NeuroregenerationNeuroregeneration involves the regrowth or repair of nervous tissues, cells or cell products. Neuroregenerative mechanisms may include generation of new neurons, glia, axons, myelin, or synapses. Neuroregeneration differs between the peripheral nervous system (PNS) and the central nervous system (CNS) by the functional mechanisms involved, especially in the extent and speed of repair. When an axon is damaged, the distal segment undergoes Wallerian degeneration, losing its myelin sheath.
Vesicular monoamine transporter 2The solute carrier family 18 member 2 (SLC18A2) also known as vesicular monoamine transporter 2 (VMAT2) is a protein that in humans is encoded by the SLC18A2 gene. SLC18A2 is an integral membrane protein that transports monoamines—particularly neurotransmitters such as dopamine, norepinephrine, serotonin, and histamine—from cellular cytosol into synaptic vesicles. In nigrostriatal pathway and mesolimbic pathway dopamine-releasing neurons, SLC18A2 function is also necessary for the vesicular release of the neurotransmitter GABA.
Basal gangliaThe basal ganglia (BG), or basal nuclei, are a group of subcortical nuclei, of varied origin, in the brains of vertebrates. In humans, and some primates, there are some differences, mainly in the division of the globus pallidus into an external and internal region, and in the division of the striatum. The basal ganglia are situated at the base of the forebrain and top of the midbrain. Basal ganglia are strongly interconnected with the cerebral cortex, thalamus, and brainstem, as well as several other brain areas.
Key sizeIn cryptography, key size, key length, or key space refer to the number of bits in a key used by a cryptographic algorithm (such as a cipher). Key length defines the upper-bound on an algorithm's security (i.e. a logarithmic measure of the fastest known attack against an algorithm), because the security of all algorithms can be violated by brute-force attacks. Ideally, the lower-bound on an algorithm's security is by design equal to the key length (that is, the algorithm's design does not detract from the degree of security inherent in the key length).
Sensory neuronSensory neurons, also known as afferent neurons, are neurons in the nervous system, that convert a specific type of stimulus, via their receptors, into action potentials or graded receptor potentials. This process is called sensory transduction. The cell bodies of the sensory neurons are located in the dorsal ganglia of the spinal cord. The sensory information travels on the afferent nerve fibers in a sensory nerve, to the brain via the spinal cord.
Public-key cryptographyPublic-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a public key and a corresponding private key. Key pairs are generated with cryptographic algorithms based on mathematical problems termed one-way functions. Security of public-key cryptography depends on keeping the private key secret; the public key can be openly distributed without compromising security.
Key managementKey management refers to management of cryptographic keys in a cryptosystem. This includes dealing with the generation, exchange, storage, use, crypto-shredding (destruction) and replacement of keys. It includes cryptographic protocol design, key servers, user procedures, and other relevant protocols. Key management concerns keys at the user level, either between users or systems. This is in contrast to key scheduling, which typically refers to the internal handling of keys within the operation of a cipher.