303 research outputs found

    Research Progress of Abnormal Expression of LKB1/STK111 in Non-Small Cell Lung Cancer

    Get PDF
    Non small cell lung cancer (NSCLC) is a kind of malignant tumor originated from bronchial mucosa, bronchial glands and alveolar epithelium. It has become the main cause of death of malignant tumors in our population. STK11 is a common tumor suppressor gene, its encoded protein liver kinase B1 (LKB1) is an essential serine / threonine protein kinase. LKB1/STK111 inhibits the occurrence and development of tumors through a variety of mechanisms and plays a key regulatory role in malignant tumors. The increased risk of cancer development is also associated with the absence of STK11. More and more studies have found that the abnormal expression of LKB1/STK111 will affect the occurrence and development of lung cancer, especially in NSCLC. This paper reviews the tumor suppressive mechanism of LKB1/STK111 in the occurrence and development of NSCLC, its relationship with NSCLC, and the prognosis and treatment

    Cluster Correspondence Analysis and Reduced K-Means: A Two-Step Approach to Cluster Low Back Pain Patients

    Get PDF
    For the IFCS 2017 data challenge on low back pain (LBP) patients clustering, we used a two-step approach. Two of the challenging characteristics of the data set are the presence of missing values and mixed type variables. After a specific pretreatment, in the first step, we performed domain clustering using cluster correspondence analysis (clusCA). Upon the output variables from each domain, we did the second step, reduced K-means clustering, to get the final clusters of patients. The conclusion section shows the final clustering results and a profile plot of the clusters. Every cluster is highly interpretable and evaluated well with some descriptive variables which are used for measuring the clustering results

    Universal Forgery and Key Recovery Attacks: Application to FKS, FKD and Keyak

    Get PDF
    In this paper, we provide a security analysis of the Full-State Keyed Sponge (FKS), Full-State Keyed Duplex (FKD) and Keyak, one of the third-round CAESAR candidates, in the classic setting and the quantum model, respectively. In the classic setting, we present an universal forgery attack that can be implemented in O(2c/2)O(2^{c/2}) queries, where cc is the capacity. In the quantum model, by utilizing the Simon\u27s algorithm, we propose an efficient universal forgery attack to FKS, FKD and Keyak with complexity of O(c)O(c). Moreover, we also propose an efficient key recovery attack that can be implemented in O(c)O(c). Such attacks show that FKS, FKD and Keyak is completely broken in the quantum model

    Universal Forgery with Birthday Paradox: Application to Blockcipher-based Message Authentication Codes and Authenticated Encryptions

    Get PDF
    An universal forgery attack means that for any given message MM, an adversary without the key can forge the corresponding Message Authentication Code (MAC) tag Ï„\tau, and the pair (M,Ï„)(M,\tau) can be verified with probability 1. For a idea MAC, the universal forgery attack should be infeasible to be implemented, whose complexity is believed to be min{(2n,2k)(2^n, 2^k)} queries in the classic setting, where nn is the tag length and kk is the key length of the MAC, respectively. In this paper, we launch a general universal forgery attack to some blockcipher-based MACs and authenticated encryptions (AEs) using birthday attack, whose complexity is about O(2n/2)O(2^{n/2}) queries in the classic setting. The attack shows that such MACs and AEs are totally insecure. However, this attack is not applicable in the quantum model, since no inclusion of period in the input messages is guaranteed. We also propose other generic universal forgery attacks using collision finding with structural input messages with complexity of O(2n/2)O(2^{n/2}), by birthday paradox in the classic setting. Since our attacks are based on the collision finding with fixed but unknown differences (or period), such attacks can also be implemented with only O(n)O(n) queries using \textit{Simon\u27s} algorithm in the quantum model, which shows that such MACs and AEs are completely broken in the quantum model. Our attacks can be applied to CBC-MAC, XCBC, EMAC, OMAC, CMAC, PC-MAC, MT-MAC, PMAC, PMAC with parity, LightMAC and some of their variants. Moreover, such attacks are also applicable to the authenticated encryptions of the third round of the CAESAR candidates: CLOC, SILC, AEZ, COLM (including COPA and ELmD) and Deoxys

    Security Proof of JAMBU under Nonce Respecting and Nonce Misuse Cases

    Get PDF
    JAMBU is an AEAD mode of operation which entered the third round of CAESAR competition. However, it does not have a security proof like other modes of operation do, and there was a cryptanalysis result that has overthrown the security claim under nonce misuse case by the designers. In this paper, we complement the shortage of the scheme by giving security proofs of JAMBU both under nonce respecting case and nonce misuse case. We prove that JAMBU under nonce respecting case has a slightly lower security than the birthday bound of nn bits, and JAMBU under nonce misuse case has a tight security bound of n/2n/2 bits

    Coordination of Supply Chain with a Dominant Retailer under Demand Disruptions

    Get PDF
    We develop a coordination model of a one-manufacturer multi-retailers supply chain with a dominant retailer. We consider the impact of a dominant retailer on the market retail price and his sales promotion opportunity and examine how the manufacturer can coordinate such a supply chain by revenue-sharing contract after demand disruptions. We address the following important research questions in this paper. (i) How do we design an appropriate revenue-sharing contract to coordinate the supply chain with a dominant retailer without demand disruptions? (ii) When demand is disrupted with variations in market scale and price sensitive coefficient, can the original contract still be valid? (iii) How do the demand disruptions affect the coordination mechanism under different disruption scenarios and how should the new contract change? Finally, we generate important insights by both analytical and numerical examples

    Satellite-based estimate of the variability of warm cloud properties associated with aerosol and meteorological conditions

    Get PDF
    Aerosol-cloud interaction (ACI) is examined using 10 years of data from the MODIS/Terra (morning orbit) and MODIS/Aqua (afternoon orbit) satellites. Aerosol optical depth (AOD) and cloud properties retrieved from both sensors are used to explore in a statistical sense the morning-to-afternoon variation of cloud properties in conditions with low and high AOD, over both land and ocean. The results show that the interaction between aerosol particles and clouds is more complex and of greater uncertainty over land than over ocean. The variation in d(Cloud_X), defined as the mean change in cloud property Cloud_X between the morning and afternoon overpasses in high-AOD conditions minus that in low-AOD conditions, is different over land and ocean. This applies to cloud droplet effective radius (CDR), cloud fraction (CF) and cloud top pressure (CTP), but not to cloud optical thickness (COT) and cloud liquid water path (CWP). Both COT and CWP increase over land and ocean after the time step, irrespective of the AOD. However, the initial AOD conditions can affect the amplitude of variation of COT and CWP. The effects of initial cloud fraction and meteorological conditions on the change in CF under lowand high-AOD conditions after the 3 h time step over land are also explored. Two cases are considered: (1) when the cloud cover increases and (2) when the cloud cover decreases. For both cases, we find that almost all values of d(CF) are positive, indicating that the variations of CF are larger in high AOD than that in low AOD after the 3 h time step. The results also show that a large increase in cloud fraction occurs when scenes experience large AOD and stronger upward motion of air parcels. Furthermore, the increase rate of cloud cover is larger for high AOD with increasing relative humidity (RH) when RH is larger than 20 %. We also find that a smaller increase in cloud fraction occurs when scenes experience larger AOD and larger initial cloud cover. Overall, the analysis of the diurnal variation of cloud properties provides a better understanding of aerosol-cloud interaction over land and ocean.Peer reviewe

    The valproate mediates radio-bidirectional regulation through RFWD3-dependent ubiquitination on Rad51

    Get PDF
    Ionizing radiation (IR) can induce DNA double-strand breaks (DSBs) in tumor cells during radiotherapy (RT), but the efficiency of RT is limited because of the toxicity to normal cells. Locating an adjuvant treatment to alleviate damage in normal cells while sensitizing tumor cells to IR has attracted much attention. Here, using the 7,12-dimethylbenz[α]anthracene (DMBA)-induced malignant transformed MCF10A cells, we found that valproate (VPA), a histone deacetylase inhibitor (HDACi), radiosensitized transformed cells while alleviated IR-induced damage in normal cells at a safe dose (0.5 mM). We further demonstrated the decrease of homologous recombination (HR)-associated Rad51 in the transformed cells was related to the increase of its ubiquitination regulated by E3 ligase RFWD3 for the radiosensitization, which was opposite to normal cells, indicating that RFWD3-dependent ubiquitination on Rad51 was involved in the VPA-mediated radio-bidirectional effect. Through DMBA-transformed breast cancer rat model, VPA at 200 mg/kg radiosensitized tumor tissue cells by increasing RFWD3 and inhibited Rad51, while radioprotected normal tissue cells by decreasing RFWD3 and enhanced Rad51. In addition, we found high-level Rad51 was associated with tumorigenesis and poor prognosis in breast cancer patients. Our findings uncovered RFWD3-dependent Rad51 ubiquitination was the novel mechanism of VPA-mediated radio-bidirectional effect, VPA is a potential adjuvant treatment for tumor RT
    • …
    corecore