1,611 research outputs found

    Dissection of α6β4 Integrin-Dependent Signaling and Breast Carcinoma Invasion: A Dissertation

    Get PDF
    Breast cancer is one of the most prevalent cancers in the world. Each year, over 400,000 women die from breast cancer world wide and metastasis is the main cause of their mortality. Tumor cell invasion into the adjacent tissue is the first step in the multistep process of cancer metastasis and it involves multiple protein changes. The α6β4 integrin, a transmembrane heterodimeric laminin receptor is associated with poor prognosis in many tumor types, including breast cancer. Src family kinase (SFK) activity is elevated in many cancers and this activity also correlates with invasive tumor behavior. The α6β4 integrin can stimulate SFK activation and promote cancer invasion, however the mechanism by which it does so is not known. In the current study, I provide novel mechanistic insight into how the α6β4 integrin selectively activates the Src family kinase member Fyn in response to receptor engagement. Specifically, the tyrosine phosphatase SHP2 is recruited to α6β4 and its catalytic activity is stimulated through a specific interaction of its N-terminal SH2 domain with pY1494 in the β4 subunit. Importantly, both catalytic and non-catalytic functions of SHP2 are required for Fyn activation by α6β4. Fyn is recruited to the α6β4/SHP2 complex through an interaction with phospho-Y580 in the C-terminus of SHP2. In addition to activating Fyn, this interaction with Y580-SHP2 localizes Fyn to sites of receptor engagement, which is required for α6β4-dependent invasion. Moreover, the selective activation of Fyn, but not Src, requires the palmitoylation modification of Fyn on its N-terminus. Of clinical relevance, phospho-Y580-SHP2 and phospho-Y418-SFK could be used as potential biomarkers of invasive breast cancer because their expression are elevated in high-grade breast tumors

    5-(3-Chloro­phen­yl)-2-phenyl-3,4-dihydro-2H-pyrrole

    Get PDF
    In the title compound, C16H14ClN, the conformation of the five-membered ring approximates to an envelope with a C atom as the flap. The dihedral angle between the aromatic rings is 78.71 (9)°

    Analysis of an enhanced random forest algorithm for identifying encrypted network traffic

    Get PDF
    The focus of this paper is to apply an improved machine learning algorithm to realize the efficient and reliable identification and classification of network communication encrypted traffic, and to solve the challenges faced by traditional algorithms in analyzing encrypted traffic after adding encryption protocols. In this study, an enhanced random forest (ERF) algorithm is introduced to optimize the accuracy and efficiency of the identification and classification of encrypted network traffic. Compared with traditional methods, it aims to improve the identification ability of encrypted traffic and fill the knowledge gap in this field. Using the publicly available datasets and preprocessing the original PCAP format packets, the optimal combination of the relevant parameters of the tree was determined by grid search cross-validation, and the experimental results were evaluated in terms of performance using accuracy, precision, recall and F1 score, which showed that the average precision was more than 98 %, and that compared with the traditional algorithm, the error rate of the traffic test set was reduced, and the data of each performance evaluation index were better, which It shows that the advantages of the improved algorithm are obvious. In the experiment, the enhanced random forest and traditional random forest models were trained and tested on a series of data sets and the corresponding test errors were listed as the basis for judging the model quality. The experimental results show that the enhanced algorithm has good competitiveness. These findings have implications for cybersecurity professionals, researchers, and organizations, providing a practical solution to enhance threat detection and data privacy in the face of evolving encryption technologies. This study provides valuable insights for practitioners and decision-makers in the cybersecurity fiel
    corecore