5,391 research outputs found
Recommended from our members
The tumor-promoting functions of Ataxia-telangiectasia mutated (ATM) in cancer cells
textAtaxia-telangiectasia mutated (ATM) protein kinase regulates the DNA damage response (DDR) and is associated with cancer suppression by protecting cells from DNA double-strand breaks (DSBs). However, how ATM functions outside of DSB signaling is less clearly understood. Here, we report a new cancer-promoting role for ATM in stimulating cell migration and invasion independently of DSB signaling or induction. We used two highly metastatic human breast cancer cell lines to corroborate that ATM is required for cell migration and invasion. Microarray analysis of cells depleted for ATM identified interleukin-8 (IL-8) as a target since the exogenous addition of IL-8 rescued migration and invasion defects in ATM-deficient cells. Finally, ATM depletion in human cancer cells reduced lung metastasis in a mouse xenograft model. These findings shed light on tumor-promoting functions of ATM. Therefore, in addition to its canonical roles in tumor suppression, ATM promotes tumor progression as well.Cellular and Molecular Biolog
Recommended from our members
Overview of machine learning methods in predicting house prices and its application in R
This report aims to predict house prices by using several machine learning methods. These methods include ordinary least squares regression, Ridge regression, Lasso regression, and k-nearest neighbor regression. We compare the prediction accuracy by using root mean square error (RMSE) among these models to determine which model performs best in the predictions of house price. The propose of this report is to give an overview of how to perform different models in predicting house prices and its implementation in R.Statistic
Neural plasticity in common forms of chronic headaches
Headaches are universal experiences and among the most common disorders. While headache may be physiological in the acute
setting, it can become a pathological and persistent condition.The mechanisms underlying the transition from episodic to chronic
pain have been the subject of intense study. Using physiological and imaging methods, researchers have identified a number of
different forms of neural plasticity associated with migraine and other headaches, including peripheral and central sensitization,
and alterations in the endogenous mechanisms of pain modulation. While these changes have been proposed to contribute to
headache and pain chronification, some findings are likely the results of repetitive noxious stimulation, such as atrophy of brain
areas involved in pain perception and modulation. In this review, we provide a narrative overview of recent advances on the
neuroimaging, electrophysiological and genetic aspects of neural plasticity associated with the most common forms of chronic
headaches, including migraine, cluster headache, tension-type headache, and medication overuse headache
Merged Search Algorithms for Radio Frequency Identification Anticollision
Nowadays, the Radio Frequency Identification (RFID) system enables the control of many devices over an open communication infrastructure ranging from a small home area network to the global Internet. Moreover, a variety of consumer products are tagged with remotely low-cost readable identification electromagnetic tags to replace Bar Codes. Applications such as automatic object tracking, inventory and supply chain management, and Web appliances were adopted for years in many companies.
The arbitration algorithm for RFID system is used to arbitrate all the tags to avoid the collision problem with the existence of multiple tags in the interrogation field of a transponder. A splitting algorithm which is called Binary Search Tree (BST) is well known for multitags arbitration. In the current study, a splitting-based schema called Merged Search Tree is proposed to capture identification codes correctly for anticollision. Performance of the proposed algorithm is compared with the original BST according to time and power consumed during the arbitration process. The results show that the proposed model can reduce searching time and power consumed to achieve a better performance arbitration
A self-evaluation system of quality planning for tourist attractions in Taiwan: an integrated AHP-Delphi approach from career professionals
This study seeks to identify a set of key indicators along with weightings for tourist attractions in Taiwan, and develop a quality management self-evaluation mechanism for tourism businesses, using an advanced integrated Analytic Hierarchy Process and Delphi (AHP-Delphi) approach derived from the supply side perspective. This research study comprises two phases: (1) Delphi method analysis that involves 17 experts, providing confirmation about the evaluation criteria; and (2) Analytical Hierarchical Process (AHP) method which aims to allocate weightings to the evaluation criteria from the experts. Findings from the Delphi method analysis revealed the acceptance of two dimensions, six sub-dimensions and 17 indicators as key evaluation criteria. The AHP method analysis indicated that the most significant dimension was managing quality, with tourism services and public sector facilities being the most important sub-dimension and indicator respectively. The self-evaluation mechanism proposed in this planning perspectives can assist tourism businesses and national/regional Destination Management Organization to identify quality management problems and possible ways of enhancing quality tourism, so that tourism experience, and tourist’s satisfaction can be further improved effectively between the conflicting views by career professionals
Recommended from our members
Regulation of axon repulsion by MAX-1 SUMOylation and AP-3.
During neural development, growing axons express specific surface receptors in response to various environmental guidance cues. These axon guidance receptors are regulated through intracellular trafficking and degradation to enable navigating axons to reach their targets. In Caenorhabditis elegans, the UNC-5 receptor is necessary for dorsal migration of developing motor axons. We previously found that MAX-1 is required for UNC-5-mediated axon repulsion, but its mechanism of action remained unclear. Here, we demonstrate that UNC-5-mediated axon repulsion in C. elegans motor axons requires both max-1 SUMOylation and the AP-3 complex β subunit gene, apb-3 Genetic interaction studies show that max-1 is SUMOylated by gei-17/PIAS1 and acts upstream of apb-3 Biochemical analysis suggests that constitutive interaction of MAX-1 and UNC-5 receptor is weakened by MAX-1 SUMOylation and by the presence of APB-3, a competitive interactor with UNC-5. Overexpression of APB-3 reroutes the trafficking of UNC-5 receptor into the lysosome for protein degradation. In vivo fluorescence recovery after photobleaching experiments shows that MAX-1 SUMOylation and APB-3 are required for proper trafficking of UNC-5 receptor in the axon. Our results demonstrate that SUMOylation of MAX-1 plays an important role in regulating AP-3-mediated trafficking and degradation of UNC-5 receptors during axon guidance
Supporting Service Management with Service Encounters Analysis: A Case on Call Centre Outsourcing Operations
Background. A service encounter is the moment that a client directly interacts with a service firm. It is a social-oriented activity that an in-depth analysis of how the client behaved can contribute to the service quality. Objective. The primary objective of this study was to cluster the CLT into groups. The secondary objective was to discover the sequence of question types that asked in each group. Method. A real world call centre outsourcing practice and data mining techniques are used to discover client behaviour. Results. A total of 100,703 inbound calls from the call centre operational database are analyzed. 90.4% of the total calls were made by 85% of clients who used up to three business applications. 72.03% of the total calls were made by a group of clients who involved two to five question types. The clients were clustered into four groups by three behaviour variables. The sequences discovered in this study were mainly on two question types. Conclusion. The service encounter is a complex business process that an integrated perspective should be taken to analyze the dynamics among the entities involved. The client behaviour can be discovered and used as the feedback information for turning the operations in different organizational levels
Counteracting Phishing Page Polymorphism: An Image Layout Analysis Approach
Abstract. Many visual similarity-based phishing page detectors have been developed to detect phishing webpages, however, scammers now cre-ate polymorphic phishing pages to breach the defense of those detectors. We call this kind of countermeasure phishing page polymorphism. Poly-morphic pages are visually similar to genuine pages they try to mimic, but they use different representation techniques. It increases the level of difficulty to detect phishing pages. In this paper, we propose an effective detection mechanism to detect polymorphic phishing pages. In contrast to existing approaches, we analyze the layout of webpages rather than the HTML codes, colors, or content. Specifically, we compute the sim-ilarity degree of a suspect page and an authentic page through image processing techniques. Then, the degrees of similarity are ranked by a classifier trained to detect phishing pages. To verify the efficacy of our phishing detection mechanism, we collected 6, 750 phishing pages and 312 mimicked targets for the performance evaluation. The results show that our method achieves an excellent detection rate of 99.6%.
- …