Models of cell migration Sample Clauses

Models of cell migration. The extracellular environment is a crucial influencing factor leading to differential results depending on whether cell migration is considered in 2D and 3D in vitro studies, or intravital in vivo studies thus making the study of cell migration challenging and complex (Xxxxx and Xxxxxxxxx, 2015). Nonetheless, studies in 2D cell migration have provided much of our understanding regarding cell motility while the main mechanisms have also been confirmed in 3D; for example forward cell extension is defined by the same molecular and structural characteristics both in 2D and 3D (Xxxxxx and Xxxxxx, 2012). Cells migrate either individually or collectively (figure 1.2); individual cell migration has been studied extensively but interestingly the significance of collective cell migration has been highlighted at the invasive front of breast tumours in organoid systems where invading leader cells were reported to express E-cadherin and other basal epithelial markers (Xxxxxx et al., 2013). Additionally, intravital imaging of MDA-MB-231 and low passage primary breast cancer cells revealed that these cells migrated as multi-cellular streams and that this particular mode of invasion was associated with increased intravasation and circulating tumour cells in the blood vessels of a mouse model (Xxxxxxxxx et al., 2013). Multi- cellular streaming is an intermediate mode of migration which involves cells migrating in a single line while forming short-lived cell junctions (figure 1.2), (Xxxxxx et al., 2012). Cell migration is also classified according to the shape of migrating cells as well as their engagement with the extracellular matrix (Xxxxxx and Xxxx, 2010). Mesenchymal migration is adopted by cells extending a pseudopod that gradually lead to lamellipodia dynamics and an elongated morphology (figure 1.2). The protrusion then engages with the extracellular matrix forming strong focal adhesions that create high traction forces pulling on the surrounding matrix (Xxxxxx, 2004). Large focal adhesions have a slower turnover rate and are thus associated with slower cell speed (Xxxxxx, 2004). Localised pericellular proteolysis mediated by MT1-MMP behind the leading protrusion realigns the extracellular matrix and reduces cell stress during forward moving as it creates paths of least resistance (Xxxxxx and Xxxx, 2009). Focalised matrix degradation together with cell body contraction mediates the forward pulling of the cell body and finally cell tail retraction ultimately achievin...
AutoNDA by SimpleDocs

Related to Models of cell migration

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

  • System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • Selection of Subcontractors, Procurement of Materials and Leasing of Equipment The contractor shall not discriminate on the grounds of race, color, religion, sex, national origin, age or disability in the selection and retention of subcontractors, including procurement of materials and leases of equipment. The contractor shall take all necessary and reasonable steps to ensure nondiscrimination in the administration of this contract.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • Required Coverages For Generation Resources Of 20 Megawatts Or Less Each Constructing Entity shall maintain the types of insurance as described in section 11.1 paragraphs (a) through (e) above in an amount sufficient to insure against all reasonably foreseeable direct liabilities given the size and nature of the generating equipment being interconnected, the interconnection itself, and the characteristics of the system to which the interconnection is made. Additional insurance may be required by the Interconnection Customer, as a function of owning and operating a Generating Facility. All insurance shall be procured from insurance companies rated “A-,” VII or better by AM Best and authorized to do business in a state or states in which the Interconnection Facilities are located. Failure to maintain required insurance shall be a Breach of the Interconnection Construction Service Agreement.

  • Joint Network Implementation and Grooming Process Upon request of either Party, the Parties shall jointly develop an implementation and grooming process (the “Joint Grooming Process” or “Joint Process”) which may define and detail, inter alia:

  • Commingling of Resold Services with Unbundled Network Elements and Combinations of Unbundled Network Elements 6.7.1 To the extent it is Technically Feasible and pursuant to the terms of Section 9.1, CLEC may Commingle Telecommunications Services purchased on a resale basis with an Unbundled Network Element or combination of Unbundled Network Elements.

  • Switching System Hierarchy and Trunking Requirements For purposes of routing ECI traffic to Verizon, the subtending arrangements between Verizon Tandem Switches and Verizon End Office Switches shall be the same as the Tandem/End Office subtending arrangements Verizon maintains for the routing of its own or other carriers’ traffic (i.e., traffic will be routed to the appropriate Verizon Tandem subtended by the terminating End Office serving the Verizon Customer). For purposes of routing Verizon traffic to ECI, the subtending arrangements between ECI Tandem Switches and ECI End Office Switches shall be the same as the Tandem/End Office subtending arrangements that ECI maintains for the routing of its own or other carriers’ traffic.

  • Evaluation Software If the Software is an evaluation version or is provided to You for evaluation purposes, then, unless otherwise approved in writing by an authorized representative of Licensor, Your license to use the Software is limited solely for internal evaluation purposes in non-production use and in accordance with the terms of the evaluation offering under which You received the Software, and expires 90 days from installation (or such other period as may be indicated within the Software). Upon expiration of the evaluation period, You must discontinue use of the Software, return to an original state any actions performed by the Software, and delete the Software entirely from Your system and You may not download the Software again unless approved in writing by an authorized representative of Licensor. The Software may contain an automatic disabling mechanism that prevents its use after a certain period of time. RESTRICTIONS

Time is Money Join Law Insider Premium to draft better contracts faster.