Learn More
Translation of mRNA plays a critical role in consolidation of long-term memory. Here, we report that markers of initiation of mRNA translation are activated during training for contextual memory and that they undergo diurnal oscillation in the mouse hippocampus with maximal activity observed during the daytime (zeitgeber time 4-8 h). Phosphorylation and(More)
Tyrosine hydroxylase (TH), the rate-limiting enzyme in catecholamine synthesis, is stimulated by N-terminal phosphorylation by several kinases and inhibited by protein serine/threonine phosphatase 2A (PP2A). PP2A is a family of heterotrimeric holoenzymes containing one of more than a dozen different regulatory subunits. In comparison with rat forebrain(More)
Perturbing the circadian system by electrolytically lesioning the suprachiasmatic nucleus (SCN) or varying the environmental light:dark schedule impairs memory, suggesting that memory depends on the circadian system. We used a genetic approach to evaluate the role of the molecular clock in memory. Bmal1-/- mice, which are arrhythmic under constant(More)
The type 1 adenylyl cyclase (AC1) is an activity-dependent, calcium-stimulated adenylyl cyclase expressed in the nervous system that is implicated in memory formation. We examined the locomotor activity, and impulsive and social behaviors of AC1+ mice, a transgenic mouse strain overexpressing AC1 in the forebrain. Here we report that AC1+ mice exhibit(More)
Wound healing is a complex sequence of cellular and molecular processes that involves multiple cell types and biochemical mediators. Several growth factors have been identified that regulate tissue repair, including the neurotrophin nerve growth factor (NGF). As non-adenine based purines (NABPs) are known to promote cell proliferation and the release of(More)
Security is one of the major issues in Mobile Ad-hoc Network (MANET) because of its inherent liabilities. Its infrastructure-less network with dynamic topology pose a number of challenges to security design and makes it vulnerable for different types of security attacks. In wormhole attack a pair of colluding nodes makes a tunnel using a high speed network.(More)
  • 1