• Title/Summary/Keyword: Envelope design

Search Result 305, Processing Time 0.02 seconds

Neuronal injury in AIDS dementia: Potential treatment with NMDA open-channel blockers and nitric oxide-related species

  • Lipton, Stuart A.
    • Proceedings of the Korean Society of Applied Pharmacology
    • /
    • 1996.04a
    • /
    • pp.19-29
    • /
    • 1996
  • The neurological manifestations of AIDS include dementia, encountered even in the absence of opportunistic superinfection or malignancy. The AIDS Dementia Complex appears to be associated with several neuropathological abnormalities, including astrogliosis and neuronal injury or loss. How can HIV-1 result in neuronal damage if neurons themselves are only rarely, if ever, infected by the vitus\ulcorner In vitro experiments from several different laboratiories have lent support to the existence of HIV- and immune-related toxins. In one recently defined pathway to neuronal injury, HIV-infected macrophages/microglia as well as macrophages activated by HIV-1 envelope protein gp120 appear to secrete excitants/neurotoxins. These substances may include arachidonic acid, platelet-activating factor, free radicals (NO - and O$_2$), glutamate, quinolinate, cysteine, cytokines (TNF-${\alpha}$, IL1-B, IL-6), and as yet unidentified factors emanating from stimulated macrophages and possibly reactive astrocytes. A final common pathway for newonal suscepubility appears to be operative, similar to that observed in stroke, trauma, epilepsy, and several neurodegenerative diseases, including Huntington's disease, Parkinson's disease, and amyotrophic lateral sclerosis. This mechanism involves excessive activation of N-methyl-D-aspartate (NMDA) receptor-operated channels, with resultant excessive influx of Ca$\^$2+/ leading to neuronal damage, and thus offers hope for future pharmacological intervention. This chapter reviews two clinically-tolerated NMDA antagonists, memantine and nitroglycerin; (ⅰ) Memantine is an open-channel blocker of the NMDA-associated ion channel and a close congener of the anti-viral and anti-parkinsonian drug amantadine. Memantine blocks the effects of escalating levels of excitotoxins to a greater degree than lower (piysiological) levels of these excitatory amino acids, thus sparing to some extent normal neuronal function. (ⅱ) Niuoglycerin acts at a redox modulatory site of the NMDA receptor/complex to downregulate its activity. The neuroprotective action of nitroglycerin at this site is mediated by n chemical species related to nitric oxide, but in a higher oxidation state, resulting in transfer of an NO group to a critical cysteine on the NMDA receptor. Because of the clinical safety of these drugs, they have the potential for trials in humans. As the structural basis for redox modulation is further elucidated, it may become possible to design even better redox reactive reagents of chinical value. To this end, redox modulatory sites of NMDA receptors have begun to be characterized at a molecular level using site-directed mutagenesis of recombinant subunits (NMDAR1, NMDAR2A-D). Two types of redox modulation can be distinguished. The first type gives rise to a persistent change in the functional activity of the receptor, and we have identified two cysteine residues on the NMDARI subunit (#744 and #798) that are responsible for this action. A second site, presumably also a cysteine(s) because <1 mM N-ethylmaleimide can block its effect in native neurons, underlies the other, more transient redox action. It appears to be at this, as yet unidentified, site on the NMDA receptor that the NO group acts, at least in recombinant receptors.

  • PDF

A Design of Transceiver for 13.56MHz RFID Reader using the Peak Detector with Automatic Reference Voltage Generator (자동 기준전압 생성 피크 검출기를 이용한 13.56 MHz RFID 리더기용 송수신기 설계)

  • Kim, Ju-Seong;Min, Kyung-Jik;Nam, Chul;Hurh, Djyoung;Lee, Kang-Yun
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.47 no.3
    • /
    • pp.28-34
    • /
    • 2010
  • In this paper, the transceiver for RFID reader using 13.56MHz as a carrier frequency and meeting International Standard ISO 14443 type A, 14443 type B and 15693 is presented. The receiver is composed of envelope detector, VGA(Variable Gain Amplifier), filter, comparator to recovery the received signal. The proposed automatic reference voltage generator, positive peak detector, negative peak detector, and data slicer circuit can adjust the decision level of reference voltage over the received signal amplitudes. The transmitter is designed to drive high voltage and current to meet the 15693 specification. By using inductor loading circuit which can swing more than power supply and drive large current even under low impedance condition, it can control modulation rate from 30 percent to 5 percent, 100 perccnt and drive the output currents from 5 mA to 240 mA depending on standards. The 13.56 MHZ RFID reader is implemented in $0.18\;{\mu}m$ CM08 technology at 3.3V single supply. The chip area excluding pads is $1.5mm\;{\times}\;1.5mm$.

Massive Surveillance by US-UK intelligence services : Crisis of the Internet and the Rule of Law (미국/영국 정보기관의 무차별 정보수집행위: 인터넷과 법치주의의 위기)

  • Kim, Keechang
    • Review of Korean Society for Internet Information
    • /
    • v.14 no.3
    • /
    • pp.78-85
    • /
    • 2013
  • The revelations made possible by Edward Snowden, a contractor of the US intelligence service NSA, are a sobering reminder that the Internet is not an 'anonymous' means of communication. In fact, the Internet has never been conceived with anonymity in mind. If anything, the Internet and networking technologies provide far more detailed and traceable information about where, when, with whom we communicate. The content of the communication can also be made available to third parties who obtain encryption keys or have the means of exploiting vulnerabilities (either by design or by oversight) of encryption software. Irrebuttable evidence has emerged that the US and the UK intelligence services have had an indiscriminate access to the meta-data of communications and, in some cases, the content of the communications in the name of security and protection of the public. The conventional means of judicial scrutiny of such an access turned out to be ineffectual. The most alarming attitude of the public and some politicians is "If you have nothing to hide, you need not be concerned." Where individuals have nothing to hide, intelligence services have no business in the first place to have a peek. If the public espouses the groundless assumption that State organs are benevolent "( they will have a look only to find out whether there are probable grounds to form a reasonable suspicion"), then the achievements of several hundred years of struggle to have the constitutional guarantees against invasion into privacy and liberty will quickly evaporate. This is an opportune moment to review some of the basic points about the protection of privacy and freedom of individuals. First, if one should hold a view that security can override liberty, one is most likely to lose both liberty and security. Civilized societies have developed the rule of law as the least damaging and most practicable arrangement to strike a balance between security and liberty. Whether we wish to give up the rule of law in the name of security requires a thorough scrutiny and an informed decision of the body politic. It is not a decision which can secretly be made in a closed chamber. Second, protection of privacy has always depended on human being's compliance with the rules rather than technical guarantees or robustness of technical means. It is easy to tear apart an envelope and have a look inside. It was, and still is, the normative prohibition (and our compliance) which provided us with protection of privacy. The same applies to electronic communications. With sufficient resources, surreptitiously undermining technical means of protecting privacy (such as encryption) is certainly 'possible'. But that does not mean that it is permissible. Third, although the Internet is clearly not an 'anonymous' means of communication, many users have a 'false sense of anonymity' which make them more vulnerable to prying eyes. More effort should be made to educate the general public about the technical nature of the Internet and encourage them to adopt user behaviour which is mindful of the possibilities of unwanted surveillance. Fourth, the US and the UK intelligence services have demonstrated that an international cooperation is possible and worked well in running the mechanism of massive surveillance and infiltration into data which travels globally. If that is possible, it should equally be possible to put in place a global mechanism of judicial scrutiny over a global attempt at surveillance.

  • PDF

Design of Hybrid Supply Modulator for Reconfigurable Power Amplifiers (재구성 전력증폭기용 혼합형 가변 전압 공급기의 설계)

  • Son, Hyuk-Su;Kim, Woo-Young;Jang, Joo-Young;Lee, Hae-Jin;Oh, Inn-Yeal;Park, Chul-Soon
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.23 no.4
    • /
    • pp.475-483
    • /
    • 2012
  • This paper presents new type of the hybrid supply modulator for the next reconfigurable transmitters. The efficiency of the hybrid supply modulator is one of the most important performance. For enhancement the efficiency, multi-switching structure in the hybrid supply modulator is employed. Additionally, input envelope signal sensing stage is employed for implementation multi-mode operation. To compare the performance of the proposed hybrid supply modulator, the conventional hybrid supply modulator is also designed. The measured efficiency of the proposed hybrid supply modulator is 85 %/84 %/79 % for EDGE/WCDMA/LTE signals which have 384 kHz/3.84 MHz/5 MHz bandwidth, respectively. The efficiency of the proposed hybrid supply modulator is higher than the conventional hybrid supply modulator. Therefore, this structure shows good candidate for the reconfigurable transmitters.

A Reliability Analysis of Shallow Foundations using a Single-Mode Performance Function (단일형 거동함수에 의한 얕은 기초의 신뢰도 해석 -임해퇴적층의 토성자료를 중심으로-)

  • 김용필;임병조
    • Geotechnical Engineering
    • /
    • v.2 no.1
    • /
    • pp.27-44
    • /
    • 1986
  • The measured soil data are analyzed to the descriptive statistics and classified into the four models of uncorrelated-normal (UNNO), uncorrelated-nonnormal (VNNN), correlatedonnormal(CONN), and correlated-nonnormal(CONN) . This paper presents the comparisons of reliability index and check points using the advanced first-order second-moment method with respect to the four models as well as BASIC Program. A sin91e-mode Performance function is consisted of the basic design variables of bearing capacity and settlements on shallow foundations and input the above analyzed soil informations. The main conclusions obtained in this study are summarized as follows: 1. In the bearing capacity mode, cohesion and bearing-capacity factors by C-U test are accepted for normal and lognormal distribution, respectively, and negatively low correlated to each other. Since the reliability index of the CONN model is the lowest one of the four model, which could be recommended a reliability.based design, whereas the other model might overestimate the geotechnical conditions. 2. In the case of settlements mode, the virgin compression ratio and preccnsolidation pressure are fitted for normal and lognormal distribution, respectively. Constraining settlements to the lower ones computed by deterministic method, The CONN model is the lowest reliability of the four models.

  • PDF