1,500 research outputs found

    How can we use the endocytosis pathways to design nanoparticle drug-delivery vehicles to target cancer cells over healthy cells?

    Full text link
    Targeted drug delivery in cancer typically focuses on maximising the endocytosis of drugs into the diseased cells. However, there has been less focus on exploiting the differences in the endocytosis pathways of cancer cells versus non-cancer cells. An understanding of the endocytosis pathways in both cancer and non-cancer cells allows for the design of nanoparticles to deliver drugs to cancer cells whilst restricting healthy cells from taking up anticancer drugs, thus efficiently killing the cancer cells. Herein we compare the differences in the endocytosis pathways of cancer and healthy cells. Second, we highlight the importance of the physicochemical properties of nanoparticles (size, shape, stiffness, and surface chemistry) on cellular uptake and how they can be adjusted to selectively target the dominated endocytosis pathway of cancer cells over healthy cells and to deliver anticancer drug to the target cells. The review generates new thought in the design of cancer-selective nanoparticles based on the endocytosis pathways

    Association of daily composition of physical activity and sedentary behaviour with incidence of cardiovascular disease in older adults.

    Get PDF
    BACKGROUND: Moderate-to-vigorous physical activity (MVPA) is proposed as key for cardiovascular diseases (CVD) prevention. At older ages, the role of sedentary behaviour (SB) and light intensity physical activity (LIPA) remains unclear. Evidence so far is based on studies examining movement behaviours as independent entities ignoring their co-dependency. This study examines the association between daily composition of objectively-assessed movement behaviours (MVPA, LIPA, SB) and incident CVD in older adults. METHODS: Whitehall II accelerometer sub-study participants free of CVD at baseline (N = 3319, 26.7% women, mean age = 68.9 years in 2012-2013) wore a wrist-accelerometer from which times in SB, LIPA, and MVPA during waking period were extracted over 7 days. Compositional Cox regression was used to estimate the hazard ratio (HR) for incident CVD for daily compositions of movement behaviours characterized by 10 (20 or 30) minutes greater duration in one movement behaviour accompanied by decrease in another behaviour, while keeping the third behaviour constant, compared to reference composition. Analyses were adjusted for sociodemographic, lifestyle, cardiometabolic risk factors and multimorbidity index. RESULTS: Of the 3319 participants, 299 had an incident CVD over a mean (SD) follow-up of 6.2 (1.3) years. Compared to daily movement behaviour composition with MVPA at recommended 21 min per day (150 min/week), composition with additional 10 min of MVPA and 10 min less SB was associated with smaller risk reduction - 8% (HR, 0.92; 95% CI, 0.87-0.99) - than the 14% increase in risk associated with a composition of similarly reduced time in MVPA and more time in SB (HR, 1.14; 95% CI, 1.02-1.27). For a given MVPA duration, the CVD risk did not differ as a function of LIPA and SB durations. CONCLUSIONS: Among older adults, an increase in MVPA duration at the expense of time in either SB or LIPA was found associated with lower incidence of CVD. This study lends support to public health guidelines encouraging increase in MVPA or at least maintain MVPA at current duration

    Establishing dynamic impact function for house pricing based on surrounding multi-attributes: Evidence from Taipei City

    Get PDF
    [[abstract]]The objective of the research is aimed for a solution that is to establish the dynamic impact function of surrounding multi-attribute for house pricing. It is also able to measure the ripple effect and allows the hedonic parameter estimates to vary from point-to-point. A comprehensive literature review is carried out to obtain an adequate theoretical basis for the corresponding hypothesis and concepts. The proposed dynamic impact function for multi- attributes is then constructed based on the characteristics of surrounding facilities. Adopting the convenience sampling criteria of 95% confidence level on the data sampling and 10% limit of error in a 5−95% proportion, we collect the empirical data of 39 yearly house sales in the investigated urban areas of Taipei city focusing on housing prices and then utilize them for evaluating and adjusting the function. The actual house price and that of proposed function affected by Mass Rapid Transit (MRT) stations are analysed, resulting in the correlation coefficient at 0.946 (single attribute) and 0.944 (multi-attribute), respectively. The findings support that proposed function can highly represent the house pricing pattern and be an accurate tool for appraisers.[[notice]]補正完

    Hidden attractors in fundamental problems and engineering models

    Full text link
    Recently a concept of self-excited and hidden attractors was suggested: an attractor is called a self-excited attractor if its basin of attraction overlaps with neighborhood of an equilibrium, otherwise it is called a hidden attractor. For example, hidden attractors are attractors in systems with no equilibria or with only one stable equilibrium (a special case of multistability and coexistence of attractors). While coexisting self-excited attractors can be found using the standard computational procedure, there is no standard way of predicting the existence or coexistence of hidden attractors in a system. In this plenary survey lecture the concept of self-excited and hidden attractors is discussed, and various corresponding examples of self-excited and hidden attractors are considered

    More on the Nambu-Poisson M5-brane Theory: Scaling limit, background independence and an all order solution to the Seiberg-Witten map

    Full text link
    We continue our investigation on the Nambu-Poisson description of M5-brane in a large constant C-field background (NP M5-brane theory) constructed in Refs.[1, 2]. In this paper, the low energy limit where the NP M5-brane theory is applicable is clarified. The background independence of the NP M5-brane theory is made manifest using the variables in the BLG model of multiple M2-branes. An all order solution to the Seiberg-Witten map is also constructed.Comment: expanded explanations, minor corrections and typos correcte

    BBB Secure Nonce Based MAC Using Public Permutations

    Get PDF
    In the recent trend of CAESAR competition and NIST light-weight competition, cryptographic community have witnessed the submissions of several cryptographic schemes that are build on public random permutations. Recently, in CRYPTO 2019, Chen et al. have initiated an interesting research direction in designing beyond birthday bound PRFs from public random permutations and they proposed two instances of such PRFs. In this work, we extend this research direction by proposing a nonce-based MAC build from public random permutations. We show that our proposed MAC achieves 2n/32n/3 bit security (with respect to the state size of the permutation) and the bound is essentially tight. Moreover, the security of the MAC degrades gracefully with the repetition of the nonce

    Isolated thumb carpometacarpal joint dislocation: a case report and review of the literature

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Isolated thumb carpometacarpal dislocation is a rare injury pattern and the optimal treatment option is still controversial.</p> <p>Case Description</p> <p>We present a 27-year-old basketball player who underwent an isolated dorsal dislocation of the thumb carpometacarpal joint after a fall. The dislocation was successfully reduced by closed means but the joint was found to be grossly unstable. Due to inherent instability, repair of the ruptured dorsoradial ligament and joint capsule was performed.</p> <p>The ligament was detached from its proximal insertion into trapezium and subsequently stabilized via suture anchors. The torn capsule was repaired in an end-to-end fashion and immobilization of the joint was applied for 6 weeks.</p> <p>Results</p> <p>At 3-year follow up evaluation the patient was pain free and returned to his previous level of activity. No restriction of carpometacrpal movements or residual instability was noticed. Radiographic examination showed normal joint alignment and no signs of subluxation or early osteoarthritis.</p> <p>Conclusion</p> <p>Surgical stabilization of the dorsal capsuloligamentous complex may be considered the selected treatment option in isolated carpometacarpal joint dislocations, that remain unstable after closed reduction in young and high demand patients.</p> <p><b>Level of Clinical Evidence: </b>Level IV</p

    Tight Security Analysis of 3-Round Key-Alternating Cipher with A Single Permutation

    Get PDF
    The tight security bound of the Key-Alternating Cipher (KAC) construction whose round permutations are independent from each other has been well studied. Then a natural question is how the security bound will change when we use fewer permutations in a KAC construction. In CRYPTO 2014, Chen et al. proved that 2-round KAC with a single permutation (2KACSP) has the same security level as the classic one (i.e., 2-round KAC). But we still know little about the security bound of incompletely-independent KAC constructions with more than 2 rounds. In this paper,we will show that a similar result also holds for 3-round case. More concretely, we prove that 3-round KAC with a single permutation (3KACSP) is secure up to Θ(23n4)\varTheta(2^{\frac{3n}{4}}) queries, which also caps the security of 3-round KAC. To avoid the cumbersome graphical illustration used in Chen et al.\u27s work, a new representation is introduced to characterize the underlying combinatorial problem. Benefited from it, we can handle the knotty dependence in a modular way, and also show a plausible way to study the security of rrKACSP. Technically, we abstract a type of problems capturing the intrinsic randomness of rrKACSP construction, and then propose a high-level framework to handle such problems. Furthermore, our proof techniques show some evidence that for any rr, rrKACSP has the same security level as the classic rr-round KAC in random permutation model
    corecore