572 research outputs found

    Molecular characterization of TGF-β mediated cancer cell proliferation

    Get PDF
    TGF-β inhibits epithelial cell growth through Smad-dependent induction of a cell cycle arrest at G1. During tumor progression, however, many tumor cells escape from TGF-β growth suppression due to either functional or genetic disruption of the Smad signaling pathway. In late tumor stages, TGF-β stimulates tumor cell proliferation through increased cell cycle transition. Although this cellular event is clearly established, the molecular mechanisms underlying this phenomenon remain unknown. Here, we show that TGF-β stimulation induces cancer cell proliferation via accelerated G1/S phase transition. We show that cell proliferation requires induction of the c-Myc oncogene, and this is paralleled by upregulation of D-type cyclins and their corresponding CdKs. TGF-β induces c-Myc expression on the level of promoter regulation through induction of the c-Myc/TIE element, which has previously been reported as the core element for repression of c-Myc in growth inhibited cells. Mechanistically, TGF-β induces c-Myc promoter activation through the calcium responsive NFAT transcription factor family. We show that TGF-β induces expression and subsequent nuclear accumulation of NFATc1 and NFATc2 in cancer cells. NFAT proteins then bind to and displace Smad repressor complexes from the c-Myc/TIE to induce the c-Myc promoter transactivation and expression. c-Myc induction, on the other hand, is essential for subsequent cyclin upregulation and stimulation of G1/S phase transition in cancer. Thus, this study uncovers a key signaling and transcription pathway in TGF-β growth stimulation and identifies the NFAT transcription factor family as essential mediators of this function. From the medical point of view this study not only help to better understand the mechanisms underlying TGF-β growth promotion in cancer, but also provide a platform for novel options in the treatment of pancreatic cancer. In fact, recent approaches led to the identification of novel and interesting molecules that target the NFAT pathway more specifically in tumor cells. Future studies will show whether specific targeting of the NFAT system in tumor cells is a promising new strategy in the treatment of pancreatic cancer and in particular in those with high levels of TGF-β

    A New Method of Constructing SRGD & Resolvable SRGD Designs

    Get PDF
    In this paper some methods of construction of certain SRGD designs are described. These designs have been constructed by making use of known self complementary  balanced incomplete block (BIB) designs.A series of resolvable SRGD designs is also obtained here. Designs  constructed in this paper  are  not listed in the existing lists of the available tables of these designs. Keywords:Block design , incidence matrix , BIBD , self complementary BIBD design  , semi-regular group divisible design  , resolvable SRGD design

    A SERVER HARDENING FRAMEWORK

    Get PDF
    There have been several attempts at  improving the security of servers in all the fields be it web servers like apache tomcat ,mail servers like wamp etc. Checklists have been made for different servers from time to time which contains a list of steps that have to be followed in order to improve the security of the particular server. So the user has to have all the basic knowledge about the server before he can make use of the checklist and secure the server. This is the first problem that the user has to be well versed in the basic technicalities of the server configuration before he can secure it for use. Secondly ,till now there is no tool or framework that can bring all the different types of servers together under it so that a single framework can be used to harden or secure multiple number of servers and without any knowledge about the basic configuration of the servers. Hence, we propose to automate the server hardening process by creating a Framework which will be open source and hence new servers could be included in it by users by editing the open source code of the framework which would be in python language. A server hardening framework would help even a person with a layman understanding to secure the server which he is using. He would be able to use the framework for hardening a multiple types of servers as per his requirements. The Framework will provide an option of AUDITING as well as HARDENING. If the User chooses the AUDITING option , then the parameters of the server configuration file would be displayed along with the current values as well as it would be mentioned additionally for the parameters if a particular parameter requires hardening and again the user would be asked if he wants to harden it or not. In case of choosing hardening, the server configuration file would be replaced by hardened file and server be restarted

    Achievement Motivation in relation to Academic achievement of High School students of Working and Non working mothers

    Get PDF
    The findings of the present study would be a great help to teachers, educational administrators, educational planner and policy makers and counselors.  The casual factor of achievement motivation available among different subject group students would help the teachers, policy makers and administrators to redesign their course contents and learning activities in accordance with their motivational levels.  The results of achievement motivation and academic achievement of students in this study demands that teaching has to be made more meaningful and interesting in our schools.  A teacher should use an appropriate method of presenting the subject matter for sustaining the motivation of learners for long.  The findings of the study put a pressure on the administrator of schools to start guidance and counseling service in high schools

    Artificial Immune System Approach for Multi Objective Optimization

    Get PDF
    This paper presents a modified Artificial Immune System based approach to solve multi objective optimization problems. The main objective of the solution of multi objective optimization problem is to help a human decision maker in taking his/her decision for finding the most preferred solution as the final result. This artificial immune system algorithm makes use of mechanism inspired by vertebrate immune system and clonal selection principle. In the present model crossover mechanism is integrated into traditional artificial immune system algorithm based on clonal selection theory. The Algorithm is proposed with real parameters value not binary coded parameters. Only non dominated individual and feasible best antibodies will add to the memory set.  This algorithm will be used to solve various real life engineering multi-objective optimization problems. The attraction for choosing the artificial immune system to develop algorithm was that if an adaptive pool of antibodies can produce 'intelligent' behavior, we can use this power of computation to tackle the problem of multi objective optimization. Keywords: Artificial Immune System, Clonal Selection Theory, Multi Objective Optimization, Pareto Optimal

    Go Digital! Determinants of Continuance Usage of Mobile Payment Apps: Focusing on the Mediating Role of Gamification

    Get PDF
    Background: COVID-19 spread over the last two years has been instrumental in shifting physical banking transactions to mobile-based banking transactions. Recently, M-payments have dominated online and point-of-sale (POS) transactions in the Asia-pacific region. Therefore, there was a need to study the factors influencing M-payments. This research has been conducted to determine the significant factors influencing the usage and continuance usage of M-payment apps in an emerging country and particularly how gamified features enhance the usage of M-payments apps.is study is based on the perspectives of the Unified theory of acceptance and use of technology (UTAUT2) and information system success (ISS) theory, and it adds three new determinants—trust, gamified features, and continued use of mobile payments to better explain and forecast users\u27 behavioral intentions and continued use of mobile payment applications (M-payments apps). Method: The research has employed two studies on sample data from young users of M-payment apps (n=898), the dataset was analyzed through structural equation modelling for mediation and moderation analysis in study one. The second study was grounded through Vignette experiments to analyze the effects of the degree of gamified features on the continued usage of M-payments. Results: The results reported that behavioral intention to adopt, and usage of mobile payments are significantly mediated by gamified features and gamified features are partially mediating continuance usage of M-payments. Trust is the key to enabling continuance usage amongst the users of M-payments. These findings extend the understanding of users’ continuance intention in the context of payments apps. Conclusion: This study would be helpful in presenting insights for the M-payments service providers and the associated banks to develop strategy for the continuance usage of mobile payment apps

    Footprinting Using Nmap

    Get PDF
    Nmap is inbuilt in Kali Linux that is utilized by the organization to identify the weakness and remediate it. There are different sorts of subtleties that Nmap offers in the wake of filtering the objective. The data expressed in the manuscript can be utilized comprehend the idea of what Footprinting is, what hackers search for to Footprint, and how to shield against it. Nmap is a free and open-source utility for network disclosure and security examining. Numerous frameworks and organization heads additionally find it valuable for errands. In this paper, the study is conducted on the utilization of NMAP for the footprinting. The cloudflare server is utilized for the study. The suggestions on are pro-vided to avoid the footprinting. The results of the study will be helpful to avoid the foot-printing
    • …
    corecore