651 research outputs found

    Dendritic cell density and activation status in human breast cancer – CD1a, CMRF-44, CMRF-56 and CD-83 expression

    Get PDF
    Low CD1a-positive putative dendritic cell numbers in human breast cancer has recently been described and may explain the apparent ‘poor immunogenicity’ previously reported in breast cancer. Little attention has been given to dendritic cell activation within the tumour microenvironment, which is another reason why the in-situ immune response may be severely deficient. We have therefore examined CD1a expression as a marker for dendritic cells, together with CMRF-44 and -56 as markers of dendritic cell activation status, in 40 human breast cancers. The results demonstrate few or no CD1a-positive putative dendritic cells and minimal or no expression of the dendritic cell activation markers. Both dendritic cell number and dendritic cell activation appear substantially deficient in human breast cancers, regardless of tumour histological grade

    CD1a-positive infiltrating-dendritic cell density and 5-year survival from human breast cancer

    Get PDF
    © Churchill LivingstoneInfiltrating CD1a+ dendritic cells (DCs) have been associated with increased survival in a number of human cancers. This study investigated DC infiltration within breast cancers and the association with survival. Classical established prognostic factors, of tumour size, lymph node status, histological grade, lympho-vascular invasion, the KI-67 (MIB-1) fraction and the Nottingham Prognostic Index (NPI) were also compared. A total of 48 breast cancer patients were followed from the time of surgery and CD1a density analysis for 5 years or until death. Our data set validated previous studies, which show a relationship between survival and the NPI (P<0.001), tumour size (P<0.01) and lymph node status (P<0.05). Although more patients were alive at the 5-year time point in the group with higher CD1a DC density than the lower CD1a DC group, this failed to reach statistical significance at the P=0.05 level. Analysis at 10 years postsurgery is required to investigate the association further.B.J.Coventry and J. Morto

    Development and validation of a computational model of the knee joint for the evaluation of surgical treatments for osteoarthritis

    Get PDF
    A three-dimensional (3D) knee joint computational model was developed and validated to predict knee joint contact forces and pressures for different degrees of malalignment. A 3D computational knee model was created from high-resolution radiological images to emulate passive sagittal rotation (full-extension to 658-flexion) and weight acceptance. A cadaveric knee mounted on a six-degree-of-freedom robot was subjected to matching boundary and loading conditions. A ligamenttuning process minimised kinematic differences between the robotically loaded cadaver specimen and the finite element (FE) model. The model was validated by measured intra-articular force and pressure measurements. Percent full scale error between FE-predicted and in vitro-measured values in the medial and lateral compartments were 6.67% and 5.94%, respectively, for normalised peak pressure values, and 7.56% and 4.48%, respectively, for normalised force values. The knee model can accurately predict normalised intra-articular pressure and forces for different loading conditions and could be further developed for subject-specific surgical planning

    Simple Nudges for Better Password Creation

    Get PDF
    Recent security breaches have highlighted the consequences of reusing passwords across online accounts. Recent guidance on password policies by the UK government recommend an emphasis on password length over an extended character set for generating secure but memorable passwords without cognitive overload. This paper explores the role of three nudges in creating website-specific passwords: financial incentive (present vs absent), length instruction (long password vs no instruction) and stimulus (picture present vs not present). Mechanical Turk workers were asked to create a password in one of these conditions and the resulting passwords were evaluated based on character length, resistance to automated guessing attacks, and time taken to create the password. We found that users created longer passwords when asked to do so or when given a financial incentive and these longer passwords were harder to guess than passwords created with no instruction. Using a picture nudge to support password creation did not lead to passwords that were either longer or more resistant to attacks but did lead to account-specific passwords

    Encouraging Use of Seasonal Climate Forecasts by Farmers

    Get PDF
    What encourages use of seasonal climate forecasts? Considerable effort is being applied in developing seasonal climate forecasts and demonstrating the potential benefits available to farmers from using seasonal climate forecasts. This study examines three factors underlying the use of seasonal climate forecasts by farmers: the level of forecast understanding by farmers, the format presentation of the forecasts, and the attitude of farmers towards the usefulness of forecasts as indicators of future rainfall. Using judgement analysis, the use of forecasts in cropping decisions was determined for 73 Australian farmers. Then a moderated regression analysis was used to predict forecast use from the three underlying factors. The study found that a good understanding of the forecast was more important than the forecast format in predicting its use. However, this main effect of good understanding on higher use was qualified by a three-way interaction, such that seasonal climate forecasts and the forecasts were presented in a frequency format. Thus, the study found all three factors were important in predicting the use of seasonal climate forecasts by farmers. However, relatively little is known about farmer attitudes toward the usefulness of seasonal climate forecasts and how these attitudes arise, and further research is recommended in these areas

    Illegal Fishing and Fisheries Crime as a Transnational Organized Crime in Indonesia

    Get PDF
    Illegal, unreported and unregulated (IUU) fishing is increasingly drawing international attention and coastal states strengthen their efforts to address it as a matter of priority due to its severe implications for food, economic, environmental and social security. As the largest archipelagic country in the world, this is especially problematic for Indonesia. In this already complex geographical and security environment, the authors test the hypothesis that IUU fishing and fisheries crime(s) classify as transnational organized criminal activities. The article argues that IUU fishing is much more than simply a fisheries management issue, since it goes hand in hand with fisheries crime. As a result, although the two concepts are quite distinct, they are so closely interlinked and interrelated throughout the entire value chain of marine fisheries, that they can only be managed effectively collectively by understanding them both within the framework of transnational organized crime. To make this argument, the research utilizes qualitative and quantitative data collected from approximately two thousand trafficked fishers, rescued in 2015 from slavery conditions while stranded in two remote Indonesian locations: Benjina on Aru island and on Ambon island. The article’s findings also unveil new trends relating to the inner workings of the illegal fishing industry, in four different, yet interlinked categories: recruitment patterns and target groups; document forgery; forced labor and abuse; and fisheries violations. The paper concludes by confirming the hypothesis and highlights that IUU fishing provides the ideal (illegal) environment for fisheries crimes and other forms of transnational organized crimes to flourish
    corecore