593 resultados para 319-1
Resumo:
Obesity and metabolic syndrome are associated with several cancers, however, the molecular mechanisms remain to be fully elucidated. Recent studies suggest that hypercholesterolemia increases intratumoral androgen signaling in prostate cancer, but it is unclear whether androgenindependent mechanisms also exist. Since hypercholesterolemia is associated with advanced, castrate-resistant prostate cancer, in this study, we aimed to determine whether and how hypercholesterolemia affects prostate cancer progression in the absence of androgen signaling. We demonstrate that diet-induced hypercholesterolemia promotes orthotopic xenograft PC-3 cell metastasis, concomitant with elevated expression of caveolin-1 and IQGAP1 in xenograft tumor tissues. In vitro cholesterol treatment of PC-3 cells stimulated migration and increased IQGAP1 and caveolin-1 protein level and localization to a detergent-resistant fraction. Down-regulation of caveolin-1 or IQGAP1 in PC-3 cells reduced migration and invasion in vitro, and hypercholesterolemia-induced metastasis in vivo. Double knock-down of caveolin-1 and IQGAP1 showed no additive effect, suggesting that caveolin-1 and IQGAP1 act via the same pathway. Taken together, our data show that hypercholesterolemia promotes prostate cancer metastasis independent of the androgen pathway, in part by increasing IQGAP1 and caveolin-1. These results have broader implications for managing metastasis of cancers in general as IQGAP1 and hypercholesterolemia are implicated in the progression of several cancers.
Resumo:
As is the case globally, Australian schools that serve high-poverty communities most often employ the least experienced, least prepared teachers. Beginning with a discussion of poverty in Australia this chapter draws on 6 years of learnings from Australia's National Exceptional Teachers for Disadvantaged Schools (NETDS) program to examine how social justice can be taught within a mainstream Initial Teacher Education program in an increasingly neoliberal climate where teacher education curriculum around social justice struggles to find a place within the current discourses of quality teaching and its preoccupations with standards, accountability, and high-stakes testing.
Resumo:
The Internet Engineering Task Force (IETF) is currently developing the next version of the Transport Layer Security (TLS) protocol, version 1.3. The transparency of this standardization process allows comprehensive cryptographic analysis of the protocols prior to adoption, whereas previous TLS versions have been scrutinized in the cryptographic literature only after standardization. This is even more important as there are two related, yet slightly different, candidates in discussion for TLS 1.3, called draft-ietf-tls-tls13-05 and draft-ietf-tls-tls13-dh-based. We give a cryptographic analysis of the primary ephemeral Diffie–Hellman-based handshake protocol, which authenticates parties and establishes encryption keys, of both TLS 1.3 candidates. We show that both candidate handshakes achieve the main goal of providing secure authenticated key exchange according to an augmented multi-stage version of the Bellare–Rogaway model. Such a multi-stage approach is convenient for analyzing the design of the candidates, as they establish multiple session keys during the exchange. An important step in our analysis is to consider compositional security guarantees. We show that, since our multi-stage key exchange security notion is composable with arbitrary symmetric-key protocols, the use of session keys in the record layer protocol is safe. Moreover, since we can view the abbreviated TLS resumption procedure also as a symmetric-key protocol, our compositional analysis allows us to directly conclude security of the combined handshake with session resumption. We include a discussion on several design characteristics of the TLS 1.3 drafts based on the observations in our analysis.
Resumo:
Security models for two-party authenticated key exchange (AKE) protocols have developed over time to capture the security of AKE protocols even when the adversary learns certain secret values. Increased granularity of security can be modelled by considering partial leakage of secrets in the manner of models for leakage-resilient cryptography, designed to capture side-channel attacks. In this work, we use the strongest known partial-leakage-based security model for key exchange protocols, namely continuous after-the-fact leakage eCK (CAFL-eCK) model. We resolve an open problem by constructing the first concrete two-pass leakage-resilient key exchange protocol that is secure in the CAFL-eCK model.
Resumo:
OBJECTIVE This study determined if deficits in corneal nerve fiber length (CNFL) assessed using corneal confocal microscopy (CCM) can predict future onset of diabetic peripheral neuropathy (DPN). RESEARCH DESIGN AND METHODS CNFL and a range of other baseline measures were compared between 90 nonneuropathic patients with type 1 diabetes who did or did not develop DPN after 4 years. The receiver operator characteristic (ROC) curve was used to determine the capability of single and combined measures of neuropathy to predict DPN. RESULTS DPN developed in 16 participants (18%) after 4 years. Factors predictive of 4-year incident DPN were lower CNFL (P = 0.041); longer duration of diabetes (P = 0.002); higher triglycerides (P = 0.023); retinopathy (higher on the Early Treatment of Diabetic Retinopathy Study scale) (P = 0.008); nephropathy (higher albumin-to-creatinine ratio) (P = 0.001); higher neuropathy disability score (P = 0.037); lower cold sensation (P = 0.001) and cold pain (P = 0.027) thresholds; higher warm sensation (P = 0.008), warm pain (P = 0.024), and vibration (P = 0.003) thresholds; impaired monofilament response (P = 0.003); and slower peroneal (P = 0.013) and sural (P = 0.002) nerve conduction velocity. CCM could predict the 4-year incident DPN with 63% sensitivity and 74% specificity for a CNFL threshold cutoff of 14.1 mm/mm2 (area under ROC curve = 0.66, P = 0.041). Combining neuropathy measures did not improve predictive capability. CONCLUSIONS DPN can be predicted by various demographic, metabolic, and conventional neuropathy measures. The ability of CCM to predict DPN broadens the already impressive diagnostic capabilities of this novel ophthalmic marker.
Resumo:
There has been much debate over recent years about whether Australian copyright law should adopt a fair use doctrine. In this chapter we argue by pointing to the historical record that the incorporation of the term 'copyrights' in the Australian Constitution embeds a notion of balance and fair use in Australian law and that this should be taken into account when interpreting the Australian Copyright Act 1968. English case law in the 18th and 19th centuries developed a principle that copyright infringement did not occur where a person had made a fair use of a work. Fair use was generally established where the defendant had made a productive use that did more than alter the original work for the purpose of evading liability, and where the defendant had made an original contribution to the resulting work. Additionally, fairness was shown by a use that did not supersede or prejudice the market for the original work. At the time of including the copyright power in the Constitution, the UK Parliament’s understanding of “copyrights” included the notion of fair use as it had been developed in U.K. precedent. In this chapter we argue that the work “copyrights” in the Australia Constitution takes its definition from copyright in 1900 and as it has evolved since. Importantly, the word “copyrights” is infused with a particular meaning that incorporates the principle of copyright balance. The constitutional notion of copyright, therefore, is not that of an unlimited power to prevent all copying. Rather, copyright distinguishes between infringing copying and non-infringing copying and grants to the copyright owner only the power to control the former. Non-infringing copying includes well-accepted limitations on the copyright owner’s rights, including the copying of ideas, the copying of public domain works and the copying of insubstantial parts of copyrighted works. In this chapter we argue that non-infringing copying also includes copying to make a fair use of a work. The sections that distinguish infringing copying from non-infringing copying in the Copyright Act 1968 are sections 36(1) and 101(1), which define infringement as the doing, without licence, of an “act comprised in the copyright”. An infringing copy is an act comprised the copyright, whereas a non-infringing copy is not. We argue that space for fair uses of copyrighted works is built into the Copyright Act 1968 through these sections, because a fair use will not produce an infringing copy and so is not an act comprised in the copyright.
Resumo:
Post-traumatic stress disorder (PTSD) is a debilitating psychiatric disorder that has a major impact on the ability to function effectively in daily life. PTSD may develop as a response to exposure to an event or events perceived as potentially harmful or life-threatening. It has high prevalence rates in the community, especially among vulnerable groups such as military personnel or those in emergency services. Despite extensive research in this field, the underlying mechanisms of the disorder remain largely unknown. The identification of risk factors for PTSD has posed a particular challenge as there can be delays in onset of the disorder, and most people who are exposed to traumatic events will not meet diagnostic criteria for PTSD. With the advent of the Diagnostic and Statistical Manual of Mental Disorders, Fifth Edition (DSM V), the classification for PTSD has changed from an anxiety disorder into the category of stress- and trauma-related disorders. This has the potential to refocus PTSD research on the nature of stress and the stress response relationship. This review focuses on some of the important findings from psychological and biological research based on early models of stress and resilience. Improving our understanding of PTSD by investigating both genetic and psychological risk and coping factors that influence stress response, as well as their interaction, may provide a basis for more effective and earlier intervention.
Resumo:
In the internet age, copyright owners are increasingly looking to online intermediaries to take steps to prevent copyright infringement. Sometimes these intermediaries are closely tied to the acts of infringement; sometimes – as in the case of ISPs – they are not. In 2012, the Australian High Court decided the Roadshow Films v iiNet case, in which it held that an Australian ISP was not liable under copyright’s authorization doctrine, which asks whether the intermediary has sanctioned, approved or countenanced the infringement. The Australian Copyright Act 1968 directs a court to consider, in these situations, whether the intermediary had the power to prevent the infringement and whether it took any reasonable steps to prevent or avoid the infringement. It is generally not difficult for a court to find the power to prevent infringement – power to prevent can include an unrefined technical ability to disconnect users from the copyright source, such as an ISP terminating users’ internet accounts. In the iiNet case, the High Court eschewed this broad approach in favor of focusing on a notion of control that was influenced by principles of tort law. In tort, when a plaintiff asserts that a defendant should be liable for failing to act to prevent harm caused to the plaintiff by a third party, there is a heavy burden on the plaintiff to show that the defendant had a duty to act. The duty must be clear and specific, and will often hinge on the degree of control that the defendant was able to exercise over the third party. Control in these circumstances relates directly to control over the third party’s actions in inflicting the harm. Thus, in iiNet’s case, the control would need to be directed to the third party’s infringing use of BitTorrent; control over a person’s ability to access the internet is too imprecise. Further, when considering omissions to act, tort law differentiates between the ability to control and the ability to hinder. The ability to control may establish a duty to act, and the court will then look to small measures taken to prevent the harm to determine whether these satisfy the duty. But the ability to hinder will not suffice to establish liability in the absence of control. This chapter argues that an inquiry grounded in control as defined in tort law would provide a more principled framework for assessing the liability of passive intermediaries in copyright. In particular, it would set a higher, more stable benchmark for determining the copyright liability of passive intermediaries, based on the degree of actual, direct control that the intermediary can exercise over the infringing actions of its users. This approach would provide greater clarity and consistency than has existed to date in this area of copyright law in Australia.