30 research outputs found
ADAM12 is a circulating marker for stromal activation in pancreatic cancer and predicts response to chemotherapy
Pancreatic ductal adenocarcinoma (PDAC) is characterized by abundant stroma that harbors tumor-promoting properties. No good biomarkers exist to monitor the effect of stromal targeting therapies or to predict response. We set out to identify such non-invasive markers for PDAC stroma and predict response to therapy. Gene expression datasets, co-culture experiments, xenografts, and patient samples were analyzed. Serum samples were measured from a cohort of 58 resected patients, and 87 metastatic or locally advanced PDAC patients. Baseline and follow-up levels were assessed in 372 additional metastatic PDAC patients who received nab-paclitaxel with gemcitabine (n = 184) or gemcitabine monotherapy (n = 188) in the phase III MPACT trial. Increased levels of ADAM12 were found in PDAC patients compared to healthy controls (p < 0.0001, n = 157 and n = 38). High levels of ADAM12 significantly associated with poor outcome in resected PDAC (HR 2.07, p = 0.04). In the MPACT trial survival was significantly longer for patients who received nab-paclitaxel and had undetectable ADAM12 levels before treatment (OS 12.3 m vs 7.9 m p = 0.0046). Consistently undetectable or decreased ADAM12 levels during treatment significantly associated with longer survival as well (OS 14.4 m and 11.2 m, respectively vs 8.3, p = 0.0054). We conclude that ADAM12 is a blood-borne proxy for stromal activation, the levels of which have prognostic significance and correlate with treatment benefit
Measurement of the gamma ray background in the Davis Cavern at the Sanford Underground Research Facility
Deep underground environments are ideal for low background searches due to the attenuation of cosmic rays by passage through the earth. However, they are affected by backgrounds from γ-rays emitted by 40K and the 238U and 232Th decay chains in the surrounding rock. The LUX-ZEPLIN (LZ) experiment will search for dark matter particle interactions with a liquid xenon TPC located within the Davis campus at the Sanford Underground Research Facility, Lead, South Dakota, at the 4,850-foot level. In order to characterise the cavern background, in-situ γ-ray measurements were taken with a sodium iodide detector in various locations and with lead shielding. The integral count rates (0--3300~keV) varied from 596~Hz to 1355~Hz for unshielded measurements, corresponding to a total flux in the cavern of 1.9±0.4~γ cm−2s−1. The resulting activity in the walls of the cavern can be characterised as 220±60~Bq/kg of 40K, 29±15~Bq/kg of 238U, and 13±3~Bq/kg of 232Th
Vascular Remodeling in Health and Disease
The term vascular remodeling is commonly used to define the structural changes in blood vessel geometry that occur in response to long-term physiologic alterations in blood flow or in response to vessel wall injury brought about by trauma or underlying cardiovascular diseases.1, 2, 3, 4 The process of remodeling, which begins as an adaptive response to long-term hemodynamic alterations such as elevated shear stress or increased intravascular pressure, may eventually become maladaptive, leading to impaired vascular function. The vascular endothelium, owing to its location lining the lumen of blood vessels, plays a pivotal role in regulation of all aspects of vascular function and homeostasis.5 Thus, not surprisingly, endothelial dysfunction has been recognized as the harbinger of all major cardiovascular diseases such as hypertension, atherosclerosis, and diabetes.6, 7, 8 The endothelium elaborates a variety of substances that influence vascular tone and protect the vessel wall against inflammatory cell adhesion, thrombus formation, and vascular cell proliferation.8, 9, 10 Among the primary biologic mediators emanating from the endothelium is nitric oxide (NO) and the arachidonic acid metabolite prostacyclin [prostaglandin I2 (PGI2)], which exert powerful vasodilatory, antiadhesive, and antiproliferative effects in the vessel wall
Reducing the environmental impact of surgery on a global scale: systematic review and co-prioritization with healthcare workers in 132 countries
Background
Healthcare cannot achieve net-zero carbon without addressing operating theatres. The aim of this study was to prioritize feasible interventions to reduce the environmental impact of operating theatres.
Methods
This study adopted a four-phase Delphi consensus co-prioritization methodology. In phase 1, a systematic review of published interventions and global consultation of perioperative healthcare professionals were used to longlist interventions. In phase 2, iterative thematic analysis consolidated comparable interventions into a shortlist. In phase 3, the shortlist was co-prioritized based on patient and clinician views on acceptability, feasibility, and safety. In phase 4, ranked lists of interventions were presented by their relevance to high-income countries and low–middle-income countries.
Results
In phase 1, 43 interventions were identified, which had low uptake in practice according to 3042 professionals globally. In phase 2, a shortlist of 15 intervention domains was generated. In phase 3, interventions were deemed acceptable for more than 90 per cent of patients except for reducing general anaesthesia (84 per cent) and re-sterilization of ‘single-use’ consumables (86 per cent). In phase 4, the top three shortlisted interventions for high-income countries were: introducing recycling; reducing use of anaesthetic gases; and appropriate clinical waste processing. In phase 4, the top three shortlisted interventions for low–middle-income countries were: introducing reusable surgical devices; reducing use of consumables; and reducing the use of general anaesthesia.
Conclusion
This is a step toward environmentally sustainable operating environments with actionable interventions applicable to both high– and low–middle–income countries
Development of a PC-based Data Acquisition and Control System
Rosana G. Moreira, Editor-in-Chief; Texas A&M UniversityThis is a paper from International Commission of Agricultural Engineering (CIGR, Commission Internationale du Genie Rural) E-Journal Volume 9 (2007): Development of a PC-based Data Acquisition and Control System. Manuscript IT 06 005. Vol. IX. August, 2007
Simulatable Leakage::Analysis, Pitfalls, and New Constructions
In 2013, Standaert \emph{et al.} proposed the notion of simulatable
leakage to connect theoretical leakage resilience with the practice
of side channel attacks. Their use of simulators, based on physical
devices, to support proofs of leakage resilience allows verification
of underlying assumptions: the indistinguishability game, involving
real vs. simulated leakage, can be `played\u27 by an evaluator. Using
a concrete, block cipher based leakage resilient PRG and high-level
simulator definition (based on concatenating two partial leakage traces),
they included detailed reasoning why said simulator (for AES-128)
resists state-of-the-art side channel attacks.
\\\\
In this paper, we demonstrate a distinguisher against their simulator
and thereby falsify their hypothesis. Our distinguishing technique,
which is evaluated using concrete implementations of the Standaert
\emph{et al.} simulator on several platforms, is based on `tracking\u27
consistency (resp. identifying simulator {\em in}consistencies) in
leakage traces by means of cross-correlation. In attempt to rescue
the approach, we propose several alternative simulator definitions
based on splitting traces at points of low intrinsic cross-correlation.
Unfortunately, these come with significant caveats, and we conclude
that the most natural way of producing simulated leakage is by using
the underlying construction `as is\u27 (but with a random key)
Combined Attack on CRT-RSA. Why Public Verification Must Not Be Public?
This article introduces a new Combined Attack on a CRT-RSA implementation resistant against Side-Channel Analysis and Fault Injection attacks. Such implementations prevent the attacker from obtaining the signature when a fault has been induced during the computation. Indeed, such a value would allow the attacker to recover the RSA private key by computing the of the public modulus and the faulty signature. The principle of our attack is to inject a fault during the signature computation and to perform a Side-Channel Analysis targeting a sensitive value processed during the Fault Injection countermeasure execution. The resulting information is then used to factorize the public modulus, leading to the disclosure of the whole RSA private key. After presenting a detailed account of our attack, we explain how its complexity can be significantly reduced by using lattice reduction techniques. We also provide simulations that confirm the efficiency of our attack as well as two different countermeasures having a very small impact on the performance of the algorithm. As it performs a Side-Channel Analysis during a Fault Injection countermeasure to retrieve the secret value, this article recalls the need for Fault Injection and Side-Channel Analysis countermeasures as monolithic implementations