    2016-01-01

    Full Text Available Cross-site scripting attacks and defense has been the site of attack and defense is an important issue, this paper, the definition of cross-site scripting attacks, according to the current understanding of the chaos on the cross-site scripting, analyzes the causes and harm cross-site scripting attacks formation of attacks XXS complete process XSS attacks made a comprehensive analysis, and then for the web program includes Mobility there are cross-site scripting filter laxity given from ordinary users browse the web and web application developers two the defense cross-site scripting attacks effective strategy.

  20. Current status of synthetic epikeratoplasty.

    Science.gov (United States)

    Thompson, K P; Hanna, K; Waring, G O; Gipson, I; Liu, Y; Gailitis, R P; Johnson-Wint, B; Green, K

    1991-01-01

    Many of the deficiencies with human tissue epikeratoplasty might be improved by the use of a suitable synthetic lenticule. Potential biomaterials for epikeratoplasty include collagen (types I, III, or IV), collagen-hydrogel copolymers, bioactive synthetics, and coated hydrogels. The biomaterial must be engineered to achieve strict specifications of optical clarity, support of epithelial migration and adhesion, permeability to solutes, and stability to corneal proteases. Attaching synthetic lenticules to the cornea without cutting Bowman's layer by adhesives, laser welding, or direct adhesion may also improve the efficacy of synthetic epikeratoplasty.

  1. Synthetic biology and occupational risk.

    Science.gov (United States)

    Howard, John; Murashov, Vladimir; Schulte, Paul

    2017-03-01

    Synthetic biology is an emerging interdisciplinary field of biotechnology that involves applying the principles of engineering and chemical design to biological systems. Biosafety professionals have done an excellent job in addressing research laboratory safety as synthetic biology and gene editing have emerged from the larger field of biotechnology. Despite these efforts, risks posed by synthetic biology are of increasing concern as research procedures scale up to industrial processes in the larger bioeconomy. A greater number and variety of workers will be exposed to commercial synthetic biology risks in the future, including risks to a variety of workers from the use of lentiviral vectors as gene transfer devices. There is a need to review and enhance current protection measures in the field of synthetic biology, whether in experimental laboratories where new advances are being researched, in health care settings where treatments using viral vectors as gene delivery systems are increasingly being used, or in the industrial bioeconomy. Enhanced worker protection measures should include increased injury and illness surveillance of the synthetic biology workforce; proactive risk assessment and management of synthetic biology products; research on the relative effectiveness of extrinsic and intrinsic biocontainment methods; specific safety guidance for synthetic biology industrial processes; determination of appropriate medical mitigation measures for lentiviral vector exposure incidents; and greater awareness and involvement in synthetic biology safety by the general occupational safety and health community as well as by government occupational safety and health research and regulatory agencies.

  2. Finding Hope in Synthetic Biology.

    Science.gov (United States)

    Takala, Tuija

    2017-04-01

    For some, synthetic biology represents great hope in offering possible solutions to many of the world's biggest problems, from hunger to sustainable development. Others remain fearful of the harmful uses, such as bioweapons, that synthetic biology can lend itself to, and most hold that issues of biosafety are of utmost importance. In this article, I will evaluate these points of view and conclude that although the biggest promises of synthetic biology are unlikely to become reality, and the probability of accidents is fairly substantial, synthetic biology could still be seen to benefit humanity by enhancing our ethical understanding and by offering a boost to world economy.

  3. Tissue Harmonic Synthetic Aperture Imaging

    DEFF Research Database (Denmark)

    Rasmussen, Joachim

    The main purpose of this PhD project is to develop an ultrasonic method for tissue harmonic synthetic aperture imaging. The motivation is to advance the field of synthetic aperture imaging in ultrasound, which has shown great potentials in the clinic. Suggestions for synthetic aperture tissue...... system complexity compared to conventional synthetic aperture techniques. In this project, SASB is sought combined with a pulse inversion technique for 2nd harmonic tissue harmonic imaging. The advantages in tissue harmonic imaging (THI) are expected to further improve the image quality of SASB...

  4. Life after the synthetic cell

    DEFF Research Database (Denmark)

    Rasmussen, Steen

    2010-01-01

    Nature asked eight synthetic-biology experts about the implications for science and society of the “synthetic cell” made by the J. Craig Venter Institute (JCVI). The institute's team assembled, modified and implanted a synthesized genome into a DNA-free bacterial shell to make a self-replicating ......Nature asked eight synthetic-biology experts about the implications for science and society of the “synthetic cell” made by the J. Craig Venter Institute (JCVI). The institute's team assembled, modified and implanted a synthesized genome into a DNA-free bacterial shell to make a self...

  5. Overview of DOS attacks on wireless sensor networks and experimental results for simulation of interference attacks

    Directory of Open Access Journals (Sweden)

    Željko Gavrić

    2018-01-01

    Full Text Available Wireless sensor networks are now used in various fields. The information transmitted in the wireless sensor networks is very sensitive, so the security issue is very important. DOS (denial of service attacks are a fundamental threat to the functioning of wireless sensor networks. This paper describes some of the most common DOS attacks and potential methods of protection against them. The case study shows one of the most frequent attacks on wireless sensor networks – the interference attack. In the introduction of this paper authors assume that the attack interference can cause significant obstruction of wireless sensor networks. This assumption has been proved in the case study through simulation scenario and simulation results.

  6. Computational synthetic geometry

    CERN Document Server

    Bokowski, Jürgen

    1989-01-01

    Computational synthetic geometry deals with methods for realizing abstract geometric objects in concrete vector spaces. This research monograph considers a large class of problems from convexity and discrete geometry including constructing convex polytopes from simplicial complexes, vector geometries from incidence structures and hyperplane arrangements from oriented matroids. It turns out that algorithms for these constructions exist if and only if arbitrary polynomial equations are decidable with respect to the underlying field. Besides such complexity theorems a variety of symbolic algorithms are discussed, and the methods are applied to obtain new mathematical results on convex polytopes, projective configurations and the combinatorics of Grassmann varieties. Finally algebraic varieties characterizing matroids and oriented matroids are introduced providing a new basis for applying computer algebra methods in this field. The necessary background knowledge is reviewed briefly. The text is accessible to stud...

  7. Synthetic Aperture Compound Imaging

    DEFF Research Database (Denmark)

    Hansen, Jens Munk

    and the limiting factor is the amount of memory IO resources available. An equally high demand for memory throughput is found in the computer gaming industry, where a large part of the processing takes place on the graphics processing unit (GPU). Using the GPU, a framework for synthetic aperture imaging......Medical ultrasound imaging is used for many purposes, e.g. for localizing and classifying cysts, lesions, and other processes. Almost any mass is first observed using B-mode imaging and later classified using e.g. color flow, strain, or attenuation imaging. It is therefore important that the B......-mode images have high contrast. Like all imaging modalities, ultrasound is subject to a number of inherent artifacts that compromise image quality. The most prominent artifact is the degradation by coherent wave interference, known as “speckle”, which gives a granular appearance to an otherwise homogeneous...

  8. Transionospheric synthetic aperture imaging

    CERN Document Server

    Gilman, Mikhail; Tsynkov, Semyon

    2017-01-01

    This landmark monograph presents the most recent mathematical developments in the analysis of ionospheric distortions of SAR images and offers innovative new strategies for their mitigation. As a prerequisite to addressing these topics, the book also discusses the radar ambiguity theory as it applies to synthetic aperture imaging and the propagation of radio waves through the ionospheric plasma, including the anisotropic and turbulent cases. In addition, it covers a host of related subjects, such as the mathematical modeling of extended radar targets (as opposed to point-wise targets) and the scattering of radio waves off those targets, as well as the theoretical analysis of the start-stop approximation, which is used routinely in SAR signal processing but often without proper justification. The mathematics in this volume is clean and rigorous – no assumptions are hidden or ambiguously stated. The resulting work is truly interdisciplinary, providing both a comprehensive and thorough exposition of the field,...

  9. Synthetic fuels and fusion

    Energy Technology Data Exchange (ETDEWEB)

    Fillo, J A; Powell, J; Steinberg, M [Brookhaven National Lab., Upton, NY (USA)

    1981-03-01

    The decreasing availability of fossil fuels emphasizes the need to develop systems which will produce synthetic fuel to substitute for and supplement the natural supply. An important first step in the synthesis of liquid and gaseous fuels is the production of hydrogen. Thermonuclear fusion offers an inexhaustible source of energy for the production of hydrogen from water. Depending on design, electric generation efficiencies of approx. equal to 40-60% and hydrogen production efficiencies by high temperature electrolysis of approx. equal to 50-70% are projected for fusion reactors using high temperature blankets. Fusion/coal symbiotic systems appear economically promising for the first generation of commercial fusion synfuels plants. Coal production requirements and the environmental effects of large-scale coal usage would be greatly reduced by a fusion/coal system. In the long-term, there could be a gradual transition to an inexhaustible energy system based solely on fusion.

  10. Counteracting Power Analysis Attacks by Masking

    Science.gov (United States)

    Oswald, Elisabeth; Mangard, Stefan

    The publication of power analysis attacks [12] has triggered a lot of research activities. On the one hand these activities have been dedicated toward the development of secure and efficient countermeasures. On the other hand also new and improved attacks have been developed. In fact, there has been a continuous arms race between designers of countermeasures and attackers. This chapter provides a brief overview of the state-of-the art in the arms race in the context of a countermeasure called masking. Masking is a popular countermeasure that has been extensively discussed in the scientific community. Numerous articles have been published that explain different types of masking and that analyze weaknesses of this countermeasure.

  11. The WOMBAT Attack Attribution Method: Some Results

    Science.gov (United States)

    Dacier, Marc; Pham, Van-Hau; Thonnard, Olivier

    In this paper, we present a new attack attribution method that has been developed within the WOMBAT project. We illustrate the method with some real-world results obtained when applying it to almost two years of attack traces collected by low interaction honeypots. This analytical method aims at identifying large scale attack phenomena composed of IP sources that are linked to the same root cause. All malicious sources involved in a same phenomenon constitute what we call a Misbehaving Cloud (MC). The paper offers an overview of the various steps the method goes through to identify these clouds, providing pointers to external references for more detailed information. Four instances of misbehaving clouds are then described in some more depth to demonstrate the meaningfulness of the concept.

  12. Drug delivery's quest for polymers: Where are the frontiers?

    Science.gov (United States)

    Merkle, Hans P

    2015-11-01

    Since the legendary 1964 article of Folkman and Long entitled "The use of silicone rubber as a carrier for prolonged drug therapy" the role of polymers in controlled drug delivery has come a long way. Today it is evident that polymers play a crucial if not the prime role in this field. The latest boost owes to the interest in drug delivery for the purpose of tissue engineering in regenerative medicine. The focus of this commentary is on a selection of general and personal observations that are characteristic for the current state of polymer therapeutics and carriers. It briefly highlights selected examples for the long march of synthetic polymer-drug conjugates from bench to bedside, comments on the ambivalence of selected polymers as inert excipients versus biological response modifiers, and on the yet unsolved dilemma of cationic polymers for the delivery of nucleic acid therapeutics. Further subjects are the complex design of multifunctional polymeric carriers including recent concepts towards functional supramolecular polymers, as well as observations on stimuli-sensitive polymers and the currently ongoing trend towards natural and naturally-derived biopolymers. The final topic is the discovery and early development of a novel type of biodegradable polyesters for parenteral use. Altogether, it is not the basic and applied research in polymer therapeutics and carriers, but the translational process that is the key hurdle to proceed towards an authoritative approval of new polymer therapeutics and carriers. Copyright © 2015 Elsevier B.V. All rights reserved.

  13. Molecularly Imprinted Polymer Synthesis Using RAFT Polymerisation

    International Nuclear Information System (INIS)

    Cormack, P.A.G.; Faizatul Shimal Mehamod; Faizatul Shimal Mehamod

    2013-01-01

    In this paper, the synthesis and characterisation of caffeine-imprinted polymers are described. The polymers were prepared in monolithic form via both reversible addition-fragmentation chain-transfer (RAFT) polymerisation and conventional free radical polymerisation, using methacrylic acid and ethylene glycol dimethacrylate as the functional monomer and crosslinking agent, respectively. The potential benefits in applying RAFT polymerisation techniques towards the synthesis of molecularly imprinted polymers (MIPs) are explored and elucidated. The pore structures of the polymers produced were characterised by nitrogen sorption porosimetry and the molecular recognition properties of representative products were evaluated in high-performance liquid chromatography (HPLC) mode. Molecular imprinting effects were confirmed by analysing the relative retentions of analytes on imprinted and non-imprinted HPLC stationary phases. It was found that a caffeine-imprinted polymer synthesised by RAFT polymerisation was superior to a polymer prepared using a conventional synthetic approach; the imprinting factor and column efficiency were found to be higher for the former material. (author)

  14. Review of radiation processing of natural polymer

    International Nuclear Information System (INIS)

    Khairul Zaman

    2007-01-01

    In recent years, natural polymers are being investigated with renewed interest because of their abundant quantity and unique characteristics such as inherent biocompatibility, biodegradability and renewable. It is also known as green polymer. Natural polymers such as carrageen, alginate, chitin/chitosan and starch are traditionally used in food-based industry. But now, the applications of natural polymers are being sought in knowledge-driven areas such as healthcare, agro-technology and industry. Radiation degraded alginates, carrangeenan and chitosan as plant growth promoter and protector have been developed. Radiation degraded chitosan, carraneenan and starch have also been used together with synthetic polymers for hydrogel production to be used for wound dressing, skin moisturization and for biodegradable packaging films and foams. Radiation crosslinking of natural polymer derivatives such as carboxymethyl chitosan, carboxymethyl starch have been successfully developed in Japan and used for various applications such as removal of pollutants, removal of waters from liverstock excrete as well as for bedsores protection mat. (author)

  15. Gas Sensors Based on Electrodeposited Polymers

    Directory of Open Access Journals (Sweden)

    Boris Lakard

    2015-07-01

    Full Text Available Electrochemically deposited polymers, also called “synthetic metals”, have emerged as potential candidates for chemical sensing due to their interesting and tunable chemical, electrical, and structural properties. In particular, most of these polymers (including polypyrrole, polyaniline, polythiophene and their derivatives can be used as the sensitive layer of conductimetric gas sensors because of their conducting properties. An important advantage of polymer-based gas sensors is their efficiency at room temperature. This characteristic is interesting since most of the commercially-available sensors, usually based on metal oxides, work at high temperatures (300–400 °C. Consequently, polymer-based gas sensors are playing a growing role in the improvement of public health and environment control because they can lead to gas sensors operating with rapid detection, high sensitivity, small size, and specificity in atmospheric conditions. In this review, the recent advances in electrodeposited polymer-based gas sensors are summarized and discussed. It is shown that the sensing characteristics of electrodeposited polymers can be improved by chemical functionalization, nanostructuration, or mixing with other functional materials to form composites or hybrid materials.

  16. Well-defined single-chain polymer nanoparticles via thiol-Michael addition

    NARCIS (Netherlands)

    Kröger, A. Pia P.; Boonen, Roy J.E.A.; Paulusse, Jos M.J.

    2017-01-01

    A synthetic strategy has been developed giving facile access to well-defined single-chain polymer nanoparticles (SCNPs) from styrene-, acrylate- and methacrylate-based polymers. Random copolymers (polydispersity indices 1.10–1.15) of methyl (meth)acrylate, benzyl methacrylate or styrene containing

  17. Influence of polymer chain architecture of poly(vinyl alcohol) on the inhibition of ice recrystallization

    NARCIS (Netherlands)

    Olijve, L.L.C.; Hendrix, M.M.R.M.; Voets, I.K.

    2016-01-01

    Poly(vinyl alcohol) (PVA) is a water-soluble synthetic polymer well-known to effectively block the recrystallization of ice. The effect of polymer chain architecture on the ice recrystallization inhibition (IRI) by PVA remains unexplored. In this work, the synthesis of PVA molecular bottlebrushes is

  18. Distributed detection of communities in complex networks using synthetic coordinates

    International Nuclear Information System (INIS)

    Papadakis, H; Fragopoulou, P; Panagiotakis, C

    2014-01-01

    Various applications like finding Web communities, detecting the structure of social networks, and even analyzing a graph’s structure to uncover Internet attacks are just some of the applications for which community detection is important. In this paper, we propose an algorithm that finds the entire community structure of a network, on the basis of local interactions between neighboring nodes and an unsupervised distributed hierarchical clustering algorithm. The novelty of the proposed approach, named SCCD (standing for synthetic coordinate community detection), lies in the fact that the algorithm is based on the use of Vivaldi synthetic network coordinates computed by a distributed algorithm. The current paper not only presents an efficient distributed community finding algorithm, but also demonstrates that synthetic network coordinates could be used to derive efficient solutions to a variety of problems. Experimental results and comparisons with other methods from the literature are presented for a variety of benchmark graphs with known community structure, derived from varying a number of graph parameters and real data set graphs. The experimental results and comparisons to existing methods with similar computation cost on real and synthetic data sets demonstrate the high performance and robustness of the proposed scheme. (paper)

  19. A novel proposed network security management approach for cyber attacks

    International Nuclear Information System (INIS)

    Ahmed, Z.; Nazir, B.; Zafar, M.F.; Anwar, M.M.; Azam, K.; Asar, A.U.

    2007-01-01

    Network security is a discipline that focuses on securing networks from unauthorized access. Given the Escalating threats of malicious cyber attacks, modern enterprises employ multiple lines of defense. A comprehensive defense strategy against such attacks should include (I) an attack detection component that deter- mines the fact that a program is compromised, (2) an attack identification and prevention component that identifies attack packets so that one can block such packets in the future and prevents the attack from further propagation. Over the last decade, a significant amount of research has been vested in the systems that can detect cyber attacks either statically at compile time or dynamically at run time, However, not much effort is spent on automated attack packet identification or attack prevention. In this paper we present a unified solution to the problems mentioned above. We implemented this solution after the forward engineering of Open Source Security Information Management (OSSIM) system called Preventive Information Security management (PrISM) system that correlates input from different sensors so that the resulting product can automatically detect any cyber attack against it and prevents by identifying the actual attack packet(s). The PrISM was always able to detect the attacks, identify the attack packets and most often prevent by blocking the attacker's IP address to continue normal execution. There is no additional run-time performance overhead for attack prevention. (author)

  20. Playing Attack and Defense with Trusted Storage

    DEFF Research Database (Denmark)

    Gonzalez, Javier; Bonnet, Philippe; Bouganim, Luc

    2014-01-01

    It is often convenient to assume in a data management platform that one or several computing devices are trusted, specially when the goal is to provide privacy guarantees over personal data. But what does it take for a computing device to be trusted? More specifically, how can a personal device...... provide trusted storage? This is the question we tackle in this demonstration. We describe how secure devices, equipped with a trusted execution environment, differ from general purpose devices. We illustrate with our demonstration scenario, that it is much more difficult to attack a storage service...... running on a secure device, than to attack the same service running on a general purpose device....

  1. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolić, Ivica; Rechberger, Christian

    2014-01-01

    ciphers, including the new standard SHA-3 (Keccak). The rebound attack is a start-from-the-middle approach for finding differential paths and conforming pairs in byte-oriented designs like Substitution-Permutation networks and AES. We apply our new compositional attack to the reduced version of the hash...... number of rounds. We also use neutral bits and message modification methods from the practice of collision search in MD5 and SHA-1 hash functions. These methods push the rotational property through more rounds than previous analysis suggested, and eventually establish a distinguishing property...

  2. A Distinguish Attack on COSvd Cipher

    OpenAIRE

    Mohammad Ali Orumiehchi ha; R. Mirghadri

    2007-01-01

    The COSvd Ciphers has been proposed by Filiol and others (2004). It is a strengthened version of COS stream cipher family denoted COSvd that has been adopted for at least one commercial standard. We propose a distinguish attack on this version, and prove that, it is distinguishable from a random stream. In the COSvd Cipher used one S-Box (10×8) on the final part of cipher. We focus on S-Box and use weakness this S-Box for distinguish attack. In addition, found a leak on HNLL that the sub s-bo...

  3. Attacks and infections in percolation processes

    International Nuclear Information System (INIS)

    Janssen, Hans-Karl; Stenull, Olaf

    2017-01-01

    We discuss attacks and infections at propagating fronts of percolation processes based on the extended general epidemic process. The scaling behavior of the number of the attacked and infected sites in the long time limit at the ordinary and tricritical percolation transitions is governed by specific composite operators of the field-theoretic representation of this process. We calculate corresponding critical exponents for tricritical percolation in mean-field theory and for ordinary percolation to 1-loop order. Our results agree well with the available numerical data. (paper)

  4. Attack strategies on quantum cryptographic protocols

    International Nuclear Information System (INIS)

    Schauer, S.; Suda, M.

    2006-01-01

    Full text: Quantum key distribution (QKD) and quantum authentication (QA) have been a topic of extensive research in the last 20 years. In course of that many attacks on QKD and QA protocols have been studied. Among these, Zhang, Lee and Guo presented an attack on a QKD protocol using entanglement swapping. Based on that strategy we take a look at other protocols to inspect how much information an adversary may get if he shares entanglement with either one or both parties. We will present some protocols where an adversary can even get full information about the key using entanglement. (author)

  5. Bamboo reinforced polymer composite - A comprehensive review

    Science.gov (United States)

    Roslan, S. A. H.; Rasid, Z. A.; Hassan, M. Z.

    2018-04-01

    Bamboo has greatly attention of researchers due to their advantages over synthetic polymers. It is entirely renewable, environmentally-friendly, non-toxic, cheap, non-abrasive and fully biodegradable. This review paper summarized an oveview of the bamboo, fiber extraction and mechanical behavior of bamboo reinforced composites. A number of studies proved that mechanical properties of bamboo fibers reinforced reinforced polymer composites are excellent and competent to be utilized in high-tech applications. The properties of the laminate are influenced by the fiber loading, fibre orientation, physical and interlaminar adhesion between fibre and matrix. In contrast, the presence of chemical constituents such as cellulose, lignin, hemicellulose and wax substances in natural fibres preventing them from firmly binding with polymer resin. Thus, led to poor mechanical properties for composites. Many attempt has been made in order to overcome this issue by using the chemical treatment.

  6. Crystal and molecular simulation of high-performance polymers.

    Science.gov (United States)

    Colquhoun, H M; Williams, D J

    2000-03-01

    Single-crystal X-ray analyses of oligomeric models for high-performance aromatic polymers, interfaced to computer-based molecular modeling and diffraction simulation, have enabled the determination of a range of previously unknown polymer crystal structures from X-ray powder data. Materials which have been successfully analyzed using this approach include aromatic polyesters, polyetherketones, polythioetherketones, polyphenylenes, and polycarboranes. Pure macrocyclic homologues of noncrystalline polyethersulfones afford high-quality single crystals-even at very large ring sizes-and have provided the first examples of a "protein crystallographic" approach to the structures of conventionally amorphous synthetic polymers.

  7. Polymeric drugs: Advances in the development of pharmacologically active polymers

    Science.gov (United States)

    Li, Jing; Yu, Fei; Chen, Yi; Oupický, David

    2015-01-01

    Synthetic polymers play a critical role in pharmaceutical discovery and development. Current research and applications of pharmaceutical polymers are mainly focused on their functions as excipients and inert carriers of other pharmacologically active agents. This review article surveys recent advances in alternative pharmaceutical use of polymers as pharmacologically active agents known as polymeric drugs. Emphasis is placed on the benefits of polymeric drugs that are associated with their macromolecular character and their ability to explore biologically relevant multivalency processes. We discuss the main therapeutic uses of polymeric drugs as sequestrants, antimicrobials, antivirals, and anticancer and anti-inflammatory agents. PMID:26410809

  8. Imaging with Synthetic Aperture Radar

    CERN Document Server

    Massonnet, Didier

    2008-01-01

    Describing a field that has been transformed by the recent availability of data from a new generation of space and airborne systems, the authors offer a synthetic geometrical approach to the description of synthetic aperture radar, one that addresses physicists, radar specialists, as well as experts in image processing.  

  9. Synthetic peptides for antibody production

    NARCIS (Netherlands)

    Zegers, N.D.

    1995-01-01

    Synthetic peptides are useful tools for the generation of antibodies. The use of antibodies as specific reagents in inununochemical assays is widely applied. In this chapter, the application of synthetic peptides for the generation of antibodies is described. The different steps that lead to the

  10. Synthetic peptides for antibody production

    NARCIS (Netherlands)

    N.D. Zegers (Netty)

    1995-01-01

    textabstractSynthetic peptides are useful tools for the generation of antibodies. The use of antibodies as specific reagents in inununochemical assays is widely applied. In this chapter, the application of synthetic peptides for the generation of antibodies is described. The different steps

  11. Synthetic biology and metabolic engineering.

    Science.gov (United States)

    Stephanopoulos, Gregory

    2012-11-16

    Metabolic engineering emerged 20 years ago as the discipline occupied with the directed modification of metabolic pathways for the microbial synthesis of various products. As such, it deals with the engineering (design, construction, and optimization) of native as well as non-natural routes of product synthesis, aided in this task by the availability of synthetic DNA, the core enabling technology of synthetic biology. The two fields, however, only partially overlap in their interest in pathway engineering. While fabrication of biobricks, synthetic cells, genetic circuits, and nonlinear cell dynamics, along with pathway engineering, have occupied researchers in the field of synthetic biology, the sum total of these areas does not constitute a coherent definition of synthetic biology with a distinct intellectual foundation and well-defined areas of application. This paper reviews the origins of the two fields and advances two distinct paradigms for each of them: that of unit operations for metabolic engineering and electronic circuits for synthetic biology. In this context, metabolic engineering is about engineering cell factories for the biological manufacturing of chemical and pharmaceutical products, whereas the main focus of synthetic biology is fundamental biological research facilitated by the use of synthetic DNA and genetic circuits.

  12. The Ethics of Synthetic Biology

    DEFF Research Database (Denmark)

    Christiansen, Andreas

    The dissertation analyses and discusses a number of ethical issues that have been raised in connection with the development of synthetic biology. Synthetic biology is a set of new techniques for DNA-level design and construction of living beings with useful properties. The dissertation especially...

  13. Synthetic biology of polyketide synthases

    DEFF Research Database (Denmark)

    Yuzawa, Satoshi; Backman, Tyler W.H.; Keasling, Jay D.

    2018-01-01

    ). The modules are composed of enzymatic domains that share sequence and functional similarity across all known PKSs. We have used the nomenclature of synthetic biology to classify the enzymatic domains and modules as parts and devices, respectively, and have generated detailed lists of both. In addition, we...... realize the potential that synthetic biology approaches bring to this class of molecules....

  14. Investigating the Possibility to Individualize Asthma Attack Therapy Based on Attack Severity and Patient Characteristics

    Directory of Open Access Journals (Sweden)

    Sárkány Zoltán

    2016-03-01

    Full Text Available Introduction: The objective of this study was to investigate with the help of a computerized simulation model whether the treatment of an acute asthma attack can be individualized based on the severity of the attack and the characteristics of the patient. Material and Method: A stochastic lung model was used to simulate the deposition of 1 nm - 10 μm particles during a mild and a moderate asthma attack. Breathing parameters were varied to maximize deposition, and simulation results were compared with those obtained in the case of a severe asthma attack. In order to investigate the effect of height on the deposition of inhaled particles, another series of simulations was carried out with identical breathing parameters, comparing patient heights of 155 cm, 175 cm and 195 cm. Results: The optimization process yielded an increase in the maximum deposition values of around 6-7% for each type of investigated asthma attack, and the difference between attacks of different degree of severity was around 5% for both the initial and the optimized values, a higher degree of obstruction increasing the amount of deposited particles. Conclusions: Our results suggest that the individualization of asthma attack treatment cannot be based on particles of different size, as the highest deposited fraction in all three types of attacks can be obtained using 0.01 μm particles. The use of a specific set of breathing parameters yields a difference between a mild and a moderate, as well as a moderate and a severe asthma attack of around 5%.

  15. Shape memory polymers

    Energy Technology Data Exchange (ETDEWEB)

    Wilson, Thomas S.; Bearinger, Jane P.

    2017-08-29

    New shape memory polymer compositions, methods for synthesizing new shape memory polymers, and apparatus comprising an actuator and a shape memory polymer wherein the shape memory polymer comprises at least a portion of the actuator. A shape memory polymer comprising a polymer composition which physically forms a network structure wherein the polymer composition has shape-memory behavior and can be formed into a permanent primary shape, re-formed into a stable secondary shape, and controllably actuated to recover the permanent primary shape. Polymers have optimal aliphatic network structures due to minimization of dangling chains by using monomers that are symmetrical and that have matching amine and hydroxl groups providing polymers and polymer foams with clarity, tight (narrow temperature range) single transitions, and high shape recovery and recovery force that are especially useful for implanting in the human body.

  16. Shape memory polymers

    Science.gov (United States)

    Wilson, Thomas S.; Bearinger, Jane P.

    2015-06-09

    New shape memory polymer compositions, methods for synthesizing new shape memory polymers, and apparatus comprising an actuator and a shape memory polymer wherein the shape memory polymer comprises at least a portion of the actuator. A shape memory polymer comprising a polymer composition which physically forms a network structure wherein the polymer composition has shape-memory behavior and can be formed into a permanent primary shape, re-formed into a stable secondary shape, and controllably actuated to recover the permanent primary shape. Polymers have optimal aliphatic network structures due to minimization of dangling chains by using monomers that are symmetrical and that have matching amine and hydroxyl groups providing polymers and polymer foams with clarity, tight (narrow temperature range) single transitions, and high shape recovery and recovery force that are especially useful for implanting in the human body.

  17. Functional polymers as therapeutic agents: concept to market place.

    Science.gov (United States)

    Dhal, Pradeep K; Polomoscanik, Steven C; Avila, Louis Z; Holmes-Farley, S Randall; Miller, Robert J

    2009-11-12

    Biologically active synthetic polymers have received considerable scientific interest and attention in recent years for their potential as promising novel therapeutic agents to treat human diseases. Although a significant amount of research has been carried out involving polymer-linked drugs as targeted and sustained release drug delivery systems and prodrugs, examples on bioactive polymers that exhibit intrinsic therapeutic properties are relatively less. Several appealing characteristics of synthetic polymers including high molecular weight, molecular architecture, and controlled polydispersity can all be utilized to discover a new generation of therapies. For example, high molecular weight bioactive polymers can be restricted to gastrointestinal tract, where they can selectively recognize, bind, and remove target disease causing substances from the body. The appealing features of GI tract restriction and stability in biological environment render these polymeric drugs to be devoid of systemic toxicity that are generally associated with small molecule systemic drugs. The present article highlights recent developments in the rational design and synthesis of appropriate functional polymers that have resulted in a number of promising polymer based therapies and biomaterials, including some marketed products.

  18. Sequential and Parallel Attack Tree Modelling

    NARCIS (Netherlands)

    Arnold, Florian; Guck, Dennis; Kumar, Rajesh; Stoelinga, Mariëlle Ida Antoinette; Koornneef, Floor; van Gulijk, Coen

    The intricacy of socio-technical systems requires a careful planning and utilisation of security resources to ensure uninterrupted, secure and reliable services. Even though many studies have been conducted to understand and model the behaviour of a potential attacker, the detection of crucial

  19. Cooperative Electronic Attack using Unmanned Air Vehicles

    National Research Council Canada - National Science Library

    Mears, Mark J

    2006-01-01

    ... that are salient in the context of cooperative control. The utility of electronic attack is described in the context of integrated air defense systems that rely on RADAR sites that act as a network to gather information about potential airborne threats...

  20. Network overload due to massive attacks

    Science.gov (United States)

    Kornbluth, Yosef; Barach, Gilad; Tuchman, Yaakov; Kadish, Benjamin; Cwilich, Gabriel; Buldyrev, Sergey V.

    2018-05-01

    We study the cascading failure of networks due to overload, using the betweenness centrality of a node as the measure of its load following the Motter and Lai model. We study the fraction of survived nodes at the end of the cascade pf as a function of the strength of the initial attack, measured by the fraction of nodes p that survive the initial attack for different values of tolerance α in random regular and Erdös-Renyi graphs. We find the existence of a first-order phase-transition line pt(α ) on a p -α plane, such that if p pt , pf is large and the giant component of the network is still present. Exactly at pt, the function pf(p ) undergoes a first-order discontinuity. We find that the line pt(α ) ends at a critical point (pc,αc) , in which the cascading failures are replaced by a second-order percolation transition. We find analytically the average betweenness of nodes with different degrees before and after the initial attack, we investigate their roles in the cascading failures, and we find a lower bound for pt(α ) . We also study the difference between localized and random attacks.

  1. Attack Classification Schema for Smart City WSNs

    Directory of Open Access Journals (Sweden)

    Victor Garcia-Font

    2017-04-01

    Full Text Available Urban areas around the world are populating their streets with wireless sensor networks (WSNs in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  2. Adversarial Feature Selection Against Evasion Attacks.

    Science.gov (United States)

    Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio

    2016-03-01

    Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection.

  3. Intrusion-Tolerant Replication under Attack

    Science.gov (United States)

    Kirsch, Jonathan

    2010-01-01

    Much of our critical infrastructure is controlled by large software systems whose participants are distributed across the Internet. As our dependence on these critical systems continues to grow, it becomes increasingly important that they meet strict availability and performance requirements, even in the face of malicious attacks, including those…

  4. Strengthening Crypto-1 Cipher Against Algebraic Attacks

    Directory of Open Access Journals (Sweden)

    Farah Afianti

    2015-08-01

    Full Text Available In the last few years, several studies addressed the problem of data security in Mifare Classic. One of its weaknesses is the low random number quality. This causes SAT solver attacks to have lower complexity. In order to strengthen Crypto-1 against SAT solver attacks, a modification of the feedback function with better cryptographic properties is proposed. It applies a primitive polynomial companion matrix. SAT solvers cannot directly attack the feedback shift register that uses the modified Boolean feedback function, the register has to be split into smaller groups. Experimental testing showed that the amount of memory and CPU time needed were highest when attacking the modified Crypto-1 using the modified feedback function and the original filter function. In addition, another modified Crypto-1, using the modified feedback function and a modified filter function, had the lowest percentage of revealed variables. It can be concluded that the security strength and performance of the modified Crypto-1 using the modified feedback function and the modified filter function are better than those of the original Crypto-1.

  5. Wrap-Attack Pack: Product Packaging Exercise

    Science.gov (United States)

    Lee, Seung Hwan; Hoffman, K. Douglas

    2016-01-01

    Although many marketing courses discuss traditional concepts pertaining to product strategy, concepts specifically relating to packaging are often glossed over. This exercise, "Wrap-Attack Pack," teaches students about the utilitarian and hedonic design elements of packaging. More specifically, the primary objective is to creatively…

  6. Social Engineering Attack Detection Model: SEADMv2

    CSIR Research Space (South Africa)

    Mouton, F

    2015-10-01

    Full Text Available link in the security chain. A social engineering attack targets this weakness by using various manipulation techniques to elicit individuals to perform sensitive requests. The field of social engineering is still in its infancy as far as formal...

  7. Attack Classification Schema for Smart City WSNs.

    Science.gov (United States)

    Garcia-Font, Victor; Garrigues, Carles; Rifà-Pous, Helena

    2017-04-05

    Urban areas around the world are populating their streets with wireless sensor networks (WSNs) in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  8. Algebraic Side-Channel Attack on Twofish

    Directory of Open Access Journals (Sweden)

    Chujiao Ma

    2017-05-01

    Full Text Available While algebraic side-channel attack (ASCA has been successful in breaking simple cryptographic algorithms, it has never been done on larger or more complex algorithms such as Twofish. Compared to other algorithms that ASCA has been used on, Twofish is more difficult to attack due to the key-dependent S-boxes as well as the complex key scheduling. In this paper, we propose the first algebraic side-channel attack on Twofish, and examine the importance of side-channel information in getting past the key-dependent S-boxes and the complex key scheduling. The cryptographic algorithm and side-channel information are both expressed as boolean equations and a SAT solver is used to recover the key. While algebraic attack by itself is not sufficient to break the algorithm, with the help of side-channel information such as Hamming weights, we are able to correctly solve for 96 bits of the 128 bits key in under 2 hours with known plaintext/ciphertext.

  9. Armed Deterrence: Countering Soft Target Attacks

    Science.gov (United States)

    2016-02-06

    offer no security. With over 17,430 such geographically separated military sites across the United States, these fatal shootings by a Kuwaiti- born ...increasing trend and the carnage 4 that IS sympathizers can unleash. This coordinated attack on a concert hall, a soccer stadium, and restaurant

  10. 47 CFR 76.1612 - Personal attack.

    Science.gov (United States)

    2010-10-01

    ... Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES MULTICHANNEL VIDEO AND... issues of public importance, an attack is made upon the honesty, character, integrity, or like personal qualities of an identified person or group, the cable television system operator shall, within a reasonable...

  11. Rising Trend: Complex and sophisticated attack methods

    Indian Academy of Sciences (India)

    Stux, DuQu, Nitro, Luckycat, Exploit Kits, FLAME. ADSL/SoHo Router Compromise. Botnets of compromised ADSL/SoHo Routers; User Redirection via malicious DNS entry. Web Application attacks. SQL Injection, RFI etc. More and more Webshells. More utility to hackers; Increasing complexity and evading mechanisms.

  12. Strategic defense and attack for reliability systems

    International Nuclear Information System (INIS)

    Hausken, Kjell

    2008-01-01

    This article illustrates a method by which arbitrarily complex series/parallel reliability systems can be analyzed. The method is illustrated with the series-parallel and parallel-series systems. Analytical expressions are determined for the investments and utilities of the defender and the attacker, depend on their unit costs of investment for each component, the contest intensity for each component, and their evaluations of the value of system functionality. For a series-parallel system, infinitely many components in parallel benefit the defender maximally regardless of the finite number of parallel subsystems in series. Conversely, infinitely many components in series benefit the attacker maximally regardless of the finite number of components in parallel in each subsystem. For a parallel-series system, the results are opposite. With equivalent components, equal unit costs for defender and attacker, equal intensity for all components, and equally many components in series and parallel, the defender always prefers the series-parallel system rather than the parallel-series system, and converse holds for the attacker. Hence from the defender's perspective, ceteris paribus, the series-parallel system is more reliable, and has fewer 'cut sets' or failure modes

  13. Validation Method of a Telecommunications Blackout Attack

    National Research Council Canada - National Science Library

    Amado, Joao; Nunes, Paulo

    2005-01-01

    ..., and to obtain the maximum disruptive effect over the services. The proposed method uses a top-down approach, starting on the service level and ending on the different network elements that can be identified in the end as the targets for the attack.

  14. Association between Terror Attacks and Suicide Attempts

    Science.gov (United States)

    Weizman, Tal; Yagil, Yaron; Schreiber, Shaul

    2009-01-01

    Based on Durkheim's "Control theory," we explored the association between frequency of terror attacks in Israel and the frequency of suicide attempts admitted to the Emergency Room of a major general hospital in Tel-Aviv (1999-2004). Analysis of the six-year study period as a whole revealed no significant correlation between the…

  15. Rising Trend: Complex and sophisticated attack methods

    Indian Academy of Sciences (India)

    Increased frequency and intensity of DoS/DDoS. Few Gbps is now normal; Anonymous VPNs being used; Botnets being used as a vehicle for launching DDoS attacks. Large scale booking of domain names. Hundred thousands of domains registered in short duration via few registrars; Single registrant; Most of the domains ...

  16. Understanding How Components of Organisations Contribute to Attacks

    DEFF Research Database (Denmark)

    Gu, Min; Aslanyan, Zaruhi; Probst, Christian W.

    2016-01-01

    Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors is diffi......Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors...... is difficult. Recently, system models have been used for automatically identifying possible attacks on the modelled organisation. The generated attacks consider all three layers, making the contribution of building infrastructure, computer infrastructure, and humans (insiders and outsiders) explicit. However......, this contribution is only visible in the attack trees as part of the performed steps; it cannot be mapped back to the model directly since the actions usually involve several elements (attacker and targeted actor or asset). Especially for large attack trees, understanding the relations between several model...

  17. An Adaptive Approach for Defending against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Muhai Li

    2010-01-01

    Full Text Available In various network attacks, the Distributed Denial-of-Service (DDoS attack is a severe threat. In order to deal with this kind of attack in time, it is necessary to establish a special type of defense system to change strategy dynamically against attacks. In this paper, we introduce an adaptive approach, which is used for defending against DDoS attacks, based on normal traffic analysis. The approach can check DDoS attacks and adaptively adjust its configurations according to the network condition and attack severity. In order to insure the common users to visit the victim server that is being attacked, we provide a nonlinear traffic control formula for the system. Our simulation test indicates that the nonlinear control approach can prevent the malicious attack packets effectively while making legitimate traffic flows arrive at the victim.

  18. Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2012-01-01

    and initiate security attacks that disturb the normal functioning of the network in a severe manner. Such attacks affect the performance of the network by increasing the energy consumption, by reducing throughput and by inducing long delays. Of all existing WSN attacks, MAC layer attacks are considered...... the most harmful as they directly affect the available resources and thus the nodes’ energy consumption. The first endeavour of this paper is to model the activities of MAC layer security attacks to understand the flow of activities taking place when mounting the attack and when actually executing it....... The second aim of the paper is to simulate these attacks on hybrid MAC mechanisms, which shows the performance degradation of aWSN under the considered attacks. The modelling and implementation of the security attacks give an actual view of the network which can be useful in further investigating secure...

  19. Computing with synthetic protocells.

    Science.gov (United States)

    Courbet, Alexis; Molina, Franck; Amar, Patrick

    2015-09-01

    In this article we present a new kind of computing device that uses biochemical reactions networks as building blocks to implement logic gates. The architecture of a computing machine relies on these generic and composable building blocks, computation units, that can be used in multiple instances to perform complex boolean functions. Standard logical operations are implemented by biochemical networks, encapsulated and insulated within synthetic vesicles called protocells. These protocells are capable of exchanging energy and information with each other through transmembrane electron transfer. In the paradigm of computation we propose, protoputing, a machine can solve only one problem and therefore has to be built specifically. Thus, the programming phase in the standard computing paradigm is represented in our approach by the set of assembly instructions (specific attachments) that directs the wiring of the protocells that constitute the machine itself. To demonstrate the computing power of protocellular machines, we apply it to solve a NP-complete problem, known to be very demanding in computing power, the 3-SAT problem. We show how to program the assembly of a machine that can verify the satisfiability of a given boolean formula. Then we show how to use the massive parallelism of these machines to verify in less than 20 min all the valuations of the input variables and output a fluorescent signal when the formula is satisfiable or no signal at all otherwise.

  20. Interaction of multiple biomimetic antimicrobial polymers with model bacterial membranes

    Energy Technology Data Exchange (ETDEWEB)

    Baul, Upayan, E-mail: upayanb@imsc.res.in; Vemparala, Satyavani, E-mail: vani@imsc.res.in [The Institute of Mathematical Sciences, C.I.T. Campus, Taramani, Chennai 600113 (India); Kuroda, Kenichi, E-mail: kkuroda@umich.edu [Department of Biologic and Materials Sciences, University of Michigan School of Dentistry, Ann Arbor, Michigan 48109 (United States)

    2014-08-28

    Using atomistic molecular dynamics simulations, interaction of multiple synthetic random copolymers based on methacrylates on prototypical bacterial membranes is investigated. The simulations show that the cationic polymers form a micellar aggregate in water phase and the aggregate, when interacting with the bacterial membrane, induces clustering of oppositely charged anionic lipid molecules to form clusters and enhances ordering of lipid chains. The model bacterial membrane, consequently, develops lateral inhomogeneity in membrane thickness profile compared to polymer-free system. The individual polymers in the aggregate are released into the bacterial membrane in a phased manner and the simulations suggest that the most probable location of the partitioned polymers is near the 1-palmitoyl-2-oleoyl-phosphatidylglycerol (POPG) clusters. The partitioned polymers preferentially adopt facially amphiphilic conformations at lipid-water interface, despite lacking intrinsic secondary structures such as α-helix or β-sheet found in naturally occurring antimicrobial peptides.

  1. [New research on the significance of polymers in pharmaceutical formulations].

    Science.gov (United States)

    Amighi, K

    2001-01-01

    During these last few decades, a lot of work has been made in pharmaceutical area in order to control the drug delivery from various pharmaceutical dosage forms. The use of polymers in pharmaceutical technology have led to the development of the first drug delivery systems proposed in order to prolong or to delay the drug delivery, or to enhance drug release for drugs showing bioavailability shortcomings. The wide range of polymers available for pharmaceutical use, their low reactivity towards drugs and other formulation ingredients and their safe nature, have permitted a widespread use of polymers to improve manufacturing processes or for the formulation of pharmaceutical dosage forms for various administration routes. More over, the preparation of new polymeric materials by the synthesis of new polymers with unique properties or by the modification of available natural or synthetic polymers, offer to the formulator a wide range of applications in order to optimise the drug delivery for each specific case.

  2. Significant role of cationic polymers in drug delivery systems.

    Science.gov (United States)

    Farshbaf, Masoud; Davaran, Soodabeh; Zarebkohan, Amir; Annabi, Nasim; Akbarzadeh, Abolfazl; Salehi, Roya

    2017-11-06

    Cationic polymers are characterized as the macromolecules that possess positive charges, which can be either inherently in the polymer side chains and/or its backbone. Based on their origins, cationic polymers are divided in two category including natural and synthetic, in which the possessed positive charges are as result of primary, secondary or tertiary amine functional groups that could be protonated in particular situations. Cationic polymers have been employed commonly as drug delivery agents due to their superior encapsulation efficacy, enhanced bioavailability, low toxicity and improved release profile. In this paper, we focus on the most prominent examples of cationic polymers which have been revealed to be applicable in drug delivery systems and we also discuss their general synthesis and surface modification methods as well as their controlled release profile in drug delivery.

  3. Phenothiazine based polymers for energy and data storage application

    Energy Technology Data Exchange (ETDEWEB)

    Golriz, Seyed Ahmad Ali

    2013-03-15

    My work described in the current thesis is focused on the synthesis and characterization of polymers with phenothiazine pendant moieties. Phenothiazine and its derivatives are small redox units with reversible redox and optical properties. The crucial aspect about phenothiazine is the formation of stable radical cation in the oxidized state. Therefore, phenothiazine derivatives are useful as bistable molecules which can be switched between two stable redox states which in addition are accompanied by a change in color. Within the scope of this thesis, the synthetic approach to a new type of phenothiazine polymers by radical polymerization is described. In this context, phenothiazine derivatives were attached to aliphatic and aromatic backbones. Two synthetic routes were studied; one starting from a double bond monomer and the other from an amine containing monomer for post-functionalization with activated ester polymers. Both synthetic routes offer simple and effective approaches to obtain polymers with redox functionality. Polymers with phenothiazine redox functionality are promising candidates as cathode active materials due to their electron donating properties. In order to prove their applicability and examine their performance, phenothiazine polymers were implemented as electrode material in battery cells. The phenothiazine polymers possess decent charging capacities between 50 and 90 Ah/kg at charging rates 5 to 10 times faster than conventional lithium batteries. With respect to long-term charging and discharging, phenothiazine baring polymers are very robust for over more than 500 charge-discharge cycles. It appeared that the stability depends strongly on the formation and the stabilization of the radical cation which is formed by reversible oxidation of the phenothiazine moieties. Long alkyl spacers between the backbone and the phenothiazine moiety help to stabilize the radical cation species and increase the life time of the battery regarding the number of

  4. Recovery of human remains after shark attack.

    Science.gov (United States)

    Byard, Roger W; James, Ross A; Heath, Karen J

    2006-09-01

    Two cases of fatal shark attack are reported where the only tissues recovered were fragments of lung. Case 1: An 18-year-old male who was in the sea behind a boat was observed by friends to be taken by a great white shark (Carcharodon carcharias). The shark dragged him under the water and then, with a second shark, dismembered the body. Witnesses noted a large amount of blood and unrecognizable body parts coming to the surface. The only tissues recovered despite an intensive beach and sea search were 2 fragments of lung. Case 2: A 19-year-old male was attacked by a great white shark while diving. A witness saw the shark swim away with the victim's body in its mouth. Again, despite intensive beach and sea searches, the only tissue recovered was a single piece of lung, along with pieces of wetsuit and diving equipment. These cases indicate that the only tissue to escape being consumed or lost in fatal shark attacks, where there is a significant attack with dismemberment and disruption of the integrity of the body, may be lung. The buoyancy of aerated pulmonary tissue ensures that it rises quickly to the surface, where it may be recovered by searchers soon after the attack. Aeration of the lung would be in keeping with death from trauma rather than from drowning and may be a useful marker in unwitnessed deaths to separate ante- from postmortem injury, using only relatively small amounts of tissues. Early organ recovery enhances the identification of human tissues as the extent of morphologic alterations by putrefactive processes and sea scavengers will have been minimized. DNA testing is also possible on such recovered fragments, enabling confirmation of the identity of the victim.

  5. Controlling T-Cell Activation with Synthetic Dendritic Cells Using the Multivalency Effect

    NARCIS (Netherlands)

    Hammink, R.; Mandal, S.; Eggermont, L.J.; Nooteboom, M.; Willems, P.H.G.M.; Tel, J.; Rowan, A.E.; Figdor, C.G.; Blank, K.G.

    2017-01-01

    Artificial antigen-presenting cells (aAPCs) have recently gained a lot of attention. They efficiently activate T cells and serve as powerful replacements for dendritic cells in cancer immunotherapy. Focusing on a specific class of polymer-based aAPCs, so-called synthetic dendritic cells (sDCs), we

  6. Polymer nanocomposites: polymer and particle dynamics

    KAUST Repository

    Kim, Daniel

    2012-01-01

    Polymer nanocomposites containing nanoparticles smaller than the random coil size of their host polymer chains are known to exhibit unique properties, such as lower viscosity and glass transition temperature relative to the neat polymer melt. It has been hypothesized that these unusual properties result from fast diffusion of the nanostructures in the host polymer, which facilitates polymer chain relaxation by constraint release and other processes. In this study, the effects of addition of sterically stabilized inorganic nanoparticles to entangled cis-1,4-polyisoprene and polydimethylsiloxane on the overall rheology of nanocomposites are discussed. In addition, insights about the relaxation of the host polymer chains and transport properties of nanoparticles in entangled polymer nanocomposites are presented. The nanoparticles are found to act as effective plasticizers for their entangled linear hosts, and below a critical, chemistry and molecular-weight dependent particle volume fraction, lead to reduced viscosity, glass transition temperature, number of entanglements, and polymer relaxation time. We also find that the particle motions in the polymer host are hyperdiffusive and at the nanoparticle length scale, the polymer host acts like a simple, ideal fluid and the composites\\' viscosity rises with increasing particle concentration. © 2012 The Royal Society of Chemistry.

  7. Polymers application in proton exchange membranes for fuel cells (PEMFCs)

    Science.gov (United States)

    Walkowiak-Kulikowska, Justyna; Wolska, Joanna; Koroniak, Henryk

    2017-07-01

    This review presents the most important research on alternative polymer membranes with ionic groups attached, provides examples of materials with a well-defined chemical structure that are described in the literature. Furthermore, it elaborates on the synthetic methods used for preparing PEMs, the current status of fuel cell technology and its application. It also briefly discusses the development of the PEMFC market.

  8. A NEW RENEWABLE POLYMER FROM BIO-OIL - PHASE I

    Science.gov (United States)

    The vast majority of today’s polymers, plastics, foams, synthetic fibers, adhesives, and coatings are made from oil, which is non-renewable, non-biodegradable, depends in large part on foreign sources, is highly sensitive to regional conflicts, and has a large carbon foo...

  9. Oligomers and Polymers Based on Pentacene Building Blocks

    Science.gov (United States)

    Lehnherr, Dan; Tykwinski, Rik R.

    2010-01-01

    Functionalized pentacene derivatives continue to provide unique materials for organic semiconductor applications. Although oligomers and polymers based on pentacene building blocks remain quite rare, recent synthetic achievements have provided a number of examples with varied structural motifs. This review highlights recent work in this area and, when possible, contrasts the properties of defined-length pentacene oligomers to those of mono- and polymeric systems.

  10. Transforming Graphical System Models to Graphical Attack Models

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2016-01-01

    Manually identifying possible attacks on an organisation is a complex undertaking; many different factors must be considered, and the resulting attack scenarios can be complex and hard to maintain as the organisation changes. System models provide a systematic representation of organisations...... approach to transforming graphical system models to graphical attack models in the form of attack trees. Based on an asset in the model, our transformations result in an attack tree that represents attacks by all possible actors in the model, after which the actor in question has obtained the asset....

  11. New attacks on Wi-Fi Protected Setup

    OpenAIRE

    Hamed Mohtadi; Alireza Rahimi

    2015-01-01

    Wi-Fi Protected Setup (WPS) is a network security standard that is used to secure networks in home and office, introduced in 2006 by the Wi-Fi Alliance. It provides easier configuration setup and is used in almost all recent Wi-Fi devices. In this paper we propose two attacks on this standard. The first attack is an offline brute force attack that uses imbalance on registration protocol. This attack needs user action, but it is more efficient than previous attacks. The second attack uses weak...

  12. Ultrastructural studies of synthetic apatite crystals.

    Science.gov (United States)

    Arends, J; Jongebloed, W L

    1979-03-01

    In this paper a survey is given of some ultrastructural properties of synthetic hydroxyapatite. The preparation method by which single crystals with a length in the range of 0.1-3.0mm and a defined purity and stoïchiometry can be produced is given. Two groups of materials are considered in detail: carbonate-rich (greater than 0.1% CO3) and low-carbonate hydroxyapatites. The experiments on carbonate-rich material, being the most interesting from a biological point of view, show that acids attack at an active site in the hexagonal basal-plane of the crystals. Later on the crystals dissolve in the center of the crystal parallel to the c-axis forming tube-like structures. The active site can be protected from dissolution if the crystals are pretreated by EHDP or MFP. A comparison with lattice defect theory shows that most likely dislocations of the "hollow-core" type are responsible for the preferential dissolution.

  13. Synthetic Biology and Personalized Medicine

    Science.gov (United States)

    Jain, K.K.

    2013-01-01

    Synthetic biology, application of synthetic chemistry to biology, is a broad term that covers the engineering of biological systems with structures and functions not found in nature to process information, manipulate chemicals, produce energy, maintain cell environment and enhance human health. Synthetic biology devices contribute not only to improve our understanding of disease mechanisms, but also provide novel diagnostic tools. Methods based on synthetic biology enable the design of novel strategies for the treatment of cancer, immune diseases metabolic disorders and infectious diseases as well as the production of cheap drugs. The potential of synthetic genome, using an expanded genetic code that is designed for specific drug synthesis as well as delivery and activation of the drug in vivo by a pathological signal, was already pointed out during a lecture delivered at Kuwait University in 2005. Of two approaches to synthetic biology, top-down and bottom-up, the latter is more relevant to the development of personalized medicines as it provides more flexibility in constructing a partially synthetic cell from basic building blocks for a desired task. PMID:22907209

  14. 1994 Attack Team Workshop: Phase II - Full-Scale Offensive Fog Attack Tests

    National Research Council Canada - National Science Library

    Scheffey, Joseph

    1997-01-01

    .... This report demonstrates the benefits of using a medium angle fog stream to control the overhead fire threat when conducting a direct attack on a growing/steady state fire where the sea of the fire is obstructed...

  15. Synthetic Biology: Advancing Biological Frontiers by Building Synthetic Systems

    OpenAIRE

    Chen, Yvonne Yu-Hsuan; Galloway, Kate E; Smolke, Christina D

    2012-01-01

    Advances in synthetic biology are contributing to diverse research areas, from basic biology to biomanufacturing and disease therapy. We discuss the theoretical foundation, applications, and potential of this emerging field.

  16. A Framework for Attack-Resilient Industrial Control Systems : Attack Detection and Controller Reconfiguration

    OpenAIRE

    Paridari, Kaveh; O'Mahony, Niamh; Mady, Alie El-Din; Chabukswar, Rohan; Boubekeur, Menouer; Sandberg, Henrik

    2017-01-01

    Most existing industrial control systems (ICSs), such as building energy management systems (EMSs), were installed when potential security threats were only physical. With advances in connectivity, ICSs are now, typically, connected to communications networks and, as a result, can be accessed remotely. This extends the attack surface to include the potential for sophisticated cyber attacks, which can adversely impact ICS operation, resulting in service interruption, equipment damage, safety c...

  17. Attack Potential Evaluation in Desktop and Smartphone Fingerprint Sensors: Can They Be Attacked by Anyone?

    Directory of Open Access Journals (Sweden)

    Ines Goicoechea-Telleria

    2018-01-01

    Full Text Available The use of biometrics keeps growing. Every day, we use biometric recognition to unlock our phones or to have access to places such as the gym or the office, so we rely on the security manufacturers offer when protecting our privileges and private life. It is well known that it is possible to hack into a fingerprint sensor using fake fingers made of Play-Doh and other easy-to-obtain materials but to what extent? Is this true for all users or only for specialists with a deep knowledge on biometrics? Are smartphone fingerprint sensors as reliable as desktop sensors? To answer these questions, we performed 3 separate evaluations. First, we evaluated 4 desktop fingerprint sensors of different technologies by attacking them with 7 different fake finger materials. All of them were successfully attacked by an experienced attacker. Secondly, we carried out a similar test on 5 smartphones with embedded sensors using the most successful materials, which also hacked the 5 sensors. Lastly, we gathered 15 simulated attackers with no background in biometrics to create fake fingers of several materials, and they had one week to attack the fingerprint sensors of the same 5 smartphones, with the starting point of a short video with the techniques to create them. All 5 smartphones were successfully attacked by an inexperienced attacker. This paper will provide the results achieved, as well as an analysis on the attack potential of every case. All results are given following the metrics of the standard ISO/IEC 30107-3.

  18. Defense and attack of complex and dependent systems

    International Nuclear Information System (INIS)

    Hausken, Kjell

    2010-01-01

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  19. Defense and attack of complex and dependent systems

    Energy Technology Data Exchange (ETDEWEB)

    Hausken, Kjell, E-mail: kjell.hausken@uis.n [Faculty of Social Sciences, University of Stavanger, N-4036 Stavanger (Norway)

    2010-01-15

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  20. Controlled synthesis of biodegradable lactide polymers and copolymers using novel in situ generated or single-site stereoselective polymerisation initiators

    NARCIS (Netherlands)

    Zhong, Zhiyuan; Dijkstra, Pieter J.; Feijen, Jan

    2004-01-01

    Polylactides and their copolymers are key biodegradable polymers used widely in biomedical, pharmaceutical and ecological applications. The development of synthetic pathways and catalyst/initiator systems to produce pre-designed polylactides, as well as the fundamental understanding of the