Search results

Filter

Filetype

Your search for "*" yielded 534452 hits

Mechanisms of P fimbriae cell activation

Popular Abstract in Swedish De allra flesta mikrobiella infektioner börjar på slemhinnan och en gemensam nämnare för patogena mikroberna är deras förmåga att stimulera ett immunsvar på just den plats som de infekterat. De patogena bakteriernas kommer först i kontakt med epitelcellerna, som bildar kroppens barriär mot omgivningen. Interaktionen mellan patogener och dessa celler leder till ett inflaMicrobial attachment to host cells plays a central role in the induction of inflammatory responses and the production of the disease. Uropathogenic Gram negative bacteria carry surface lectins that specifically recognize oligosaccharide receptor epitopes expressed on glycolipids or glycoproteins. The resulting attachment may facilitate the action of other virulence factors, but may also activate t

Older People and the Adoption of Innovations: A study of the expectations on the use of social assistive robots and telehealthcare systems

Aims and objectives: The research presented investigates older people’s expectations of social assistive robots and telehealthcare systems. Methods: The empirical studies presented are based on fieldwork carried out before social assistive robots and a telehealthcare system were introduced into the domestic environment of older people. The research draws upon participatory design to explore older

Dynamic Multipath Estimation by Sequential Monte Carlo Methods

: A sequential Bayesian estimation algorithm for multipath mitigation is presented, with an underlying movement model that is especially designed for dynamic channel scenarios. In order to facilitate efficient integration into receiver tracking loops it builds upon complexity reduction concepts that previously have been applied within Maximum Likelihood (ML) estimators. To demonstrate its capabili

A note on fast algebraic attacks and higher order nonlinearities

In this note, we deduce a bound between fast algebraic immunity and higher order nonlinearity (it is the first time that a bound between these two cryptographic criteria is given), and find that a Boolean function should have high r-order nonlinearity to resist fast algebraic attacks. As a corollary, we find that no matter how much effort we make, the Tu-Deng functions cannot be repaired in a stan