156 research outputs found

    N-(Naphthalen-1-yl)benzamide

    Get PDF
    In the title compound, C17H13NO, the N—H and C=O bonds are anti with respect to each other. The dihedral angle between the naphthalene ring system and the phenyl ring is 86.63 (5)°. In the crystal, N—H⋯O hydrogen bonds link mol­ecules into chains along [010]

    N-(1-Naphth­yl)benzene­sulfonamide

    Get PDF
    In the title compound, C16H13NO2S, the C—SO2—NH—C torsion angle is −70.1 (2)°. The dihedral angle between the planes of the naphthyl ring system and the phenyl ring is 34.67 (4)°. In the crystal, mol­ecules are linked by inter­molecular N—H⋯O hydrogen bonds into chains along [100]. There are also π–π inter­actions between adjacent naphthyl groups [inter­planar spacing = 3.541 (3) Å] for mol­ecules stacked along [100]

    Modeling Haplotype-Haplotype Interactions in Case-Control Genetic Association Studies

    Get PDF
    Haplotype analysis has been increasingly used to study the genetic basis of human diseases, but models for characterizing genetic interactions between haplotypes from different chromosomal regions have not been well developed in the current literature. In this article, we describe a statistical model for testing haplotype-haplotype interactions for human diseases with a case-control genetic association design. The model is formulated on a contingency table in which cases and controls are typed for the same set of molecular markers. By integrating well-established quantitative genetic principles, the model is equipped with a capacity to characterize physiologically meaningful epistasis arising from interactions between haplotypes from different chromosomal regions. The model allows the partition of epistasis into different components due to additive × additive, additive × dominance, dominance × additive, and dominance × dominance interactions. We derive the EM algorithm to estimate and test the effects of each of these components on differences in the pattern of genetic variation between cases and controls and, therefore, examine their role in the pathogenesis of human diseases. The method was further extended to investigate gene-environment interactions expressed at the haplotype level. The statistical properties of the models were investigated through simulation studies and its usefulness and utilization validated by analyzing the genetic association of sarcoidosis from a human genetics project

    Effects of metastasis-associated in colon cancer 1 inhibition by small hairpin RNA on ovarian carcinoma OVCAR-3 cells

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Metastasis-associated in colon cancer 1 (MACC1) is demonstrated to be up-regulated in several types of cancer, and can serve as biomarker for cancer invasion and metastasis. To investigate the relations between MACC1 and biological processes of ovarian cancer, MACC1 specific small hairpin RNA (shRNA) expression plasmids were used to investigate the effects of MACC1 inhibition on ovarian carcinoma OVCAR-3 cells.</p> <p>Methods</p> <p>Expressions of MACC1 were detected in different ovarian tissues by immunohistochemistry. MACC1 specific shRNA expression plasmids were constructed and transfected into OVCAR-3 cells. Then, expressions of MACC1 were examined by reverse transcription polymerase chain reaction (RT-PCR) and Western blot. Cell proliferation was observed by MTT and monoplast colony formation assay. Flow cytometry and TUNEL assay were used to measure cell apoptosis. Cell migration was assessed by wound healing and transwell migration assay. Matrigel invasion and xenograft model assay were performed to analyze the potential of cell invasion. Activities of Met, MEK1/2, ERK1/2, Akt, cyclinD1, caspase3 and MMP2 protein were measured by Western blot.</p> <p>Results</p> <p>Overexpressions of MACC1 were detected in ovarian cancer tissues. Expression of MACC1 in OVCAR-3 cells was significantly down-regulated by MACC1 specific small hairpin RNA. In OVCAR-3 cells, down-regulation of MACC1 resulted in significant inhibition of cell proliferation, migration and invasion, meanwhile obvious enhancement of apoptosis. As a consequence of MACC1 knockdown, expressions of Met, p-MEK1/2, p-ERK1/2, cyclinD1 and MMP2 protein decreased, level of cleaved capase3 was increased.</p> <p>Conclusions</p> <p>RNA interference (RNAi) against MACC1 could serve as a promising intervention strategy for gene therapy of ovarian carcinoma, and the antitumor effects of MACC1 knockdown might involve in the inhibition of HGF/Met and MEK/ERK pathways.</p

    N-(4-Chloro­benzyl­idene)-1-naphthyl­amine

    Get PDF
    The title compound, C17H12ClN, represents a trans isomer with respect to the C=N bond; the dihedral angle between the planes of the naphthyl and benzene groups is 66.53 (5)°

    OA-Bug: An Olfactory-Auditory Augmented Bug Algorithm for Swarm Robots in a Denied Environment

    Full text link
    Searching in a denied environment is challenging for swarm robots as no assistance from GNSS, mapping, data sharing, and central processing is allowed. However, using olfactory and auditory to cooperate like animals could be an important way to improve the collaboration of swarm robots. In this paper, an Olfactory-Auditory augmented Bug algorithm (OA-Bug) is proposed for a swarm of autonomous robots to explore a denied environment. A simulation environment is built to measure the performance of OA-Bug. The coverage of the search task using OA-Bug can reach 96.93%, with the most significant improvement of 40.55% compared with a similar algorithm, SGBA. Furthermore, experiments are conducted on real swarm robots to prove the validity of OA-Bug. Results show that OA-Bug can improve the performance of swarm robots in a denied environment.Comment: 7 pages, 5 figure

    Improved Fast Correlation Attacks on the Sosemanuk Stream Cipher

    Get PDF
    In this paper, we present a new algorithm for fast correlation attacks on stream ciphers with improved cryptanalysis results on the Sosemanuk stream cipher, one of the 7 finalists in the eSTREAM project in 2008. The new algorithm exploits the direct sum construction of covering codes in decoding phase which approximates the random vectors to a nearest codeword in a linear code. The new strategy provides large flexibility for the adversary and could reduce the time/memory/data complexities significantly. As a case study, we carefully revisit Sosemanuk and demonstrate a state recovery attack with a time complexity of 2134.8, which is 220 times faster than achievable before by the same kind of attack and is the fastest one among all known attacks so far. Our result indicates an inefficiency in longer keys than 135 bits and depicts that the security margin of Sosemanuk is around 28 for the 128-bit security for the first time
    corecore