376 research outputs found

    c-Met overexpression in inflammatory breast carcinomas: automated quantification on tissue microarrays

    Get PDF
    Inflammatory breast carcinoma (IBC) is a rare but aggressive tumour associated with poor outcome owing to early metastases. Increased expression of c-Met protein correlates with reduced survival and high metastatic risk in human cancers including breast carcinomas and is targetable by specific drugs, that could potentially improve the prognosis. In the present study, we compared c-Met expression in IBC (n=41) and non-IBC (n=480) immunohistochemically (Ventana Benchmark autostainer) in two tissue microarrays (TMA) along with PI3K and E-cadherin. The results were quantified through an automated image analysis device (SAMBA Technologies). We observed that (i) c-Met was significantly overexpressed in IBC as compared with non-IBC (P<0.001), (ii) PI3K was overexpressed (P<0.001) in IBC, suggesting that the overexpressed c-Met is functionally active at least through the PI3K signal transduction pathway; and (iii) E-cadherin was paradoxically also overexpressed in IBC. We concluded that overexpressed c-Met in IBC constitutes a potential target for specific therapy for the management of patients with poor-outcome tumours such as IBC. Automated image analysis of TMA proved to be a valuable tool for high-throughput immunohistochemical quantification of the expression of intratumorous protein markers

    Pebble bed: reflector treatment and pressure\ud velocity coupling

    Get PDF
    In this report, we describe some models and numerical methods used to simulate the flow and temperature in a pebble bed modular nuclear reactor. The reactor core is filled with around 450000 spheres containing low enriched uranium and helium is forced through these hot pebbles to cool the system down. The group first investigated the flow model in the pebbles. Numerical aspects were then considered to tackle difficulties encountered with the flow simulation and the temperature inside the pebbles. Numerical schemes are presented that can significantly improve the accuracy of the computed results

    Numerical benchmark campaign of cost action tu1404 – microstructural modelling

    Get PDF
    This paper presents the results of the numerical benchmark campaign on modelling of hydration and microstructure development of cementitious materials. This numerical benchmark was performed in the scope of COST Action TU1404 “Towards the next generation of standards for service life of cement-based materials and structures”. Seven modelling groups took part in the campaign applying different models for prediction of mechanical properties (elastic moduli or compressive strength) in cement pastes and mortars. The simulations were based on published experimental data. The experimental data (both input and results used for validation) were open to the participants. The purpose of the benchmark campaign was to identify the needs of different models in terms of input experimental data, verify predictive potential of the models and finally to provide reference cases for new models in the future. The results of the benchmark show that a relatively high scatter in the predictions can arise between different models, in particular at early ages (e.g. elastic Young’s modulus predicted at 1 d in the range 6-20 GPa), while it reduces at later age, providing relatively good agreement with experimental data. Even though the input data was based on a single experimental dataset, the large differences between the results of the different models were found to be caused by distinct assumed properties for the individual phases at the microstructural level, mainly because of the scatter in the nanoindentation-derived properties of the C-S-H phase.</jats:p

    Systematic Construction of Nonlinear Product Attacks on Block Ciphers

    Get PDF
    A major open problem in block cipher cryptanalysis is discovery of new invariant properties of complex type. Recent papers show that this can be achieved for SCREAM, Midori64, MANTIS-4, T-310 or for DES with modified S-boxes. Until now such attacks are hard to find and seem to happen by some sort of incredible coincidence. In this paper we abstract the attack from any particular block cipher. We study these attacks in terms of transformations on multivariate polynomials. We shall demonstrate how numerous variables including key variables may sometimes be eliminated and at the end two very complex Boolean polynomials will become equal. We present a general construction of an attack where multiply all the polynomials lying on one or several cycles. Then under suitable conditions the non-linear functions involved will be eliminated totally. We obtain a periodic invariant property holding for any number of rounds. A major difficulty with invariant attacks is that they typically work only for some keys. In T-310 our attack works for any key and also in spite of the presence of round constants
    corecore