Search Results

1 - 10 of 49 items :

  • General Mathematics x
Clear All
Adipose-derived stem cells cultured in autologous serum maintain the characteristics of mesenchymal stem cells

., Bradley, N. J., Monaghan, P., Delia, D., Sutherland, D. R., Baker, M. A., Greaves, M. F. (1990). Expression of the CD34 gene in vascular endothelial cells. Blood , 75 (12), 2417-2426. Fraser, J. K., Wulur, I., Alfonso, Z., Hedrick, M. H. (2006). Fat tissue: An underappreciated source of stem cells for biotechnology. Trends Biotechnol. , 24 (4), 150-154. Fukuda, K. (2001). Development of regenerative cardiomyocytes from mesenchymal stem cells for cardiovascular tissue engineering. Artif. Organs , 25 (3), 187

Open access
Alterations of The Stem-Like Properties in The Breast Cancer Cell Line MDA-MB-231 Induced by Single Pulsed Doxorubicin Treatment

computing, Vienna. Available from: https://www.R-project.org/ (accessed 20.01.2019). Brooks, D. L. P., Schwab, L. P., Krutilina, R., Parke, D. N., Sethuraman, A., Hoogewijs, D., Schörg, A., Gotwald, L., Fan, M., Wenger, R. H., Seagroves, T. N. (2016). ITGA6 is directly regulated by hypoxia- inducible factors and enriches for cancer stem cell activity and invasion in metastatic breast cancer models. Mol. Cancer , 15 , 26. Cortós-Funes, H., Coronado, C. (2007). Role of anthracyclines in the era of targeted therapy. Cardiovasc. Toxicol., 7 (2), 56

Open access
Characterisation and In Vivo Safety of Canine Adipose-Derived Stem Cells

REFERENCES Abdi, R., Fiorina, P., Adra, C. N., Atkinson, M., Sayegh, M. H. (2008). Immunomodulation by mesenchymal stem cells. Diabetes, 57 , 1759–1767. Anjos-Afonso, F., Siapati, E. K., Bonnet, D. (2004). In vivo contribution of murine mesenchymal stem cells into multiple cell-types under minimal damage conditions. J. Cell Sci., 117 , 5655–5664. Anonymous (2007). No. 1394/2007 of the European Parliament and of the Council of 13 November 2007 on advanced therapy medicinal products and amending directive 2001/83/EC and regulation (EC) no

Open access
Effect of HHV-6 and HHV-7 Infection on the Posttransplant Process and the Development of Complications in Patients after Autologous Stem Cell Transplantation / HHV-6 Un HHV-7 Infekcijas Ietekme Uz Pēctransplantācijas Klīnisko Gaitu Un Komplikāciju Attīstību Pacientiem Pēc Autologas Cilmes Šūnu Transplantācijas

-lymphotropic virus and is related to, but significantly different from human herpesvirus 6 and human cytomegalovirus. Proc. Natl. Acad. Sci. USA, 89, 10552-10556. Boutolleau, D., Fernandez, C., Andre, E., Imbert-Marcille, B. M., Milpied, N., Agut, H., Gautheret-Dejean, A. (2003). Human herpesvirus (HHV)-6 and HHV-7: Two closely viruses with different infection profiles in stem cell transplantation recipients. J. Infect. Dis., 187, 179-186. Carrigan, D. R., Drobyski, W. R., Russler, S. K., Tapper, M. A., Knox, K. K., Ash, R. C. (1991). Intersticial

Open access
Functional equations stemming from probability theory

Abstract

Special cases of the functional equation

are investigated for almost all (x, y) ∈ℝ 2 +, for the given functions c, d and the unknown functions h1, h2, fX and fY.

Open access
New Modalities in Knee Osteoarthritis Treatment Using Autologous Bone Marrow-Derived Mononuclear Cells

REFERENCES Caplan, A. I. (1991). Mesenchymal stem cells. J. Orthop. Res ., 9 (5), 641–650. Caplan, A. I. (2008). All MSCs are pericytes? Cell Stem Cell , 3 (3), 229–230. Caplan, A. I., Dennis, J. E. (2006). Mesenchymal stem cells as trophic mediators. J. Cell. Biochem ., 98 (5), 1076–1084. Centeno, C., Pitts, J., Al-Sayegh, H., Freeman, M., Centeno, C., Pitts, J., Al-Sayegh, H., Freeman, M. (2014). Efficacy of autologous bone marrow concentrate for knee osteoarthritis with and without adipose graft. BioMed Res. Int ., DOI:10

Open access
New Year Mathematical Card or V Points Mathematical Constant

Catanary”, IT in Schools , 4, 58_62, 2017. http://twt.mpei.ac.ru/ochkov/Chain.pdf [5] Ochkov V. F, Bogomolova E. P., Ivanov D. A. Physical and Mathematical Informatic with Mathcad and Internet , Moscow, Lan Publishing House, 556 pp, 2018. http://twt.mpei.ac.ru/ochkov/T-2018/PhysMathStudies.pdf English version (2 5 Problems for STEM Education ): https://www.crcpress.com/25-Problems-for-STEM-Education/Ochkov/p/book/9780367345259 [6] Monte Carlo Method: https://en.wikipedia.org/wiki/Monte_Carlo_method [7] mathcad forums. https

Open access
Stability of a generalization of the Fréchet functional equation

Abstract

We prove some stability and hyperstability results for a generalization of the well known Fréchet functional equation, stemming from one of the characterizations of the inner product spaces. As the main tool we use a fixed point theorem for some function spaces. We end the paper with some new inequalities characterizing the inner product spaces.

Open access
Some functional equations characterizing polynomials

Abstract

We present a method of solving functional equations of the type

where f, F: P → P are unknown functions acting on an integral domain P and parameteres are given. We prove that under some assumptions on the parameters involved, all solutions to such kind of equations are polynomials. We use this method to solve some concrete equations of this type. For example, the equation
(1) for f, F: ℝ → ℝ is solved without any regularity assumptions. It is worth noting that (1) stems from a well-known quadrature rule used in numerical analysis.

Open access
A Micro-Controller Implementation of a Fialka M-125 Based Stream Cipher

Abstract

In 2013, a new stream cipher was proposed in Antal, E.-Hromada, V.: A new stream cipher based on Fialka M-125, Tatra Mt. Math. Publ. 57 (2013), 101-118. Its design was inspired and motivated by a Soviet encryption machine Fialka M-125. The authors proposed three versions of the cipher with different inner state bit-lengths. They provided the design, software implementation on a personal computer and a preliminary statistical and performance analysis of the cipher.

In this article we extend their work by implementing all three versions of the cipher on two different micro-controllers: EBV SoCrates evaluation board [Official SoCrates webpage (EBV SoCrates evaluation board), www.rockerboards.org] and STM32F407VG [Official STM webpage (STM32F407VG), www.st.com]. We evaluate the performance of all implementations on both platforms. We also investigate the possibilities of performing a simple power analysis of the implementation of the 8-bit version of the cipher implemented on STM32F407VG micro-controller. It stems from our experiments that we are able to determine a part of the secret key of the cipher by observing the power trace (power consumption) of the encryption/decryption process

Open access