Peroxynitrite, a Stealthy Biological Oxidant

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Stealthy Ciphertext

To insure the confidentiality of data, it can be encrypted before it is transmitted. However, most data today is unencrypted. As a result, encrypted data might attract unwanted attention, simply due to the fact that it is encrypted. To avoid such attention, we propose a method of converting ciphertext into data that can pass certain automated tests for English text. Our goal is to foil automate...

متن کامل

Paradoxical fate and biological action of peroxynitrite on human platelets.

Peroxynitrite (ONOO-), which is formed from the reaction of nitric oxide (NO) and superoxide (O2-), has been suggested to be responsible for some of the cytotoxic effects of these molecules. When protonated, ONOO- gives rise to hydroxyl (OH.) and nitrogen dioxide (NO2) radicals, which are capable of inducing tissue damage. We have investigated the effects of ONOO- on human platelets in vitro in...

متن کامل

Vascular and hepatocellular peroxynitrite formation during acetaminophen toxicity: role of mitochondrial oxidant stress.

Peroxynitrite may be involved in acetaminophen-induced liver damage. However, it is unclear if peroxynitrite is generated in hepatocytes or in the vasculature. To address this question, we treated C3Heb/FeJ mice with 300 mg/kg acetaminophen and assessed nitrotyrosine protein adducts as indicator for peroxynitrite formation. Vascular nitrotyrosine staining was evident before liver injury between...

متن کامل

Towards Stealthy Malware Detection1

Malcode can be easily hidden in document files and go undetected by standard technology. We demonstrate this opportunity of stealthy malcode insertion in several experiments using a standard COTS Anti-Virus (AV) scanner. Furthermore, in the case of zero-day malicious exploit code, signature-based AV scanners would fail to detect such malcode even if the scanner knew where to look. We propose th...

متن کامل

Towards stealthy behaviors

This paper describes a behavior-based approach to stealth. The specific problem we consider is that of making stealthy traverses, i.e., transiting from one point to another while remaining hidden from an observer. Since we assume that the robot has no a priori model of the environment, our stealthy traverse behavior makes opportunistic use of terrain features to hide from the observer. This beh...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Biological Chemistry

سال: 2013

ISSN: 0021-9258

DOI: 10.1074/jbc.r113.472936