Hematopoietic stem cellHematopoietic stem cells (HSCs) are the stem cells that give rise to other blood cells. This process is called haematopoiesis. In vertebrates, the very first definitive HSCs arise from the ventral endothelial wall of the embryonic aorta within the (midgestational) aorta-gonad-mesonephros region, through a process known as endothelial-to-hematopoietic transition. In adults, haematopoiesis occurs in the red bone marrow, in the core of most bones. The red bone marrow is derived from the layer of the embryo called the mesoderm.
Mitochondrial theory of ageingThe mitochondrial theory of ageing has two varieties: free radical and non-free radical. The first is one of the variants of the free radical theory of ageing. It was formulated by J. Miquel and colleagues in 1980 and was developed in the works of Linnane and coworkers (1989). The second was proposed by A. N. Lobachev in 1978. The mitochondrial free radical theory of ageing (MFRTA) proposes that free radicals produced by mitochondrial activity damage cellular components, leading to ageing.
XFree86XFree86 is an implementation of the X Window System. It was originally written for Unix-like operating systems on IBM PC compatibles and was available for many other operating systems and platforms. It is free and open source software under the XFree86 License version 1.1. It was developed by the XFree86 Project, Inc. The lead developer was David Dawes. The last released version was 4.8.0, released December 2008. The last XFree86 CVS commit was made on May 18, 2009; the project was confirmed dormant in December 2011.
Radical substitutionIn organic chemistry, a radical-substitution reaction is a substitution reaction involving free radicals as a reactive intermediate. The reaction always involves at least two steps, and possibly a third. In the first step called initiation (2,3), a free radical is created by homolysis. Homolysis can be brought about by heat or ultraviolet light, but also by radical initiators such as organic peroxides or azo compounds. UV Light is used to create two free radicals from one diatomic species.
Key sizeIn cryptography, key size, key length, or key space refer to the number of bits in a key used by a cryptographic algorithm (such as a cipher). Key length defines the upper-bound on an algorithm's security (i.e. a logarithmic measure of the fastest known attack against an algorithm), because the security of all algorithms can be violated by brute-force attacks. Ideally, the lower-bound on an algorithm's security is by design equal to the key length (that is, the algorithm's design does not detract from the degree of security inherent in the key length).
Free-radical halogenationIn organic chemistry, free-radical halogenation is a type of halogenation. This chemical reaction is typical of alkanes and alkyl-substituted aromatics under application of UV light. The reaction is used for the industrial synthesis of chloroform (CHCl3), dichloromethane (CH2Cl2), and hexachlorobutadiene. It proceeds by a free-radical chain mechanism. The chain mechanism is as follows, using the chlorination of methane as a usual example: 1. Initiation: Splitting or homolysis of a chlorine molecule to form two chlorine atoms, initiated by ultraviolet radiation .
Public-key cryptographyPublic-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a public key and a corresponding private key. Key pairs are generated with cryptographic algorithms based on mathematical problems termed one-way functions. Security of public-key cryptography depends on keeping the private key secret; the public key can be openly distributed without compromising security.
Key managementKey management refers to management of cryptographic keys in a cryptosystem. This includes dealing with the generation, exchange, storage, use, crypto-shredding (destruction) and replacement of keys. It includes cryptographic protocol design, key servers, user procedures, and other relevant protocols. Key management concerns keys at the user level, either between users or systems. This is in contrast to key scheduling, which typically refers to the internal handling of keys within the operation of a cipher.
Oxidative stressOxidative stress reflects an imbalance between the systemic manifestation of reactive oxygen species and a biological system's ability to readily detoxify the reactive intermediates or to repair the resulting damage. Disturbances in the normal redox state of cells can cause toxic effects through the production of peroxides and free radicals that damage all components of the cell, including proteins, lipids, and DNA. Oxidative stress from oxidative metabolism causes base damage, as well as strand breaks in DNA.
Superoxide dismutaseSuperoxide dismutase (SOD, ) is an enzyme that alternately catalyzes the dismutation (or partitioning) of the superoxide (O2-) radical into ordinary molecular oxygen (O2) and hydrogen peroxide (H2O2). Superoxide is produced as a by-product of oxygen metabolism and, if not regulated, causes many types of cell damage. Hydrogen peroxide is also damaging and is degraded by other enzymes such as catalase. Thus, SOD is an important antioxidant defense in nearly all living cells exposed to oxygen.