52 research outputs found

    Knowledge atlas of antibody-drug conjugates on CiteSpace and clinical trial visualization analysis

    Get PDF
    ObjectiveAntibody-drugs conjugates (ADCs) are novel drugs with highly targeted and tumor-killing abilities and developing rapidly. This study aimed to evaluate drug discovery and clinical trials of and explore the hotspots and frontiers from 2012 to 2022 using bibliometric methods.MethodsPublications on ADCs were retrieved between 2012 and 2022 from Web of Science (WoS) and analyzed with CiteSpace 6.1.R2 software for the time, region, journals, institutions, etc. Clinical trials were downloaded from clinical trial.org and visualized with Excel software.ResultsA total of 696 publications were obtained and 187 drug trials were retrieved. Since 2012, research on ADCs has increased year by year. Since 2020, ADC-related research has increased dramatically, with the number of relevant annual publications exceeding 100 for the first time. The United States is the most authoritative and superior country and region in the field of ADCs. The University of Texas MD Anderson Cancer Center is the most authoritative institution in this field. Research on ADCs includes two clinical trials and one review, which are the most influential references. Clinical trials of ADCs are currently focused on phase I and phase II. Comprehensive statistics and analysis of the published literature and clinical trials in the field of ADCs, have shown that the most studied drug is brentuximab vedotin (BV), the most popular target is human epidermal growth factor receptor 2 (HER2), and breast cancer may become the main trend and hotspot for ADCs indications in recent years.ConclusionAntibody-drug conjugates have become the focus of targeted therapies in the field of oncology. The innovation of technology and combination application strategy will become the main trend and hotspots in the future

    Genetic and Functional Dissection of HTRA1 and LOC387715 in Age-Related Macular Degeneration

    Get PDF
    A common haplotype on 10q26 influences the risk of age-related macular degeneration (AMD) and encompasses two genes, LOC387715 and HTRA1. Recent data have suggested that loss of LOC387715, mediated by an insertion/deletion (in/del) that destabilizes its message, is causally related with the disorder. Here we show that loss of LOC387715 is insufficient to explain AMD susceptibility, since a nonsense mutation (R38X) in this gene that leads to loss of its message resides in a protective haplotype. At the same time, the common disease haplotype tagged by the in/del and rs11200638 has an effect on the transcriptional upregulation of the adjacent gene, HTRA1. These data implicate increased HTRA1 expression in the pathogenesis of AMD and highlight the importance of exploring multiple functional consequences of alleles in haplotypes that confer susceptibility to complex traits

    Ground state solutions for an asymptotically linear diffusion system

    No full text
    This article concerns the diffusion system \displaylines{ \partial_tu-\Delta_{x}u+V(x)u=g(t,x,v),\cr -\partial_tv-\Delta_{x}v+V(x)v=f(t,x,u), } where z=(u,v):R×RN→R2z=(u,v): \mathbb{R}\times \mathbb{R}^N\to \mathbb{R}^2, V(x)∈C(RN,R)V(x)\in C(\mathbb{R}^N,\mathbb{R}) is a general periodic function, g, f are periodic in t, x and asymptotically linear in u, v at infinity. We find a minimizing Cerami sequence of the energy functional outside the Nehari-Pankov manifold N\mathcal{N} and therefore obtain ground state solutions

    Closure System and Its Semantics

    No full text
    It is well known that topological spaces are axiomatically characterized by the topological closure operator satisfying the Kuratowski Closure Axioms. Equivalently, they can be axiomatized by other set operators encoding primitive semantics of topology, such as interior operator, exterior operator, boundary operator, or derived-set operator (or dually, co-derived-set operator). It is also known that a topological closure operator (and dually, a topological interior operator) can be weakened into generalized closure (interior) systems. What about boundary operator, exterior operator, and derived-set (and co-derived-set) operator in the weakened systems? Our paper completely answers this question by showing that the above six set operators can all be weakened (from their topological counterparts) in an appropriate way such that their inter-relationships remain essentially the same as in topological systems. Moreover, we show that the semantics of an interior point, an exterior point, a boundary point, an accumulation point, a co-accumulation point, an isolated point, a repelling point, etc. with respect to a given set, can be extended to an arbitrary subset system simply by treating the subset system as a base of a generalized interior system (and hence its dual, a generalized closure system). This allows us to extend topological semantics, namely the characterization of points with respect to an arbitrary set, in terms of both its spatial relations (interior, exterior, or boundary) and its dynamic convergence of any sequence (accumulation, co-accumulation, and isolation), to much weakened systems and hence with wider applicability. Examples from the theory of matroid and of Knowledge/Learning Spaces are used as an illustration

    Scale transformation of place brands : a visual study of Xinhepu, Guangzhou

    No full text
    Place branding has become a popular strategy to promote place visibility and place image communication and gains attention in the field of city planning, geography, and place management. The contribution of geographical knowledge has been emphasized and discussed in recent place branding studies, including the role of geographical scale in branding strategies and management. However, current research mainly places the issues of scale from the top-down perspective of branding governance, and the bottom-up processes based on local culture and embodied experiences are overlooked. Drawing on participatory-based visual methodology, in the article, a combination of self-directed photography, photo evaluation, eye-tracking experiment, and interview are employed to the scale transformation performance of place brands from the perspective of embodied experience. Taking Xinhepu in Guangzhou, China as a case study, the results show that both residents and nonresidents do not limit their perception of the Xinhepu brand to a microscale space but point to the city of Guangzhou. Specifically, the process of scale transformation of place brands is characterized by the interaction of temporal and spatial factors that provide possibilities for scale transformation. The physical landscape in space plays a role in place branding, while in time scale, Xinhepu connects Guangzhou's past and present and is a microcosm of the city's image and historical development; thus, in people's embodied perception, Xinhepu can be transformed into a city brand through place culture creation. The article can provide a new explanation for the construction of place branding at multiple geographical scales and explore how the body's unconscious, nonrepresentational rhythms play a role in place brand scale transformation.Peer reviewe

    Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage

    No full text
    Public-key encryption with keyword search (PEKS) enables users to search over encrypted data and retrieve target data efficiently. However, most of existing PEKS schemes are vulnerable to adversaries equipped with quantum computers in the near future, and even incur complex certificate management procedures due to the public key infrastructure (PKI). To this end, we propose a proxy-oriented identity-based encryption with keyword search (PO-IBEKS) scheme from lattices for cloud storage, which is post-quantum secure. In PO-IBEKS, an original data owner authorizes a proxy to encrypt sensitive data as well as corresponding keywords and upload ciphertexts to clouds, which alleviates the data processing burden on the original data owner. Besides, PO-IBEKS can resist inside keyword guessing attacks (IKGA) from misbehaved cloud servers by integrating the learning with errors (LWE) encryption and preimage sampleable function. Each entity in PO-IBEKS is identified with her/his recognizable information, thereby eliminating managing certificates. Formal security analysis proves that PO-IBEKS can achieve ciphertext indistinguishability, existential unforgeability, and delegation security. Experimental results demonstrate PO-IBEKS is much more practical when compared with existing schemes.Accepted versio

    LIP-PA: A Logistics Information Privacy Protection Scheme with Position and Attribute-Based Access Control on Mobile Devices

    No full text
    With the fast development of Logistics Internet of Things and smart devices, the security of express information processed by mobile devices in Logistics Internet of Things has attracted much attention. However, the existing secure express schemes only focus on privacy protection of personal information but do not consider the security of the logistics information against couriers with malicious mobile devices. For example, a privacy-preserving delivery path should be required in order to prevent the privacy leakage in the express delivery procedure. Therefore, besides the security of personal information, the privacy protection of logistics information and authentication of mobile devices used in express company are important to security in Logistics Internet of Things. In this paper, we propose a secure logistics information scheme LIP-PA to provide privacy protection of both personal information and logistics information. First, we define the basic requirements of Logistics Internet of Things. Then, using attribute-based encryption and position-based key exchange, we propose a logistics information privacy protection scheme with position and attribute-based access control for mobile devices. The analysis results show that our scheme satisfies the defined requirements. Finally, the performance of our scheme is evaluated and the experiment results show that our scheme is efficient and feasible for mobile devices in real parcel delivery scenario
    • …
    corecore