29 research outputs found

    Bioavailability and Metabolic Pathway of Phenolic Compounds

    Get PDF
    As potential agents for preventing different oxidative stress-related diseases, phenolic compounds have attracted increasing attention with the passage of time. Intake of fruits, vegetables and cereals in higher quantities is linked with decreased chances of chronic diseases. In plant-based foods, phenolic compounds are very abundant. However, bio-accessibility and biotransformation of phenolic compound are not reviewed in these studies; therefore, a detailed action mechanism of phenolic compounds is not recognized. In this article, inclusive concept of different factors affecting the bioavailability of phenolic compounds and their metabolic processes is presented through which phenolic compounds go after ingestion

    A Novel Construction of Substitution Box Involving Coset Diagram and a Bijective Map

    Get PDF
    The substitution box is a basic tool to convert the plaintext into an enciphered format. In this paper, we use coset diagram for the action of PSL(2,Z) on projective line over the finite field GF29 to construct proposed S-box. The vertices of the cost diagram are elements of GF29 which can be represented by powers of α, where α is the root of irreducible polynomial px=x9+x4+1 over Z2. Let GF⁎29 denote the elements of GF29 which are of the form of even powers of α. In the first step, we construct a 16×16 matrix with the elements of GF⁎29 in a specific order, determined by the coset diagram. Next, we consider h:GF⁎29⟶GF28 defined by hα2n=ωn to destroy the structure of GF28. In the last step, we apply a bijective map g on each element of the matrix to evolve proposed S-box. The ability of the proposed S-box is examined by different available algebraic and statistical analyses. The results are then compared with the familiar S-boxes. We get encouraging statistics of the proposed box after comparison

    Construction of nonlinear component of block cipher using coset graph

    Get PDF
    In recent times, the research community has shown interest in information security due to the increasing usage of internet-based mobile and web applications. This research presents a novel approach to constructing the nonlinear component or Substitution Box (S-box) of block ciphers by employing coset graphs over the Galois field. Cryptographic techniques are employed to enhance data security and address current security concerns and obstacles with ease. Nonlinear component is a keystone of cryptography that hides the association between plaintext and cipher-text. Cryptographic strength of nonlinear component is directly proportional to the data security provided by the cipher. This research aims to develop a novel approach for construction of dynamic S-boxes or nonlinear components by employing special linear group PSL(2,Z) PSL(2, \mathbb{Z}) over the Galois Field GF(210) GF\left({2}^{10}\right) . The vertices of coset diagram belong to GF(210) GF\left({2}^{10}\right) and can be expressed as powers of α, where α represents the root of an irreducible polynomial p(x)=x10+x3+1 p\left(x\right) = {x}^{10}+{x}^{3}+1 . We constructed several nonlinear components by using GF(210) {GF}^{*}\left({2}^{10}\right) . Furthermore, we have introduced an exceptionally effective algorithm for optimizing nonlinearity, which significantly enhances the cryptographic properties of the nonlinear component. This algorithm leverages advanced techniques to systematically search for and select optimal S-box designs that exhibit improved resistance against various cryptographic attacks

    Papillary Renal Cell Carcinoma: Demographics, Survival Analysis, Racial Disparities, and Genomic Landscape

    Get PDF
    Papillary renal cell carcinoma (PRCC) is the second most common histological subtype of renal cell cancer. This research aims to present a large database study highlighting the demographic, clinical, and pathological factors, racial disparities, prognosis, and survival of PRCC. The clinical and demographic data were extracted from the Surveillance, Epidemiology, and End Results (SEER) database, and molecular data was cured from the Catalogue Of Somatic Mutations in Cancer (COSMIC) database. PRCC had a median age of diagnosis at 64 years, with a higher incidence in men (77%), and Whites (68%). 70.3% of cases were Grades I–IV (13, 53, 31, and 3%, respectively). In patients with known data, 85% were localized to the kidney, and 84% of cases were 7 cm in size. No metastasis occurred in 97% of the known data. The most common treatment offered was surgical resection (9%). The 5-year overall survival was 79%, with patients undergoing surgery having a 90.6% 5-year survival. Multivariable analysis revealed age > 60 years, Black race, poor histologic differentiation, distant metastases, and tumor size > 10 cm as independent risk factors for mortality. The most common mutations identified from the COSMIC database were MET, KMT2D, KMT2C, ARID1A, and SPEN. PRCC affects male individuals in the sixth decade of life. Increased age, Black race, distant metastases, and tumors > 10 cm are associated with a worse prognosis. Surgical resection offers a favorable survival outcome. Next-generation sequencing (NGS) could identify potentially targetable alterations and future personalized therapeutic approaches

    Effects of antibiotic resistance, drug target attainment, bacterial pathogenicity and virulence, and antibiotic access and affordability on outcomes in neonatal sepsis: an international microbiology and drug evaluation prospective substudy (BARNARDS)

    Get PDF
    Background Sepsis is a major contributor to neonatal mortality, particularly in low-income and middle-income countries (LMICs). WHO advocates ampicillin–gentamicin as first-line therapy for the management of neonatal sepsis. In the BARNARDS observational cohort study of neonatal sepsis and antimicrobial resistance in LMICs, common sepsis pathogens were characterised via whole genome sequencing (WGS) and antimicrobial resistance profiles. In this substudy of BARNARDS, we aimed to assess the use and efficacy of empirical antibiotic therapies commonly used in LMICs for neonatal sepsis. Methods In BARNARDS, consenting mother–neonates aged 0–60 days dyads were enrolled on delivery or neonatal presentation with suspected sepsis at 12 BARNARDS clinical sites in Bangladesh, Ethiopia, India, Pakistan, Nigeria, Rwanda, and South Africa. Stillborn babies were excluded from the study. Blood samples were collected from neonates presenting with clinical signs of sepsis, and WGS and minimum inhibitory concentrations for antibiotic treatment were determined for bacterial isolates from culture-confirmed sepsis. Neonatal outcome data were collected following enrolment until 60 days of life. Antibiotic usage and neonatal outcome data were assessed. Survival analyses were adjusted to take into account potential clinical confounding variables related to the birth and pathogen. Additionally, resistance profiles, pharmacokinetic–pharmacodynamic probability of target attainment, and frequency of resistance (ie, resistance defined by in-vitro growth of isolates when challenged by antibiotics) were assessed. Questionnaires on health structures and antibiotic costs evaluated accessibility and affordability. Findings Between Nov 12, 2015, and Feb 1, 2018, 36 285 neonates were enrolled into the main BARNARDS study, of whom 9874 had clinically diagnosed sepsis and 5749 had available antibiotic data. The four most commonly prescribed antibiotic combinations given to 4451 neonates (77·42%) of 5749 were ampicillin–gentamicin, ceftazidime–amikacin, piperacillin–tazobactam–amikacin, and amoxicillin clavulanate–amikacin. This dataset assessed 476 prescriptions for 442 neonates treated with one of these antibiotic combinations with WGS data (all BARNARDS countries were represented in this subset except India). Multiple pathogens were isolated, totalling 457 isolates. Reported mortality was lower for neonates treated with ceftazidime–amikacin than for neonates treated with ampicillin–gentamicin (hazard ratio [adjusted for clinical variables considered potential confounders to outcomes] 0·32, 95% CI 0·14–0·72; p=0·0060). Of 390 Gram-negative isolates, 379 (97·2%) were resistant to ampicillin and 274 (70·3%) were resistant to gentamicin. Susceptibility of Gram-negative isolates to at least one antibiotic in a treatment combination was noted in 111 (28·5%) to ampicillin–gentamicin; 286 (73·3%) to amoxicillin clavulanate–amikacin; 301 (77·2%) to ceftazidime–amikacin; and 312 (80·0%) to piperacillin–tazobactam–amikacin. A probability of target attainment of 80% or more was noted in 26 neonates (33·7% [SD 0·59]) of 78 with ampicillin–gentamicin; 15 (68·0% [3·84]) of 27 with amoxicillin clavulanate–amikacin; 93 (92·7% [0·24]) of 109 with ceftazidime–amikacin; and 70 (85·3% [0·47]) of 76 with piperacillin–tazobactam–amikacin. However, antibiotic and country effects could not be distinguished. Frequency of resistance was recorded most frequently with fosfomycin (in 78 isolates [68·4%] of 114), followed by colistin (55 isolates [57·3%] of 96), and gentamicin (62 isolates [53·0%] of 117). Sites in six of the seven countries (excluding South Africa) stated that the cost of antibiotics would influence treatment of neonatal sepsis

    A Novel Technique for the Construction of Safe Substitution Boxes Based on Cyclic and Symmetric Groups

    No full text
    In the literature, different algebraic techniques have been applied on Galois field GF(28) to construct substitution boxes. In this paper, instead of Galois field GF(28), we use a cyclic group C255 in the formation of proposed substitution box. The construction proposed S-box involves three simple steps. In the first step, we introduce a special type of transformation T of order 255 to generate C255. Next, we adjoin 0 to C255 and write the elements of C255∪0 in 16×16 matrix to destroy the initial sequence 0,1,2,…,255. In the 2nd step, the randomness in the data is increased by applying certain permutations of the symmetric group S16 on rows and columns of the matrix. In the last step we consider the symmetric group S256, and positions of the elements of the matrix obtained in step 2 are changed by its certain permutations to construct the suggested S-box. The strength of our S-box to work against cryptanalysis is checked through various tests. The results are then compared with the famous S-boxes. The comparison shows that the ability of our S-box to create confusion is better than most of the famous S-boxes

    An analytical review of current S-box design methodologies, performance evaluation criteria, and major challenges

    No full text
    The expansion of worldwide networking has created new possibilities for management, development, and presentation in the form of digital data. The uncomplicated accessibility to digital resources i.e., internet banking, electronic advertising, digital marketing, and libraries has resulted in grave security concerns. Consequently, rapid use of digital information and technology, security of digital transactions is a big concern. Although many data security solutions exist, still they need further improvement. In symmetric cryptography, the strength of a Substitution Box (S-box) assures the strength of block ciphers. S-box is a critical nonlinear element of cryptosystem that creates turmoil in transactions. This study aims to formulate a variety of methodologies to measure the effectiveness of an S-box against linear and differential algebraic attacks. These malicious attacks may disrupt and leak confidential information. Therefore, a comparative analysis is presented to understand the S-box construction methodologies, key characteristics of eminent S-boxes, major challenges, and their weak cryptographic properties. S-box is considered to be secure if it meets a number of criteria, i.e., maximum linear probability, bijection, nonlinearity, input/output XOR distribution, bit independence criterion, and strict avalanche criterion. These criteria are analyzed in detail to evaluate the performance, reliability, and effectiveness of S-box

    Design and optimization of nonlinear component of block cipher: Applications to multimedia security

    No full text
    Nowadays, various image encryption schemes based on chaotic systems have been developed, each of them has its own limitations and strength in terms of security and computational speed. The proposed image encryption scheme utilizes 2-D maps without disturbing their mathematical structure, characterized by topological features such as chaotic behavior and fractal properties, namely the Zaslavasky, Bakers, and Henon Maps. This approach utilizes both confusion and diffusion stages to achieve high levels of security against various attacks. The confusion stage utilizes chaotic values to muddle the rows and columns of the image, reducing the correlations between neighboring pixels, while the diffusion step achieves the avalanche effect with 2D Bakers map and Henon map. The proposed image encryption scheme is analyzed thoroughly to evaluate its security and performance. To evaluate the security and computational efficiency of the proposed image encryption method, various analysis such as correlation, contrast, entropy, energy, homogeneity, and performance analyses are conducted. Moreover, the three proposed S-boxes are also tested to evaluate their effectiveness using cryptographic analysis tests such as nonlinearity, strict Avalanche criterion, differential probability, linear probability, and bit independence criterion, which we also utilized in our proposed image encryption scheme
    corecore