62 research outputs found

    Age-related changes in global motion coherence: conflicting haemodynamic and perceptual responses

    Get PDF
    Our aim was to use both behavioural and neuroimaging data to identify indicators of perceptual decline in motion processing. We employed a global motion coherence task and functional Near Infrared Spectroscopy (fNIRS). Healthy adults (n = 72, 18-85) were recruited into the following groups: young (n = 28, mean age = 28), middle-aged (n = 22, mean age = 50), and older adults (n = 23, mean age = 70). Participants were assessed on their motion coherence thresholds at 3 different speeds using a psychophysical design. As expected, we report age group differences in motion processing as demonstrated by higher motion coherence thresholds in older adults. Crucially, we add correlational data showing that global motion perception declines linearly as a function of age. The associated fNIRS recordings provide a clear physiological correlate of global motion perception. The crux of this study lies in the robust linear correlation between age and haemodynamic response for both measures of oxygenation. We hypothesise that there is an increase in neural recruitment, necessitating an increase in metabolic need and blood flow, which presents as a higher oxygenated haemoglobin response. We report age-related changes in motion perception with poorer behavioural performance (high motion coherence thresholds) associated with an increased haemodynamic response

    Batch Binary Weierstrass

    Get PDF
    Bitslicing is a programming technique that offers several attractive features, such as timing attack resistance, high amortized performance in batch computation, and architecture independence. On the symmetric crypto side, this technique sees wide real-world deployment, in particular for block ciphers with naturally parallel modes. However, the asymmetric side lags in application, seemingly due to the rigidity of the batch computation requirement. In this paper, we build on existing bitsliced binary field arithmetic results to develop a tool that optimizes performance of binary fields at any size on a given architecture. We then provide an ECC layer, with support for arbitrary binary curves. Finally, we integrate into our novel dynamic OpenSSL engine, transparently exposing the batch results to the OpenSSL library and linking applications to achieve significant performance and security gains for key pair generation, ECDSA signing, and (half of) ECDH across a wide range of curves, both standardized and non-standard

    Streptococcus iniae M-Like Protein Contributes to Virulence in Fish and Is a Target for Live Attenuated Vaccine Development

    Get PDF
    Streptococcus iniae is a significant pathogen in finfish aquaculture, though knowledge of virulence determinants is lacking. Through pyrosequencing of the S. iniae genome we have identified two gene homologues to classical surface-anchored streptococcal virulence factors: M-like protein (simA) and C5a peptidase (scpI).S. iniae possesses a Mga-like locus containing simA and a divergently transcribed putative mga-like regulatory gene, mgx. In contrast to the Mga locus of group A Streptococcus (GAS, S. pyogenes), scpI is located distally in the chromosome. Comparative sequence analysis of the Mgx locus revealed only one significant variant, a strain with an insertion frameshift mutation in simA and a deletion mutation in a region downstream of mgx, generating an ORF which may encode a second putative mga-like gene, mgx2. Allelic exchange mutagenesis of simA and scpI was employed to investigate the potential role of these genes in S. iniae virulence. Our hybrid striped bass (HSB) and zebrafish models of infection revealed that M-like protein contributes significantly to S. iniae pathogenesis whereas C5a peptidase-like protein does not. Further, in vitro cell-based analyses indicate that SiMA, like other M family proteins, contributes to cellular adherence and invasion and provides resistance to phagocytic killing. Attenuation in our virulence models was also observed in the S. iniae isolate possessing a natural simA mutation. Vaccination of HSB with the Delta simA mutant provided 100% protection against subsequent challenge with a lethal dose of wild-type (WT) S. iniae after 1,400 degree days, and shows promise as a target for live attenuated vaccine development.Analysis of M-like protein and C5a peptidase through allelic replacement revealed that M-like protein plays a significant role in S. iniae virulence, and the Mga-like locus, which may regulate expression of this gene, has an unusual arrangement. The M-like protein mutant created in this research holds promise as live-attenuated vaccine

    Prognostic model to predict postoperative acute kidney injury in patients undergoing major gastrointestinal surgery based on a national prospective observational cohort study.

    Get PDF
    Background: Acute illness, existing co-morbidities and surgical stress response can all contribute to postoperative acute kidney injury (AKI) in patients undergoing major gastrointestinal surgery. The aim of this study was prospectively to develop a pragmatic prognostic model to stratify patients according to risk of developing AKI after major gastrointestinal surgery. Methods: This prospective multicentre cohort study included consecutive adults undergoing elective or emergency gastrointestinal resection, liver resection or stoma reversal in 2-week blocks over a continuous 3-month period. The primary outcome was the rate of AKI within 7 days of surgery. Bootstrap stability was used to select clinically plausible risk factors into the model. Internal model validation was carried out by bootstrap validation. Results: A total of 4544 patients were included across 173 centres in the UK and Ireland. The overall rate of AKI was 14·2 per cent (646 of 4544) and the 30-day mortality rate was 1·8 per cent (84 of 4544). Stage 1 AKI was significantly associated with 30-day mortality (unadjusted odds ratio 7·61, 95 per cent c.i. 4·49 to 12·90; P < 0·001), with increasing odds of death with each AKI stage. Six variables were selected for inclusion in the prognostic model: age, sex, ASA grade, preoperative estimated glomerular filtration rate, planned open surgery and preoperative use of either an angiotensin-converting enzyme inhibitor or an angiotensin receptor blocker. Internal validation demonstrated good model discrimination (c-statistic 0·65). Discussion: Following major gastrointestinal surgery, AKI occurred in one in seven patients. This preoperative prognostic model identified patients at high risk of postoperative AKI. Validation in an independent data set is required to ensure generalizability

    Comprehensive molecular characterization of the hippo signaling pathway in cancer

    Get PDF
    Hippo signaling has been recognized as a key tumor suppressor pathway. Here, we perform a comprehensive molecular characterization of 19 Hippo core genes in 9,125 tumor samples across 33 cancer types using multidimensional “omic” data from The Cancer Genome Atlas. We identify somatic drivers among Hippo genes and the related microRNA (miRNA) regulators, and using functional genomic approaches, we experimentally characterize YAP and TAZ mutation effects and miR-590 and miR-200a regulation for TAZ. Hippo pathway activity is best characterized by a YAP/TAZ transcriptional target signature of 22 genes, which shows robust prognostic power across cancer types. Our elastic-net integrated modeling further reveals cancer-type-specific pathway regulators and associated cancer drivers. Our results highlight the importance of Hippo signaling in squamous cell cancers, characterized by frequent amplification of YAP/TAZ, high expression heterogeneity, and significant prognostic patterns. This study represents a systems-biology approach to characterizing key cancer signaling pathways in the post-genomic era

    BBS: An energy efficient localized routing scheme for query processing in wireless sensor networks

    No full text
    A wireless sensor network (WSNET) can support various types of queries. The energy resource of sensors constrains the total number of query responses, called query capacity received by the sink processing in There are four problems in the existing approaches for energy-efficient query WSNETs: 1. the fact that sensors near the sink drain their energy much faster than distant sensors has been overlooked, 2. routing trees (RT) are rooted at the sink, and therefore, aggregative queries are less energy-efficient, 3. data reception cost has been ignored, and 4. flooding is used in query distribution or RT construction. In this paper, we propose a Broadcasting-Based query Scheme (BBS) to address the above problems. BBS reduces the energy depletion rate of sensors near the sink, builds different localized RTs for different query types, and eliminates the flooding cost of query distribution. Compared to the existing approaches, simulation studies show that BBS produces significant improvement in the query capacity for non-holistic queries (10\%-100\% capacity improvement) and holistic queries (tip to an order of magnitude of capacity improvement)

    Authentication Authorization and Accounting (AAA) schemes in WiMAX

    Get PDF
    Authorization, Authentication, and Accouting schemes for WiMAX (Worldwide Interoperability for Microwave access) is the focus of this paper. WiMAX works as a wireless metropolitan area network (MAN) technology, based on IEEE 802.16 specifications, which was designed to provide high-throughput wireless broadband connections (up to 70 Mbps for fixed scheme and up to 15 Mbps for mobile scheme) over long distances (up to 30 miles), which is described as a "framework for the evolution of wireless broadband". The main focus of the authentication and authorization is based on the Privacy Key Management - Extensible Authentication Protocol for Pairwise Key Manegement "EAP-PKM" and the accounting issue.link_to_subscribed_fulltex

    Authentication Authorization and Accounting (AAA) schemes in WiMAX

    No full text
    Authorization, Authentication, and Accouting schemes for WiMAX (Worldwide Interoperability for Microwave access) is the focus of this paper. WiMAX works as a wireless metropolitan area network (MAN) technology, based on IEEE 802.16 specifications, which was designed to provide high-throughput wireless broadband connections (up to 70 Mbps for fixed scheme and up to 15 Mbps for mobile scheme) over long distances (up to 30 miles), which is described as a "framework for the evolution of wireless broadband". The main focus of the authentication and authorization is based on the Privacy Key Management - Extensible Authentication Protocol for Pairwise Key Manegement "EAP-PKM" and the accounting issue.link_to_subscribed_fulltex
    corecore