1,217 research outputs found

    Use of tamoxifen and raloxifene for breast cancer chemoprevention in 2010

    Get PDF
    PURPOSE: Two selective estrogen receptor modulators (SERMs), tamoxifen and raloxifene, have been shown in randomized clinical trials to reduce the risk of developing primary invasive breast cancer (IBC) in high-risk women. In 1998, the U.S. Food and Drug Administration (FDA) used these studies as a basis for approving tamoxifen for primary breast chemoprevention in both premenopausal and postmenopausal women at high risk. In 2007, the FDA approved raloxifene for primary breast cancer chemoprevention for postmenopausal women. METHODS: Data from the year 2010 National Health Interview Survey (NHIS) were analyzed to estimate the prevalence of tamoxifen and raloxifene use for chemoprevention of primary breast cancers among U.S. women. RESULTS: Prevalence of use of chemopreventive agents for primary tumors was 20,598 (95% CI, 518–114,864) for U.S. women aged 35 to 79 for tamoxifen. Prevalence was 96,890 (95% CI, 41,277–192,391) for U.S. women aged 50 to79 for raloxifene. CONCLUSION: Use of tamoxifen and raloxifene for prevention of primary breast cancers continues to be low. In 2010, women reporting medication use for breast cancer chemoprevention were primarily using the more recently FDA-approved drug raloxifene. Multiple possible explanations for the low use exist, including lack of awareness and/or concern about side effects among primary care physicians and patients

    Survey of the needs of patients with spinal cord injury: impact and priority for improvement in hand function in tetraplegics\ud

    Get PDF
    Objective: To investigate the impact of upper extremity deficit in subjects with tetraplegia.\ud \ud Setting: The United Kingdom and The Netherlands.\ud \ud Study design: Survey among the members of the Dutch and UK Spinal Cord Injury (SCI) Associations.\ud \ud Main outcome parameter: Indication of expected improvement in quality of life (QOL) on a 5-point scale in relation to improvement in hand function and seven other SCI-related impairments.\ud \ud Results: In all, 565 subjects with tetraplegia returned the questionnaire (overall response of 42%). Results in the Dutch and the UK group were comparable. A total of 77% of the tetraplegics expected an important or very important improvement in QOL if their hand function improved. This is comparable to their expectations with regard to improvement in bladder and bowel function. All other items were scored lower.\ud \ud Conclusion: This is the first study in which the impact of upper extremity impairment has been assessed in a large sample of tetraplegic subjects and compared to other SCI-related impairments that have a major impact on the life of subjects with SCI. The present study indicates a high impact as well as a high priority for improvement in hand function in tetraplegics.\ud \u

    'Mutations in LAMB2 associate with albuminuria and Optic Nerve Hypoplasia with Hypopituitarism'

    Get PDF
    CONTEXT: Mutations in LAMB2, encoding the basement membrane protein, laminin β2, are associated with an autosomal recessive disorder characterized by congenital nephrotic syndrome, ocular abnormalities and neurodevelopmental delay (Pierson Syndrome). CASE DESCRIPTION: This report describes a twelve year old boy with short stature, visual impairment and developmental delay who presented with macroscopic haematuria and albuminuria. He had isolated growth hormone deficiency, optic nerve hypoplasia and a small anterior pituitary with corpus callosum dysgenesis on his cranial MRI, thereby supporting a diagnosis of optic nerve hypoplasia syndrome. Renal histopathology revealed focal segmental glomerulosclerosis. Using next generation sequencing on a targeted gene panel for steroid resistant nephrotic syndrome, compound heterozygous missense mutations were identified in LAMB2 [c.737G>A p.Arg246Gln, c.3982G>C p.Gly1328Arg]. Immunohistochemical analysis revealed reduced glomerular laminin β2 expression compared to control kidney and a thin basement membrane on electron microscopy. Laminin β2 is expressed during pituitary development and Lamb2-/- mice exhibit stunted growth, abnormal neural retinae and here, we show, abnormal parenchyma of the anterior pituitary gland. CONCLUSION: We propose that patients with genetically undefined optic nerve hypoplasia syndrome should be screened for albuminuria and if present, screened for mutations in LAMB2

    Unbounded Hierarchical Identity-Based Encryption with Efficient Revocation

    Get PDF
    Hierarchical identity-based encryption (HIBE) is an extension of identity-based encryption (IBE) where an identity of a user is organized as a hierarchical structure and a user can delegate the private key generation to another user. Providing a revocation mechanism for HIBE is highly necessary to keep a system securely. Revocable HIBE (RHIBE) is an HIBE scheme that can revoke a user\u27s private key if his credential is expired or revealed. In this paper, we first propose an unbounded HIBE scheme where the maximum hierarchy depth is not limited and prove its selective security under a q-type assumption. Next, we propose an efficient unbounded RHIBE scheme by combining our unbounded HIBE scheme and a binary tree structure, and then we prove its selective security. By presenting the unbounded RHIBE scheme, we solve the open problem of Seo and Emura in CT-RSA 2015

    Adoption and use of social media among public health departments

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Effective communication is a critical function within any public health system. Social media has enhanced communication between individuals and organizations and has the potential to augment public health communication. However, there is a lack of reported data on social media adoption within public health settings. The purposes of this study were to assess: 1) the extent to which state public health departments (SHDs) are using social media; 2) which social media applications are used most often; and 3) how often social media is used interactively to engage audiences.</p> <p>Methods</p> <p>This was a non-experimental, cross sectional study of SHD social media sites. Screen capture software Snag-It<sup>® </sup>was used to obtain screenshots of SHD social media sites across five applications. These sites were coded for social media presence, interactivity, reach, and topic.</p> <p>Results</p> <p>Sixty percent of SHDs reported using at least one social media application. Of these, 86.7% had a Twitter account, 56% a Facebook account, and 43% a YouTube channel. There was a statistically significant difference between average population density and use of social media (p = .01). On average, SHDs made one post per day on social media sites, and this was primarily to distribute information; there was very little interaction with audiences. SHDs have few followers or friends on their social media sites. The most common topics for posts and tweets related to staying healthy and diseases and conditions. Limitations include the absence of a standard by which social media metrics measure presence, reach, or interactivity; SHDs were only included if they had an institutionally maintained account; and the study was cross sectional.</p> <p>Conclusions</p> <p>Social media use by public health agencies is in the early adoption stage. However, the reach of social media is limited. SHDs are using social media as a channel to distribute information rather than capitalizing on the interactivity available to create conversations and engage with the audience. If public health agencies are to effectively use social media then they must develop a strategic communication plan that incorporates best practices for expanding reach and fostering interactivity and engagement.</p

    Simultaneous disruption of two DNA polymerases, Polη and Polζ, in Avian DT40 cells unmasks the role of Polη in cellular response to various DNA lesions

    Get PDF
    Replicative DNA polymerases are frequently stalled by DNA lesions. The resulting replication blockage is released by homologous recombination (HR) and translesion DNA synthesis (TLS). TLS employs specialized TLS polymerases to bypass DNA lesions. We provide striking in vivo evidence of the cooperation between DNA polymerase η, which is mutated in the variant form of the cancer predisposition disorder xeroderma pigmentosum (XP-V), and DNA polymerase ζ by generating POLη−/−/POLζ−/− cells from the chicken DT40 cell line. POLζ−/− cells are hypersensitive to a very wide range of DNA damaging agents, whereas XP-V cells exhibit moderate sensitivity to ultraviolet light (UV) only in the presence of caffeine treatment and exhibit no significant sensitivity to any other damaging agents. It is therefore widely believed that Polη plays a very specific role in cellular tolerance to UV-induced DNA damage. The evidence we present challenges this assumption. The phenotypic analysis of POLη−/−/POLζ−/− cells shows that, unexpectedly, the loss of Polη significantly rescued all mutant phenotypes of POLζ−/− cells and results in the restoration of the DNA damage tolerance by a backup pathway including HR. Taken together, Polη contributes to a much wide range of TLS events than had been predicted by the phenotype of XP-V cells

    Predicate Encryption for Circuits from LWE

    Get PDF
    In predicate encryption, a ciphertext is associated with descriptive attribute values x in addition to a plaintext μ, and a secret key is associated with a predicate f. Decryption returns plaintext μ if and only if f(x)=1. Moreover, security of predicate encryption guarantees that an adversary learns nothing about the attribute x or the plaintext μ from a ciphertext, given arbitrary many secret keys that are not authorized to decrypt the ciphertext individually. We construct a leveled predicate encryption scheme for all circuits, assuming the hardness of the subexponential learning with errors (LWE) problem. That is, for any polynomial function d=d(λ), we construct a predicate encryption scheme for the class of all circuits with depth bounded by d(λ), where λ is the security parameter.Microsoft Corporation (PhD Fellowship)Northrop Grumman Cybersecurity Research ConsortiumUnited States. Defense Advanced Research Projects Agency (Grant FA8750-11-2-0225)National Science Foundation (U.S.) (Awards CNS-1350619)National Science Foundation (U.S.) (Awards CNS-1413920)Alfred P. Sloan Foundation (Fellowship)Microsoft (Faculty Fellowship

    Dual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size Circuits

    Get PDF
    We propose a new generic framework for constructing fully secure attribute based encryption (ABE) in multilinear settings. It is applicable in a generic manner to any predicates. Previous generic frameworks of this kind are given only in bilinear group settings, where applicable predicate classes are limited. Our framework provides an abstraction of dual system paradigms over composite-order graded multilinear encoding schemes in a black-box manner. As applications, we propose new fully secure ABE systems for general predicates, namely, ABE for circuits. We obtain two schemes for each of key-policy (KP) and ciphertext-policy (CP) variants of ABE. All of our four fully secure schemes can deal with unbounded-size circuits, while enjoy succinctness, meaning that the key and ciphertext sizes are (less than or) proportional to corresponding circuit sizes. In the CP-ABE case, no scheme ever achieves such properties, even when considering selectively secure systems. Furthermore, our second KP-ABE achieves constant-size ciphertexts, whereas our second CP-ABE achieves constant-size keys. Previous ABE systems for circuits are either selectively secure (Gorbunov et al. STOC\u2713, Garg et al. Crypto\u2713, and subsequent works), or semi-adaptively secure (Brakerski and Vaikuntanathan Crypto\u2716), or fully-secure but not succinct and restricted to bounded-size circuits (Garg et al. ePrint 2014/622, and Garg et al. TCC\u2716-A)

    Does publication bias inflate the apparent efficacy of psychological treatment for major depressive disorder? A systematic review and meta-analysis of US national institutes of health-funded trials

    Get PDF
    Background The efficacy of antidepressant medication has been shown empirically to be overestimated due to publication bias, but this has only been inferred statistically with regard to psychological treatment for depression. We assessed directly the extent of study publication bias in trials examining the efficacy of psychological treatment for depression. Methods and Findings We identified US National Institutes of Health grants awarded to fund randomized clinical trials comparing psychological treatment to control conditions or other treatments in patients diagnosed with major depressive disorder for the period 1972–2008, and we determined whether those grants led to publications. For studies that were not published, data were requested from investigators and included in the meta-analyses. Thirteen (23.6%) of the 55 funded grants that began trials did not result in publications, and two others never started. Among comparisons to control conditions, adding unpublished studies (Hedges’ g = 0.20; CI95% -0.11~0.51; k = 6) to published studies (g = 0.52; 0.37~0.68; k = 20) reduced the psychotherapy effect size point estimate (g = 0.39; 0.08~0.70) by 25%. Moreover, these findings may overestimate the "true" effect of psychological treatment for depression as outcome reporting bias could not be examined quantitatively. Conclusion The efficacy of psychological interventions for depression has been overestimated in the published literature, just as it has been for pharmacotherapy. Both are efficacious but not to the extent that the published literature would suggest. Funding agencies and journals should archive both original protocols and raw data from treatment trials to allow the detection and correction of outcome reporting bias. Clinicians, guidelines developers, and decision makers should be aware that the published literature overestimates the effects of the predominant treatments for depression
    corecore