127 research outputs found

    Decrement Operators in Belief Change

    Full text link
    While research on iterated revision is predominant in the field of iterated belief change, the class of iterated contraction operators received more attention in recent years. In this article, we examine a non-prioritized generalisation of iterated contraction. In particular, the class of weak decrement operators is introduced, which are operators that by multiple steps achieve the same as a contraction. Inspired by Darwiche and Pearl's work on iterated revision the subclass of decrement operators is defined. For both, decrement and weak decrement operators, postulates are presented and for each of them a representation theorem in the framework of total preorders is given. Furthermore, we present two sub-types of decrement operators

    Transcriptome Analysis in Peripheral Blood of Humans Exposed to Environmental Carcinogens: A Promising New Biomarker in Environmental Health Studies

    Get PDF
    BACKGROUND: Human carcinogenesis is known to be initiated and/or promoted by exposure to chemicals that occur in the environment. Molecular cancer epidemiology is used to identify human environmental cancer risks by applying a range of effect biomarkers, which tend to be nonspecific and do not generate insights into underlying modes of action. Toxicogenomic technologies may improve on this by providing the opportunity to identify, molecular biomarkers consisting of altered gene expression profiles. OBJECTIVES: The aim of the present study, was to monitor the expression of selected genes in a random sample of adults in Flanders selected from specific regions with (presumably,) different environmental burdens. Furthermore, associations of gene expression with blood and urinary, measures of biomarkers of exposure, early, phenotypic effects, and tumor markers were investigated. RESULTS: Individual gene expression of cytochrome p450 1B1, activating transcription factor 4, mitogen-activated protein kinase K superoxide dismutase 2 (Mn), chemokine (C-X-C motif) ligand 1 (melanoma growth stimulating activity, alpha), diacylglycerol 0 acyltransferase homolog 2 (mouse), tigger transposable element derived 3, and PTEN-induced putative kinasel were measured by means of quantitative polymerase chain reaction in peripheral blood cells of 398 individuals. After correction for the confounding effect of tobacco smoking, inhabitants of the Olen region showed the highest differences in gene expression levels compared with inhabitants from the Gent and fruit cultivation regions. Importantly, we observed multiple significant correlations of particular gene expressions with blood and urinary, measures of various environmental carcinogens. CONCLUSIONS: Considering the observed significant differences between gene expression levels in inhabitants of various regions in Flanders and the associations of gene expression with blood or urinary measures of environmental carcinogens, we conclude that gene expression profiling appears promising as a tool for biological monitoring in relation to environmental exposures in humans

    Genetic basis of thermal nociceptive sensitivity and brain weight in a BALB/c reduced complexity cross

    Get PDF
    Thermal nociception involves the transmission of temperature-related noxious information from the periphery to the CNS and is a heritable trait that could predict transition to persistent pain. Rodent forward genetics complement human studies by controlling genetic complexity and environmental factors, analysis of end point tissue, and validation of variants on appropriate genetic backgrounds. Reduced complexity crosses between nearly identical inbred substrains with robust trait differences can greatly facilitate unbiased discovery of novel genes and variants. We found BALB/cByJ mice showed enhanced sensitivity on the 53.5°C hot plate and mechanical stimulation in the von Frey test compared to BALB/cJ mice and replicated decreased gross brain weight in BALB/cByJ versus BALB/cJ. We then identified a quantitative trait locus (QTL) on chromosome 13 for hot plate sensitivity (LOD = 10.7; p < 0.001; peak = 56 Mb) and a QTL for brain weight on chromosome 5 (LOD = 8.7; p < 0.001). Expression QTL mapping of brain tissues identified H2afy (56.07 Mb) as the top transcript with the strongest association at the hot plate locus (FDR = 0.0002) and spliceome analysis identified differential exon usage within H2afy associated with the same locus. Whole brain proteomics further supported decreased H2AFY expression could underlie enhanced hot plate sensitivity, and identified ACADS as a candidate for reduced brain weight. To summarize, a BALB/c reduced complexity cross combined with multiple-omics approaches facilitated identification of candidate genes underlying thermal nociception and brain weight. These substrains provide a powerful, reciprocal platform for future validation of candidate variants

    Co-Localization of the Oncogenic Transcription Factor MYCN and the DNA Methyl Binding Protein MeCP2 at Genomic Sites in Neuroblastoma

    Get PDF
    MYCN is a transcription factor that is expressed during the development of the neural crest and its dysregulation plays a major role in the pathogenesis of pediatric cancers such as neuroblastoma, medulloblastoma and rhabdomyosarcoma. MeCP2 is a CpG methyl binding protein which has been associated with a number of cancers and developmental disorders, particularly Rett syndrome.Using an integrative global genomics approach involving chromatin immunoprecipitation applied to microarrays, we have determined that MYCN and MeCP2 co-localize to gene promoter regions, as well as inter/intragenic sites, within the neuroblastoma genome (MYCN amplified Kelly cells) at high frequency (70.2% of MYCN sites were also positive for MeCP2). Intriguingly, the frequency of co-localization was significantly less at promoter regions exhibiting substantial hypermethylation (8.7%), as determined by methylated DNA immunoprecipitation (MeDIP) applied to the same microarrays. Co-immunoprecipitation of MYCN using an anti-MeCP2 antibody indicated that a MYCN/MeCP2 interaction occurs at protein level. mRNA expression profiling revealed that the median expression of genes with promoters bound by MYCN was significantly higher than for genes bound by MeCP2, and that genes bound by both proteins had intermediate expression. Pathway analysis was carried out for genes bound by MYCN, MeCP2 or MYCN/MeCP2, revealing higher order functions.Our results indicate that MYCN and MeCP2 protein interact and co-localize to similar genomic sites at very high frequency, and that the patterns of binding of these proteins can be associated with significant differences in transcriptional activity. Although it is not yet known if this interaction contributes to neuroblastoma disease pathogenesis, it is intriguing that the interaction occurs at the promoter regions of several genes important for the development of neuroblastoma, including ALK, AURKA and BDNF

    Lower Bounds on the Degree of Block Ciphers

    Get PDF
    Only the method to estimate the upper bound of the algebraic degree on block ciphers is known so far, but it is not useful for the designer to guarantee the security. In this paper we provide meaningful lower bounds on the algebraic degree of modern block ciphers

    XOR-counts and lightweight multiplication with fixed elements in binary finite fields

    Get PDF
    XOR-metrics measure the efficiency of certain arithmetic operations in binary finite fields. We prove some new results about two different XOR-metrics that have been used in the past. In particular, we disprove an existing conjecture about those XOR-metrics. We consider implementations of multiplication with one fixed element in a binary finite field. Here we achieve a complete characterization of all elements whose multiplication matrix can be implemented using exactly 2 XOR-operations. Further, we provide new results and examples in more general cases, showing that significant improvements in implementations are possible

    New Slide Attacks on Almost Self-Similar Ciphers

    Get PDF
    The slide attack is a powerful cryptanalytic tool which has the unusual property that it can break iterated block ciphers with a complexity that does not depend on their number of rounds. However, it requires complete self similarity in the sense that all the rounds must be identical. While this can be the case in Feistel structures, this rarely happens in SP networks since the last round must end with an additional post-whitening subkey. In addition, in many SP networks the final round has additional asymmetries -- for example, in AES the last round omits the MixColumns operation. Such asymmetry in the last round can make it difficult to utilize most of the advanced tools which were developed for slide attacks, such as deriving from one slid pair additional slid pairs by repeatedly re-encrypting their ciphertexts. In this paper we overcome this last round problem by developing four new types of slide attacks. We demonstrate their power by applying them to many types of AES-like structures (with and without linear mixing in the last round, with known or secret S-boxes, with 1,2 and 3 periodicity in their subkeys, etc). In most of these cases, the time complexity of our attack is close to 2n/22^{n/2}, which is the smallest possible complexity for slide attacks. Our new slide attacks have several unique properties: The first attack uses slid sets in which each plaintext from the first set forms a slid pair with some plaintext from the second set, but without knowing the exact correspondence. The second attack makes it possible to create from several slid pairs an exponential number of new slid pairs which form a hypercube spanned by the given pairs. The third attack has the unusual property that it is always successful, and the fourth attack can use known messages instead of chosen messages, with only slightly higher time complexity

    How to Use Metaheuristics for Design of Symmetric-Key Primitives

    Get PDF
    The ultimate goal of designing a symmetric-key cryptographic primitive often can be formulated as an optimization problem. So far, these problems mainly have been solved with trivial algorithms such as brute force or random search. We show that a more advanced and equally versatile class of search algorithms, called metaheuristics, can help to tackle optimization problems related to design of symmetric-key primitives. We use two nature-inspired metaheuristics, simulated annealing and genetic algorithm, to optimize in terms of security the components of two recent cryptographic designs, SKINNY and AES-round based constructions. The positive outputs of the optimization suggest that metaheuristics are non-trivial tools, well suited for automatic design of primitives
    corecore