435 resultados para Lower Semicontinuous Function


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background The population exposed to potentially hazardous substances through inappropriate and unsafe management practices related to disposal and recycling of end-of-life electrical and electronic equipment, collectively known as e-waste, is increasing. We aimed to summarise the evidence for the association between such exposures and adverse health outcomes. Methods We systematically searched five electronic databases (PubMed, Embase, Web of Science, PsycNET, and CINAHL) for studies assessing the association between exposure to e-waste and outcomes related to mental health and neurodevelopment, physical health, education, and violence and criminal behaviour, from Jan 1, 1965, to Dec 17, 2012, and yielded 2274 records. Of the 165 full-text articles assessed for eligibility, we excluded a further 142, resulting in the inclusion of 23 published epidemiological studies that met the predetermined criteria. All studies were from southeast China. We assessed evidence of a causal association between exposure to e-waste and health outcomes within the Bradford Hill framework. Findings We recorded plausible outcomes associated with exposure to e-waste including change in thyroid function, changes in cellular expression and function, adverse neonatal outcomes, changes in temperament and behaviour, and decreased lung function. Boys aged 8–9 years living in an e-waste recycling town had a lower forced vital capacity than did those living in a control town. Significant negative correlations between blood chromium concentrations and forced vital capacity in children aged 11 and 13 years were also reported. Findings from most studies showed increases in spontaneous abortions, stillbirths, and premature births, and reduced birthweights and birth lengths associated with exposure to e-waste. People living in e-waste recycling towns or working in e-waste recycling had evidence of greater DNA damage than did those living in control towns. Studies of the effects of exposure to e-waste on thyroid function were not consistent. One study related exposure to e-waste and waste electrical and electronic equipment to educational outcomes. Interpretation Although data suggest that exposure to e-waste is harmful to health, more well designed epidemiological investigations in vulnerable populations, especially pregnant women and children, are needed to confirm these associations. Funding Children's Health and Environment Program, Queensland Children's Medical Research Institute, The University of Queensland, Australia.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background: Due to improved screening and treatment for gynaecological cancers survivorship has increased. Use of supportive care services after treatment is important to improve quality of life. Objective: To assess self-reported lower-limb lymphoedema (LLL), depression, anxiety, quality of life, unmet supportive care needs, and service use among gynaecological cancer survivors. Methods: In 2010 a population-based cross-sectional mail survey was conducted (n=160 gynaecological cancer survivors 5 to 30 month post-diagnosis (53% response rate)). Results: Overall, 30% of women self-reported LLL, 21% and 24% depression or anxiety, respectively. Women with LLL were more likely to also report symptoms of depression or anxiety, and with these symptoms had higher unmet supportive care needs. Services needed but not used by 10-15% of women with LLL, anxiety or depression respectively were lymphoedema specialist, pain specialist and physiotherapist, or psychiatrists, psychologists and pain specialists. Limitations: Small sample size, self-report data, limited generalisation to other countries, underrepresentation of older women (age >70) and women from non-Caucasian backgrounds. Conclusions: Women with LLL or high distress were less likely to use services they needed. Funding: This study was funded by Cancer Australia.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Hamstring strain injuries (HSIs) are the most prevalent injury in a number of sports, and while anterior cruciate ligament (ACL) injuries are less common, they are far more severe and have long-term implications, such as an increased risk of developing osteoarthritis later in life. Given the high incidence and severity of these injuries, they are key targets of injury preventive programs in elite sport. Evidence has shown that a previous severe knee injury (including ACL injury) increases the risk of HSI; however, whether the functional deficits that occur after HSI result in an increased risk of ACL injury has yet to be considered. In this clinical commentary, we present evidence that suggests that the link between previous HSI and increased risk of ACL injury requires further investigation by drawing parallels between deficits in hamstring function after HSI and in women athletes, who are more prone to ACL injury than men athletes. Comparisons between the neuromuscular function of the male and female hamstring has shown that women display lower hamstring-to-quadriceps strength ratios during isokinetic knee flexion and extension, increased activation of the quadriceps compared with the hamstrings during a stop-jump landing task, a greater time required to reach maximal isokinetic hamstring torque, and lower integrated myoelectrical hamstring activity during a sidestep cutting maneuver. Somewhat similarly, in athletes with a history of HSI, the previously injured limb, compared with the uninjured limb, displays lower eccentric knee flexor strength, a lower hamstrings-to-quadriceps strength ratio, lower voluntary myoelectrical activity during maximal knee flexor eccentric contraction, a lower knee flexor eccentric rate of torque development, and lower voluntary myoelectrical activity during the initial portion of eccentric contraction. Given that the medial and lateral hamstrings have different actions at the knee joint in the coronal plane, which hamstring head is previously injured might also be expected to influence the likelihood of future ACL. Whether the deficits in function after HSI, as seen in laboratory-based studies, translate to deficits in hamstring function during typical injurious tasks for ACL injury has yet to be determined but should be a consideration for future work.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Objective To examine personal and social demographics, and rehabilitation discharge outcomes of dysvascular and non-vascular lower limb amputees. Methods In total, 425 lower limb amputation inpatient rehabilitation admissions (335 individuals) from 2005 to 2011 were examined. Admission and discharge descriptive statistics (frequency, percentages) were calculated and compared by aetiology. Results Participants were male (74%), aged 65 years (s.d. 14), born in Australia (72%), had predominantly dysvascular aetiology (80%) and a median length of stay 48 days (interquartile range (IQR): 25–76). Following amputation, 56% received prostheses for mobility, 21% (n = 89) changed residence and 28% (n = 116) required community services. Dysvascular amputees were older (mean 67 years, s.d. 12 vs 54 years, s.d. 16; P < 0.001) and recorded lower functional independence measure – motor scores at admission (z = 3.61, P < 0.001) and discharge (z = 4.52, P < 0.001). More nonvascular amputees worked before amputation (43% vs 11%; P < 0.001), were prescribed a prosthesis by discharge (73% vs 52%; P < 0.001) and had a shorter length of stay (7 days, 95% confidence interval: –3 to 17), although this was not statistically significant. Conclusions Differences exist in social and demographic outcomes between dysvascular and non-vascular lower limb amputees.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We report that tumor cells devoid of their mitochondrial genome (mtDNA) show delayed tumor growth and that tumor formation is associated with acquisition of mtDNA from host cells. This leads to partial recovery of mitochondrial function in cells derived from primary tumors grown from cells without mtDNA and a shorter lag in tumor growth. Cell lines from circulating tumor cells showed further recovery of mitochondrial respiration and an intermediate lag to tumor growth, while cells from lung metastases exhibited full restoration of respiratory function and no lag in tumor growth. Stepwise assembly of mitochondrial respiratory supercomplexes was correlated with acquisition of respiratory function. Our findings indicate horizontal transfer of mtDNA from host cells in the tumor microenvironment to tumor cells with compromised respiratory function to re-establish respiration and tumor-initiating efficacy. These results suggest a novel pathophysiological process for overcoming mtDNA damage and support the notion of high plasticity of malignant cells.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We recorded echolocation calls from 14 sympatric species of bat in Britain. Once digitised, one temporal and four spectral features were measured from each call. The frequency-time course of each call was approximated by fitting eight mathematical functions, and the goodness of fit, represented by the mean-squared error, was calculated. Measurements were taken using an automated process that extracted a single call from background noise and measured all variables without intervention. Two species of Rhinolophus were easily identified from call duration and spectral measurements. For the remaining 12 species, discriminant function analysis and multilayer back-propagation perceptrons were used to classify calls to species level. Analyses were carried out with and without the inclusion of curve-fitting data to evaluate its usefulness in distinguishing among species. Discriminant function analysis achieved an overall correct classification rate of 79% with curve-fitting data included, while an artificial neural network achieved 87%. The removal of curve-fitting data improved the performance of the discriminant function analysis by 2 %, while the performance of a perceptron decreased by 2 %. However, an increase in correct identification rates when curve-fitting information was included was not found for all species. The use of a hierarchical classification system, whereby calls were first classified to genus level and then to species level, had little effect on correct classification rates by discriminant function analysis but did improve rates achieved by perceptrons. This is the first published study to use artificial neural networks to classify the echolocation calls of bats to species level. Our findings are discussed in terms of recent advances in recording and analysis technologies, and are related to factors causing convergence and divergence of echolocation call design in bats.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, we observe that in the seminal work on indifferentiability analysis of iterated hash functions by Coron et al. and in subsequent works, the initial value (IV) of hash functions is fixed. In addition, these indifferentiability results do not depend on the Merkle–Damgård (MD) strengthening in the padding functionality of the hash functions. We propose a generic n -bit-iterated hash function framework based on an n -bit compression function called suffix-free-prefix-free (SFPF) that works for arbitrary IV s and does not possess MD strengthening. We formally prove that SFPF is indifferentiable from a random oracle (RO) when the compression function is viewed as a fixed input-length random oracle (FIL-RO). We show that some hash function constructions proposed in the literature fit in the SFPF framework while others that do not fit in this framework are not indifferentiable from a RO. We also show that the SFPF hash function framework with the provision of MD strengthening generalizes any n -bit-iterated hash function based on an n -bit compression function and with an n -bit chaining value that is proven indifferentiable from a RO.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The security of permutation-based hash functions in the ideal permutation model has been studied when the input-length of compression function is larger than the input-length of the permutation function. In this paper, we consider permutation based compression functions that have input lengths shorter than that of the permutation. Under this assumption, we propose a permutation based compression function and prove its security with respect to collision and (second) preimage attacks in the ideal permutation model. The proposed compression function can be seen as a generalization of the compression function of MD6 hash function.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, we analyze the SHAvite-3-512 hash function, as proposed and tweaked for round 2 of the SHA-3 competition. We present cryptanalytic results on 10 out of 14 rounds of the hash function SHAvite-3-512, and on the full 14 round compression function of SHAvite-3-512. We show a second preimage attack on the hash function reduced to 10 rounds with a complexity of 2497 compression function evaluations and 216 memory. For the full 14-round compression function, we give a chosen counter, chosen salt preimage attack with 2384 compression function evaluations and 2128 memory (or complexity 2448 without memory), and a collision attack with 2192 compression function evaluations and 2128 memory.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper we present concrete collision and preimage attacks on a large class of compression function constructions making two calls to the underlying ideal primitives. The complexity of the collision attack is above the theoretical lower bound for constructions of this type, but below the birthday complexity; the complexity of the preimage attack, however, is equal to the theoretical lower bound. We also present undesirable properties of some of Stam’s compression functions proposed at CRYPTO ’08. We show that when one of the n-bit to n-bit components of the proposed 2n-bit to n-bit compression function is replaced by a fixed-key cipher in the Davies-Meyer mode, the complexity of finding a preimage would be 2 n/3. We also show that the complexity of finding a collision in a variant of the 3n-bits to 2n-bits scheme with its output truncated to 3n/2 bits is 2 n/2. The complexity of our preimage attack on this hash function is about 2 n . Finally, we present a collision attack on a variant of the proposed m + s-bit to s-bit scheme, truncated to s − 1 bits, with a complexity of O(1). However, none of our results compromise Stam’s security claims.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Many RFID protocols use cryptographic hash functions for their security. The resource constrained nature of RFID systems forces the use of light weight cryptographic algorithms. Tav-128 is one such 128-bit light weight hash function proposed by Peris-Lopez et al. for a low-cost RFID tag authentication protocol. Apart from some statistical tests for randomness by the designers themselves, Tav-128 has not undergone any other thorough security analysis. Based on these tests, the designers claimed that Tav-128 does not posses any trivial weaknesses. In this article, we carry out the first third party security analysis of Tav-128 and show that this hash function is neither collision resistant nor second preimage resistant. Firstly, we show a practical collision attack on Tav-128 having a complexity of 237 calls to the compression function and produce message pairs of arbitrary length which produce the same hash value under this hash function. We then show a second preimage attack on Tav-128 which succeeds with a complexity of 262 calls to the compression function. Finally, we study the constituent functions of Tav-128 and show that the concatenation of nonlinear functions A and B produces a 64-bit permutation from 32-bit messages. This could be a useful light weight primitive for future RFID protocols.