• Title/Summary/Keyword: ASK-1

Search Result 673, Processing Time 0.032 seconds

Pathophysiological Roles of ASK1-MAP Kinase Signaling Pathways

  • Nagai, Hiroaki;Noguchi, Takuya;Takeda, Kohsuke;Ichijo, Hidenori
    • BMB Reports
    • /
    • v.40 no.1
    • /
    • pp.1-6
    • /
    • 2007
  • Apoptosis signal-regulating kinase 1 (ASK1) is a mitogenactivated protein kinase (MAPK) kinase kinase that activates JNK and p38 kinases. ASK1 is activated by various stresses, such as reactive oxygen species (ROS), endoplasmic reticulum (ER) stress, lipopolysaccharide (LPS) and calcium influx which are thought to be responsible for the pathogenesis or exacerbations of various human diseases. Recent studies revealed the involvement of ASK1 in ROS- or ER stressrelated diseases, suggesting that ASK1 may be a potential therapeutic target of various human diseases. In this review, we focus on the current findings for the relationship between pathogenesis and ASK1-MAPK pathways.

Molecular Mechanism of Reactive Oxygen Species-dependent ASK1 Activation in Innate Immunity

  • Yamauchi, Shota;Noguchi, Takuya;Ichijo, Hidenori
    • IMMUNE NETWORK
    • /
    • v.8 no.1
    • /
    • pp.1-6
    • /
    • 2008
  • Apoptosis signal-regulating kinase 1 (ASK1), a mitogen- activated protein kinase kinase kinase, plays pivotal roles in stress responses. In addition, ASK1 has emerged as a key regulator of immune responses elicited by pathogen-associated molecular patterns (PAMPs) and endogenous danger signals. Recent studies have demonstrated that reactive oxygen species (ROS)-dependent activation of ASK1 is required for LPS-stimulated cytokine production as well as extracellular ATP-induced apoptosis in immune cells. The mechanism of ROS-dependent regulation of ASK1 activity by thioredoxin and TRAFs has been well characterized. In this review, we focus on the molecular details of the activation of ASK1 and its involvement in innate immunity.

Evaluation of the effectiveness of tell-show-do and ask-tell-ask in the management of dental fear and anxiety: a double-blinded randomized control trial

  • Niharika Reddy Elicherla;Kanamarlapudi Venkata Saikiran;Karthik Anchala;Sainath Reddy Elicherla;Sivakumar Nuvvula
    • Journal of Dental Anesthesia and Pain Medicine
    • /
    • v.24 no.1
    • /
    • pp.57-65
    • /
    • 2024
  • Background: The objective of behavioral guidance is to establish effective communication that aligns with a child's requirements to manage disruptive behavior. This study aimed to evaluate the effectiveness of the Tell-Show-Do and Ask-Tell-Ask techniques in managing dental anxiety in children during their initial appointment. Methods: The study included 50 children (28 boys and 22 girls) without any prior experience between the ages of 7 and 11 at their first dental visit. The children were randomly categorized into two groups: Group 1, Tell Shows Do, and Group 2, Ask-Tell-Ask. Subsequently, all children underwent noninvasive treatment procedures such as restorations, sealants, and oral prophylaxis. Furthermore, behavioral management techniques were employed based on the allocated group. Finally, anxiety levels for all children were assessed using the Raghavendra, Madhuri, and Sujata Pictorial Scale (RMS-PS) and heart rate at three different intervals (before, during, and after). The obtained data were entered into Microsoft Excel, and statistical analysis was performed using SPSS software. A paired t-test and Mann-Whitney U-test were used to compare the mean and median values of the two groups and determine their effectiveness. Results: Children in the TSD group exhibited statistically significant heart rates and RMS-PS scores in intra-group comparisons. However, children in the ask-tell-ask group showed a significant reduction only in the RMS-PS scores (P < 0.001) but not in the measures used to assess heart rate (P < 0.001). Conclusion: Tell-Show-Do was more effective than ask-tell-ask in alleviating dental anxiety in children. The simultaneous application of these two strategies can synergistically alleviate dental anxiety during a child's initial dentist appointment.

Impact of Four Wave Mixing on Manchester Coded ASK Multichannel Optical Communication System (Manchester Coded ASK 다중채널 광통신 시스템의 Four Wave Mixing 에 대한 영향)

  • Lee, Ho-Joon;Leonid G. Kazovsky
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.18 no.11
    • /
    • pp.1607-1617
    • /
    • 1993
  • The performance of Manchester-coded ASK optical wavelength division multiplexing(WDM) systems is evaluated laking into account the shot noise and the four wave mixing(FWM) caused by fiber nonlinearities. The result is compared to conventional non-return-to-zero(NRZ) systems for ASK modulation formats. Further, the dynamic range, defined as the ratio of the maximum input power(limited by the FWM), to the minimum input power(limited by receiver sensitivity), is evaluated. For 1.55 rm 16 channel WDM systems, the dynamic range of ASK Manchester coded systems shows a 2.0 dB improvement with respect to the NRZ. This result holds true for both dispersion-shifted fiber and conventional fiber it has been obtained for 10 GHz channel spacing, 1 Gbps/channel bit rate.

  • PDF

The ASK_a Service Model for Public Library in Korea (우리나라 공공도서관의 ASK_a 서비스 모형 개발)

  • Nam, Young-Joon;Lee, Hyang-Sook
    • Journal of Information Management
    • /
    • v.37 no.1
    • /
    • pp.57-81
    • /
    • 2006
  • The new service of Korean public library, ASK_a service model suggests a new management practice in collaborative digital reference services. The model has three functions: input transaction, process transaction, and output transaction. The best form for input is the web form. The best form for process is a model with a hybrid type of public libraries(hierarchical and lateral type). The output suggests the archiving policy for gathering the query-answer data. The core of this model is providing an advanced information service to its users through cooperation with public libraries and external manpower.

Design And Implementation Of ASK Modulator MMIC Operating At 5.8 GHz (5-8 GHz 대역 ASK 변조기 MMIC 설계 및 제작)

  • Jang, Mi-Sook;Ha, Young-Chul;Hur, Hyuk;Moon, Tae-Jung;Hwang, Sung-Beam;Song, Chung-Kun;Hong, Chang-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.26 no.11B
    • /
    • pp.1595-1599
    • /
    • 2001
  • In this paper, we have desired and implemented of ASK modulator MMIC operating at 5.8 GHz for OBE used in AGPS(Automatic Gate Passing System). The proposed ASK modulator MMIC was implemented to apply a single supply voltage of 3 V to the drain in order to decrease ACP(Adjacent Channel Power). As a result, it is exhibits a broad linear modulation range from 0.7 V to 3 V and an On/off characteristic over 40 dB. The layouts of ASK modulator MMICs was designed and fabricated by using ETRI 0.57m MESFET library The chip size was 1.0mm $\times$x1.0mm.

  • PDF

Binary ASK way for 1Giga bit MODEM (1Giga bit MODEM을 위한 Binary ASK방식)

  • ;;;Sosuke Onodera;Yoichi Sato
    • Proceedings of the IEEK Conference
    • /
    • 2003.07a
    • /
    • pp.194-197
    • /
    • 2003
  • We proposed Binary ASK system for 1Giga bit Modem. The Binary ASK system has a high speed shutter transmitter and no IF receiver only by symbol synchronization. The advantage of proposed system is that circuitry is very simple without IF process. The disadvantage of proposed system are that line spectrum occurs unordinary interference to other channels, and enhancement to 4-level system is impossible due to its large SNR degradation.

  • PDF

Analyzing and Fixing the Vulnerabilities of ASK Protocol (ASK 모바일 프로토콜 취약점 분석 및 수정)

  • Ryu Gab Sang;Kim Il Gon;Kim Hyun Seok;Lee Ji Yeon;Kang In Hye;Choi Jin Young
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.1
    • /
    • pp.1-8
    • /
    • 2006
  • Security protocols have usually been developed using informal design and verification techniques. However, many security protocols thought to be secure was found to be vulnerable later. Thus, the importance of formal specification and verification for analyzing the safely of protocols is increasing. With the rise of mobile communication networks, various mobile security protocols have been proposed. In this paper, we identify the security weakness of the ASK mobile Protocol using formal verification technique. In addition, we propose a new ASK protocol modifying its vulnerability and verify its robustness.

The Development of ASK Modulator for using Automatic Gate Passing System (자동게이트통관시스템에 사용하기 위한 ASK 변조기 MMIC 구현)

  • Jang, Mi-Sook;Ha, Young-Chul;Hwang, Sung-Beam;Moon, Tae-Jung;Hur, Hyuk;Song, Jeong-Geun;Hong, Chang-Hee
    • Proceedings of the IEEK Conference
    • /
    • 2001.06b
    • /
    • pp.233-236
    • /
    • 2001
  • We have designed and fabricated ASK modulator MMIC operating at 5.8GHz for OBE used in AGPS (Automatic Gate Passing System). ASK modulator MMIC was designed to apply a sing1e supply voltage of 3V to the drain in order to decrease ACP (Adjacent Channel Power). The measurement result of this chip exhibits on/off characteristic over 30dB. The design parameters are optimized through ADS simulation tool. The layouts and fabrication o( ASK Modulator MMIC were designed and fabricated by using ETRI 0.5${\mu}{\textrm}{m}$ MESFET library. The chip sizes were 1mm $\times$1mm. The performance analysis of the implemented ASK Modulator based on the design parameters is accomplished.

  • PDF

A study of performance improvement of ASK system (ASK 시스템의 성능개선에 관한 연구)

  • Chung, Sung-Boo;Kim, Joo-Woong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.1
    • /
    • pp.26-32
    • /
    • 2012
  • In this study, we proposed an intelligent algorithm for the performance improvement of ASK system for giga-bit modem in millimeter band. The proposed intelligent algorithm is a fuzzy logic system. The inputs to the fuzzy logic system are the remainder and integral of remainder that occurred counter of receiver, and the output is bandwidth of LPF. In order to verify the effectiveness of the proposed method, simulation is performed to the proposed system and the fixed bandwidth system, and is confirmed to the BER performance.