483 research outputs found
Probability of cancer in lung nodules using sequential volumetric screening up to 12 months: the UKLS trial.
BACKGROUND: Estimation of the clinical probability of malignancy in patients with pulmonary nodules will facilitate early diagnosis, determine optimum patient management strategies and reduce overall costs. METHODS: Data from the UK Lung Cancer Screening trial were analysed. Multivariable logistic regression models were used to identify independent predictors and to develop a parsimonious model to estimate the probability of lung cancer in lung nodules detected at baseline and at 3-month and 12-month repeat screening. RESULTS: Of 1994 participants who underwent CT scan, 1013 participants had a total of 5063 lung nodules and 52 (2.6%) of the participants developed lung cancer during a median follow-up of 4 years. Covariates that predict lung cancer in our model included female gender, asthma, bronchitis, asbestos exposure, history of cancer, early and late onset of family history of lung cancer, smoking duration, FVC, nodule type (pure ground-glass and part-solid) and volume as measured by semiautomated volumetry. The final model incorporating all predictors had excellent discrimination: area under the receiver operating characteristic curve (AUC 0.885, 95% CI 0.880 to 0.889). Internal validation suggested that the model will discriminate well when applied to new data (optimism-corrected AUC 0.882, 95% CI 0.848 to 0.907). The risk model had a good calibration (goodness-of-fit χ[8] 8.13, p=0.42). CONCLUSIONS: Our model may be used in estimating the probability of lung cancer in nodules detected at baseline and at 3 months and 12 months from baseline, allowing more efficient stratification of follow-up in population-based lung cancer screening programmes. TRIAL REGISTRATION NUMBER: 78513845.National Institute for Health Research Health Technology Assessment (NIHR HTA) (reference number HTA 09/61/01)
Lung Screen Uptake Trial (LSUT): Randomized Controlled Clinical Trial Testing Targeted Invitation Materials
Rationale: Low uptake of low-dose computed tomography (LDCT) lung cancer screening, particularly by current smokers of a low socioeconomic position, compromises effectiveness and equity.
Objectives: To compare the effect of a targeted, low-burden, and stepped invitation strategy versus control on uptake of hospital-based Lung Health Check appointments offering LDCT screening.
Methods: In a two-arm, blinded, between-subjects, randomized controlled trial, 2,012 participants were selected from 16 primary care practices using these criteria: 1) aged 60 to 75 years, 2) recorded as a current smoker within the last 7 years, and 3) no prespecified exclusion criteria contraindicating LDCT screening. Both groups received a stepped sequence of preinvitation, invitation, and reminder letters from their primary care practitioner offering prescheduled appointments. The key manipulation was the accompanying leaflet. The intervention group’s leaflet targeted psychological barriers and provided low-burden information, mimicking the concept of the U.K. Ministry of Transport’s annual vehicle test (“M.O.T. For Your Lungs”).
Measurements and Main Results: Uptake was 52.6%, with no difference between intervention (52.3%) and control (52.9%) groups in unadjusted (odds ratio [OR], 0.98; 95% confidence interval [CI], 0.82–1.16) or adjusted (OR, 0.98; 95% CI, 0.82–1.17) analyses. Current smokers were less likely to attend (adjusted OR, 0.70; 95% CI, 0.56–0.86) than former smokers. Socioeconomic deprivation was significantly associated with lower uptake for the control group only (P < 0.01).
Conclusions: The intervention did not improve uptake. Regardless of trial arm, uptake was considerably higher than previous clinical and real-world studies, particularly given that the samples were predominantly lower socioeconomic position smokers. Strategies common to both groups, including a Lung Health Check approach, could represent a minimum standard.
Clinical trial registered with www.clinicaltrials.gov (NCT02558101) and registered prospectively with the International Standard Registered Clinical/Social Study (N21774741)
Methyl jasmonate-elicited herbivore resistance: does MeJA function as a signal without being hydrolyzed to JA?
Treatment with methyl jasmonate (MeJA) elicits herbivore resistance in many plant species and over-expression of JA carboxyl methyltransferase (JMT) constitutively increases JA-induced responses in Arabidopsis. When wild-type (WT) Nicotiana attenuata plants are treated with MeJA, a rapid transient endogenous JA burst is elicited, which in turn increases levels of nicotine and trypsin proteinase inhibitors (TPIs) and resistance to larvae of the specialist herbivore, Manduca sexta. All of these responses are impaired in plants silenced in lipoxygenase 3 expression (asLOX3) but are restored to WT levels by MeJA treatment. Whether these MeJA-induced responses are directly elicited by MeJA or by its cleavage product, JA, is unknown. Using virus-induced gene silencing (VIGS), we silenced MeJA-esterase (NaMJE) expression and found this gene responsible for most of the MeJA-cleaving activity in N. attenuata protein extracts. Silencing NaMJE in asLOX3, but not in WT plants, significantly reduced MeJA-induced nicotine levels and resistance to M. sexta, but not TPI levels. MeJA-induced transcript levels of threonine deaminase (NaTD) and phenylalanine ammonia lyase (NaPAL1) were also decreased in VIGS MJE (asLOX3) plants. Finally the performance of M. sexta larvae that fed on plants treated with JA or MeJA demonstrated that silencing NaMJE inhibited MeJA-induced but not JA-induced resistance in asLOX3 plants. From these results, we conclude that the resistance elicited by MeJA treatment is directly elicited not by MeJA but by its de-methylated product, JA
Recommended from our members
CheriRTOS: A Capability Model for Embedded Devices
Embedded systems are deployed ubiquitously
among various sectors including automotive, medical, robotics
and avionics. As these devices become increasingly connected,
the attack surface also increases tremendously; new mechanisms
must be deployed to defend against more sophisticated attacks
while not violating resource constraints. In this paper we present
CheriRTOS on CHERI-64, a hardware-software platform atop
Capability Hardware Enhanced RISC Instructions (CHERI) for
embedded systems.
Our system provides efficient and scalable task isolation,
fast and secure inter-task communication, fine-grained memory
safety, and real-time guarantees, using hardware capabilities as
the sole protection mechanism. We summarize state-of-the-art se-
curity and memory safety for embedded systems for comparison
with our platform, illustrating the superior substrate provided
by CHERI’s capabilities. Finally, our evaluations show that a
capability system can be implemented within the constraints of
embedded systems
Recommended from our members
Efficient tagged memory
We characterize the cache behavior of an in-memory tag table and
demonstrate that an optimized implementation can typically achieve a near-zero memory traffic overhead. Both industry and academia have repeatedly demonstrated tagged memory as a key mechanism to enable enforcement of powerful security invariants, including capabilities pointer integrity, watchpoints, and information-flow tracking. A single-bit tag shadowspace is the most commonly proposed requirement, as one bit is the minimum metadata needed to distinguish between an untyped data word and any number of new hardware-enforced types. We survey various tag shadowspace approaches and identify their common requirements and positive features of their implementations. To avoid non-standard memory widths, we identify the most practical implementation for tag storage to be an in-memory table managed next to the DRAM controller. We characterize the caching performance of such a tag table and demonstrate a DRAM traffic overhead below 5\% for the vast majority of applications. We identify spatial locality on a page scale as the primary factor that enables surprisingly high table cache-ability. We then demonstrate tag-table compression for a set of common applications. A hierarchical structure with elegantly simple optimizations reduces DRAM traffic overhead to below 1\% for most applications. These insights and optimizations pave the way for commercial applications making use of single-bit tags stored in commodity memory
Lung Screen Uptake Trial: results from a single lung cancer screening round
The Lung Screen Uptake Trial tested a novel invitation strategy to improve uptake and reduce socioeconomic and smoking-related inequalities in lung cancer screening (LCS) participation. It provides one of the first UK-based 'real-world' LCS cohorts. Of 2012 invited, 1058 (52.6%) attended a 'lung health check'. 768/996 (77.1%) in the present analysis underwent a low-dose CT scan. 92 (11.9%) and 33 (4.3%) participants had indeterminate pulmonary nodules requiring 3-month and 12-month surveillance, respectively; 36 lung cancers (4.7%) were diagnosed (median follow-up: 1044 days). 72.2% of lung cancers were stage I/II and 79.4% of non-small cell lung cancer had curative-intent treatment
Recommended from our members
CheriABI: Enforcing Valid Pointer Provenance and Minimizing Pointer Privilege in the POSIX C Run-time Environment
The CHERI architecture allows pointers to be implemented as capabilities (rather than integer virtual addresses) in a manner that is compatible with, and strengthens, the semantics of the C language. In addition to the spatial protections offered by conventional fat pointers, CHERI capabilities offer strong integrity, enforced provenance validity, and access monotonicity. The stronger guarantees of these architectural capabilities must be reconciled with the real-world behavior of operating systems, run-time environments, and applications. When the process model, user-kernel interactions, dynamic linking, and memory management are all considered, we observe that simple derivation of architectural capabilities is insufficient to describe appropriate access to memory. We bridge this conceptual gap with a notional \emph{abstract capability} that describes the accesses that should be allowed at a given point in execution, whether in the kernel or userspace. To investigate this notion at scale, we describe the first adaptation of a full C-language operating system (FreeBSD) with an enterprise database (PostgreSQL) for complete spatial and referential memory safety. We show that awareness of abstract capabilities, coupled with CHERI architectural capabilities, can provide more complete protection, strong compatibility, and acceptable performance overhead compared with the pre-CHERI baseline and software-only approaches. Our observations also have potentially significant implications for other mitigation techniques.This work was supported by the Defense Advanced Research Projects Agency (DARPA) and the Air Force Research Laboratory (AFRL), under contracts FA8750-10-C-0237 (``CTSRD'') and HR0011-18-C-0016 (``ECATS''). The views, opinions, and/or findings contained in this report are those of the authors and should not be interpreted as representing the official views or policies of the Department of Defense or the U.S. Government. We also acknowledge the EPSRC REMS Programme Grant (EP/K008528/1), the ERC ELVER Advanced Grant (789108), Arm Limited, HP Enterprise, and Google, Inc. Approved for Public Release, Distribution Unlimited
Northern winter climate change: assessment of uncertainty in CMIP5 projections related to stratosphere-troposphere coupling
Journal ArticlePublished versionFuture changes in the stratospheric circulation could have an important impact on northern winter tropospheric climate change, given that sea level pressure (SLP) responds not only to tropospheric circulation variations but also to vertically coherent variations in troposphere-stratosphere circulation. Here we assess northern winter stratospheric change and its potential to influence surface climate change in the Coupled Model Intercomparison Project-Phase 5 (CMIP5) multimodel ensemble. In the stratosphere at high latitudes, an easterly change in zonally averaged zonal wind is found for the majority of the CMIP5 models, under the Representative Concentration Pathway 8.5 scenario. Comparable results are also found in the 1% CO2 increase per year projections, indicating that the stratospheric easterly change is common feature in future climate projections. This stratospheric wind change, however, shows a signi fi cant spread among the models. By using linear regression, we quantify the impact of tropical upper troposphere warming, polar amplification, and the stratospheric wind change on SLP. We find that the intermodel spread in stratospheric wind change contributes substantially to the intermodel spread in Arctic SLP change. The role of the stratosphere in determining part of the spread in SLP change is supported by the fact that the SLP change lags the stratospheric zonally averaged wind change. Taken together, these findings provide further support for the importance of simulating the coupling between the stratosphere and the troposphere, to narrow the uncertainty in the future projection of tropospheric circulation changes
- …