521 resultados para Smaller Kidneys
Resumo:
Polymer microspheres loaded with bioactive particles, biomolecules, proteins, and/or growth factors play important roles in tissue engineering, drug delivery, and cell therapy. The conventional double emulsion method and a new method of electrospraying into liquid nitrogen were used to prepare bovine serum albumin (BAS)-loaded poly(lactic-co-glycolic acid) (PLGA) porous microspheres. The particle size, the surface morphology and the internal porous structure of the microspheres were observed using scanning electron microscopy (SEM). The loading efficiency, the encapsulation efficiency, and the release profile of the BSA-loaded PLGA microspheres were measured and studied. It was shown that the microspheres from double emulsion had smaller particle sizes (3-50 m), a less porous structure, a poor loading efficiency (5.2 %), and a poor encapsulation efficiency (43.5%). However, the microspheres from the electrospraying into liquid nitrogen had larger particle sizes (400-600 m), a highly porous structure, a high loading efficiency (12.2%), and a high encapsulation efficiency (93.8%). Thus the combination of electrospraying with freezing in liquid nitrogen and subsequent freeze drying represented a suitable way to produce polymer microspheres for effective loading and sustained release of proteins.
Resumo:
In the face of improved First Nation outcomes in many western nations, Australia is still dealing with a seemingly intractable gap between the quality of life of its Aboriginal and Torres Strait Islander peoples and the non-Aboriginal and Torres Strait Islander population. Philanthropy in Australia provides a smaller proportion of funding for community projects than is the case in other countries and Aboriginal and Torres Strait Islander causes have been significantly under - represented as recipients. This paper reports on a qualitative study aimed at understanding the issues affecting the decisions and actions of grantmaking organisations and individuals who wish to support Aboriginal and Torres Strait Islander causes in the current Australian context. The aims were to build on the limited research in this arena, add to the future research agenda and contribute to practice and policy insights for Australia and beyond. The study found that while government funding programs are perceived as output driven, inflexible and dogmatic - ‘a cup of tea mob’- participants see the Australian philanthropic sector as capable of addressing the complex Aboriginal and Torres Strait Islander ‘problem’ with more innovative and independent thinking. From the point of view of contextual impacts, success criteria, barriers, structural imposts and emotional involvement, the practical experience in grantmaking for Indigenous causes of participants in this study reflects that found elsewhere. However the focus of many grantmakers on organisational rather than community capacity and the potentially elitist emphasis on established relationships continues to hamper Aboriginal and Torres Strait Islander access to philanthropic funding in Australia. Further, if the strategic changes currently visible in the sector are unsupported by a depth of policy and a proactive transfer and distribution of skill and knowledge they may be unsustainable.
Resumo:
Principal Topic : According to Shane & Venkataraman (2000) entrepreneurship consists of the recognition and exploitation of venture ideas - or opportunities as they often called - to create future goods and services. This definition puts venture ideas is at the heart of entrepreneurship research. Substantial research has been done on venture ideas in order to enhance our understanding of this phenomenon (e.g. Choi & Shepherd, 2004; Shane, 2000; Shepherd & DeTienne, 2005). However, we are yet to learn what factors drive entrepreneurs' perceptions of the relative attractiveness of venture ideas, and how important different idea characteristics are for such assessments. Ruef (2002) recognized that there is an uneven distribution of venture ideas undertaken by entrepreneurs in the USA. A majority introduce either a new product/service or access a new market or market segment. A smaller percentage of entrepreneurs introduce a new method of production, organizing, or distribution. This implies that some forms of venture ideas are perceived by entrepreneurs as more important or valuable than others. However, Ruef does not provide any information regarding why some forms of venture ideas are more common than others among entrepreneurs. Therefore, this study empirically investigates what factors affect the attractiveness of venture ideas as well as their relative importance. Based on two key characteristics of venture ideas, namely venture idea newness and relatedness, our study investigates how different types and degrees of newness and relatedness of venture ideas affect their attractiveness as perceived by expert entrepreneurs. Methodology/Key : Propositions According to Schumpeter (1934) entrepreneurs introduce different types of venture ideas such as new products/services, new method of production, enter into new markets/customer and new method of promotion. Further, according to Schumpeter (1934) and Kirzner (1973) venture ideas introduced to the market range along a continuum of innovative to imitative ideas. The distinction between these two extremes of venture idea highlights an important property of venture idea, namely their newness. Entrepreneurs, in order to gain competitive advantage or above average returns introduce their venture ideas which may be either new to the world, new to the market that they seek to enter, substantially improved from current offerings and an imitative form of existing offerings. Expert entrepreneurs may be more attracted to venture ideas that exhibit high degree of newness because of the higher newness is coupled with increased market potential (Drucker, 1985) Moreover, certain individual characteristics also affect the attractiveness of venture idea. According to Shane (2000), individual's prior knowledge is closely associated with the recognition of venture ideas. Sarasvathy's (2001) Effectuation theory proposes a high degree of relatedness between venture ideas and the resource position of the individual. Thus, entrepreneurs may be more attracted to venture ideas that are closely aligned with the knowledge and/or resources they already possess. On the other hand, the potential financial gain (Shepherd & DeTienne, 2005) may be larger for ideas that are not close to the entrepreneurs' home turf. Therefore, potential financial gain is a stimulus that has to be considered separately. We aim to examine how entrepreneurs weigh considerations of different forms of newness and relatedness as well as potential financial gain in assessing the attractiveness of venture ideas. We use conjoint analysis to determine how expert entrepreneurs develop preferences for venture ideas which involved with different degrees of newness, relatedness and potential gain. This analytical method paves way to measure the trade-offs they make when choosing a particular venture idea. The conjoint analysis estimates respondents' preferences in terms of utilities (or part-worth) for each level of newness, relatedness and potential gain of venture ideas. A sample of 50 expert entrepreneurs who were awarded young entrepreneurship awards in Sri Lanka in 2007 is used for interviews. Each respondent is interviewed providing with 32 scenarios which explicate different combinations of possible profiles open them into consideration. Conjoint software (SPSS) is used to analyse data. Results and Implications : The data collection of this study is still underway. However, results of this study will provide information regarding the attractiveness of each level of newness, relatedness and potential gain of venture idea and their relative importance in a business model. Additionally, these results provide important implications for entrepreneurs, consultants and other stakeholders as regards the importance of different of attributes of venture idea coupled with different levels. Entrepreneurs, consultants and other stakeholders could make decisions accordingly.
Resumo:
Occidentalism, which treats the other as the same, can be detected in both the criminological and rural sociological treatment of violence in the sociospatial sites of rural countrysides. Criminology tends to mistakenly assume that violence in the modern world is primarily an urban phenomenon (Baldwin & Bottoms, 1976, p. 1; Braithwaite, 1989, p. 47). If violence in rural settings is encountered it tends to be treated as a smaller scale version of the urban problem, or the importation of an otherwise urban problem - as the corrupting influence of the gesellschaft within the gemeinschaft. Within much rural sociology violence is rendered invisible by the assumption that rural communities conform to the idealised conception of the typical gemeinschaft society, small-scale traditional societies based on strong cohesiveness, intimacy and organic forms of solidarity. What these bonds conceal, rather than reveal - violence within the family - remains invisible to the public gaze. The visibility of violence within Aboriginal families and communities presents a major exception to the spatially ordered social relations which render so much white family violence hidden. The need to take into account the complexity and diversity of these sociospatial relations is concretely highlighted in our research which has taken us out of the urban context and confronted us not only with the phenomenon of the violence of other rurals, but also with fundamentally competing claims on, and conceptions of, space and place in the context of a racially divided Australian interior. This article represents the second installment of conceptual reflections on this research, with the first having been published in this journal in 1998.
Resumo:
We review and discuss the literature on small firm growth with an intention to provide a useful vantage point for new research studies regarding this important phenomenon. We first discuss conceptual and methodological issues that represent critical choices for those who research growth and which make it challenging to compare results from previous studies. The substantial review of past research is organized into four sections representing two smaller and two larger literatures. The first of the latter focuses on internal and external drivers of small firm growth. Here we find that much has been learnt and that many valuable generalizations can be made. However, we also conclude that more research of the same kind is unlikely to yield much. While interactive and non-linear effects may be worth pursuing it is unlikely that any new and important growth drivers or strong, linear main effects would be found. The second large literature deals with organizational life-cycles or stages of development. While deservedly criticized for unwarranted determinism and weak empirics this type of approach addresses problems of high practical and also theoretical relevance, and should not be shunned by researchers. We argue that with a change in the fundamental assumptions and improved empirical design, research on the organizational and managerial consequences of growth is an important line of inquiry. With this, we overlap with one of the smaller literatures, namely studies focusing on the effects of growth. We argue that studies too often assume that growth equals success. We advocate instead the use of growth as an intermediary variable that influences more fundamental goals in ways that should be carefully examined rather than assumed. The second small literature distinguishes between different modes or forms of growth, including, e.g., organic vs. acquisition-based growth, and international expansion. We note that modes of growth is an important topic that has been under studied in the growth literature, whereas in other branches of research aspects of it may have been studied intensely, but not primarily from a growth perspective. In the final section we elaborate on ways forward for research on small firm growth. We point at rich opportunities for researchers who look beyond drivers of growth, where growth is viewed as a homogenous phenomenon assumed to unambiguously reflect success, and instead focus on growth as a process and a multi-dimensional phenomenon, as well as on how growth relates to more fundamental outcomes.
Resumo:
Habitat models are widely used in ecology, however there are relatively few studies of rare species, primarily because of a paucity of survey records and lack of robust means of assessing accuracy of modelled spatial predictions. We investigated the potential of compiled ecological data in developing habitat models for Macadamia integrifolia, a vulnerable mid-stratum tree endemic to lowland subtropical rainforests of southeast Queensland, Australia. We compared performance of two binomial models—Classification and Regression Trees (CART) and Generalised Additive Models (GAM)—with Maximum Entropy (MAXENT) models developed from (i) presence records and available absence data and (ii) developed using presence records and background data. The GAM model was the best performer across the range of evaluation measures employed, however all models were assessed as potentially useful for informing in situ conservation of M. integrifolia, A significant loss in the amount of M. integrifolia habitat has occurred (p < 0.05), with only 37% of former habitat (pre-clearing) remaining in 2003. Remnant patches are significantly smaller, have larger edge-to-area ratios and are more isolated from each other compared to pre-clearing configurations (p < 0.05). Whilst the network of suitable habitat patches is still largely intact, there are numerous smaller patches that are more isolated in the contemporary landscape compared with their connectedness before clearing. These results suggest that in situ conservation of M. integrifolia may be best achieved through a landscape approach that considers the relative contribution of small remnant habitat fragments to the species as a whole, as facilitating connectivity among the entire network of habitat patches.
Resumo:
The most costly operations encountered in pairing computations are those that take place in the full extension field Fpk . At high levels of security, the complexity of operations in Fpk dominates the complexity of the operations that occur in the lower degree subfields. Consequently, full extension field operations have the greatest effect on the runtime of Miller’s algorithm. Many recent optimizations in the literature have focussed on improving the overall operation count by presenting new explicit formulas that reduce the number of subfield operations encountered throughout an iteration of Miller’s algorithm. Unfortunately, almost all of these improvements tend to suffer for larger embedding degrees where the expensive extension field operations far outweigh the operations in the smaller subfields. In this paper, we propose a new way of carrying out Miller’s algorithm that involves new explicit formulas which reduce the number of full extension field operations that occur in an iteration of the Miller loop, resulting in significant speed ups in most practical situations of between 5 and 30 percent.
Resumo:
We present a novel approach for preprocessing systems of polynomial equations via graph partitioning. The variable-sharing graph of a system of polynomial equations is defined. If such graph is disconnected, then the corresponding system of equations can be split into smaller ones that can be solved individually. This can provide a tremendous speed-up in computing the solution to the system, but is unlikely to occur either randomly or in applications. However, by deleting certain vertices on the graph, the variable-sharing graph could be disconnected in a balanced fashion, and in turn the system of polynomial equations would be separated into smaller systems of near-equal sizes. In graph theory terms, this process is equivalent to finding balanced vertex partitions with minimum-weight vertex separators. The techniques of finding these vertex partitions are discussed, and experiments are performed to evaluate its practicality for general graphs and systems of polynomial equations. Applications of this approach in algebraic cryptanalysis on symmetric ciphers are presented: For the QUAD family of stream ciphers, we show how a malicious party can manufacture conforming systems that can be easily broken. For the stream ciphers Bivium and Trivium, we nachieve significant speedups in algebraic attacks against them, mainly in a partial key guess scenario. In each of these cases, the systems of polynomial equations involved are well-suited to our graph partitioning method. These results may open a new avenue for evaluating the security of symmetric ciphers against algebraic attacks.
Resumo:
Porphyrins are one of Nature’s essential building blocks that play an important role in several biological systems including oxygen transport, photosynthesis, and enzymes. Their capacity to absorb visible light, facilitate oxidation and reduction, and act as energy- and electron-transfer agents, in particular when several are held closely together, is of interest to chemists who seek to mimic Nature and to make and use these compounds in order to synthesise novel advanced materials. During this project 26 new 5,10-diarylsubstituted porphyrin monomers, 10 dimers, and 1 tetramer were synthesised. The spectroscopic and structural properties of these compounds were investigated using 1D/2D 1H NMR, UV/visible, ATR-IR and Raman spectroscopy, mass spectrometry, X-ray crystallography, electrochemistry and gel permeation chromatography. Nitration, amination, bromination and alkynylation of only one as well as both of the meso positions of the porphyrin monomers have resulted in the expansion of the synthetic possibilities for the 5,10-diarylsubstituted porphyrins. The development of these new porphyrin monomers has led to the successful synthesis of new azo- and butadiyne-linked dimers. The functionalisation of these compounds was investigated, in particular nitration, amination, and bromination. The synthesised dimers containing the azo bridge have absorption spectra that show a large split in the Soret bands and intense Q-bands that have been significantly redshifted. The butadiyne dimers also have intense, red-shifted Q-bands but smaller Soret band splittings. Crystal structures of two new azoporphyrins have been acquired and compared to the azoporphyrin previously synthesised from 5,10,15- triarylsubstituted porphyrin monomers. A completely new cyclic porphyrin oligomer (CPO) was synthesised comprising four porphyrin monomers linked by azo and butadiyne bridges. This is the first cyclic tetramer that has both the azo and butadiyne linking groups. The absorption spectrum of the tetramer exhibits a large Soret split making it more similar to the azo- dimers than the butadiyne-linked dimers. The spectroscopic characteristics of the synthesised tetramer have been compared to the characteristics of other cyclic porphyrin tetramers. The collected data indicate that the new synthesised cyclic tetramer has a more efficient ð-overlap and a better ground state electronic communication between the porphyrin rings.
Resumo:
World economies increasingly demand reliable and economical power supply and distribution. To achieve this aim the majority of power systems are becoming interconnected, with several power utilities supplying the one large network. One problem that occurs in a large interconnected power system is the regular occurrence of system disturbances which can result in the creation of intra-area oscillating modes. These modes can be regarded as the transient responses of the power system to excitation, which are generally characterised as decaying sinusoids. For a power system operating ideally these transient responses would ideally would have a “ring-down” time of 10-15 seconds. Sometimes equipment failures disturb the ideal operation of power systems and oscillating modes with ring-down times greater than 15 seconds arise. The larger settling times associated with such “poorly damped” modes cause substantial power flows between generation nodes, resulting in significant physical stresses on the power distribution system. If these modes are not just poorly damped but “negatively damped”, catastrophic failures of the system can occur. To ensure system stability and security of large power systems, the potentially dangerous oscillating modes generated from disturbances (such as equipment failure) must be quickly identified. The power utility must then apply appropriate damping control strategies. In power system monitoring there exist two facets of critical interest. The first is the estimation of modal parameters for a power system in normal, stable, operation. The second is the rapid detection of any substantial changes to this normal, stable operation (because of equipment breakdown for example). Most work to date has concentrated on the first of these two facets, i.e. on modal parameter estimation. Numerous modal parameter estimation techniques have been proposed and implemented, but all have limitations [1-13]. One of the key limitations of all existing parameter estimation methods is the fact that they require very long data records to provide accurate parameter estimates. This is a particularly significant problem after a sudden detrimental change in damping. One simply cannot afford to wait long enough to collect the large amounts of data required for existing parameter estimators. Motivated by this gap in the current body of knowledge and practice, the research reported in this thesis focuses heavily on rapid detection of changes (i.e. on the second facet mentioned above). This thesis reports on a number of new algorithms which can rapidly flag whether or not there has been a detrimental change to a stable operating system. It will be seen that the new algorithms enable sudden modal changes to be detected within quite short time frames (typically about 1 minute), using data from power systems in normal operation. The new methods reported in this thesis are summarised below. The Energy Based Detector (EBD): The rationale for this method is that the modal disturbance energy is greater for lightly damped modes than it is for heavily damped modes (because the latter decay more rapidly). Sudden changes in modal energy, then, imply sudden changes in modal damping. Because the method relies on data from power systems in normal operation, the modal disturbances are random. Accordingly, the disturbance energy is modelled as a random process (with the parameters of the model being determined from the power system under consideration). A threshold is then set based on the statistical model. The energy method is very simple to implement and is computationally efficient. It is, however, only able to determine whether or not a sudden modal deterioration has occurred; it cannot identify which mode has deteriorated. For this reason the method is particularly well suited to smaller interconnected power systems that involve only a single mode. Optimal Individual Mode Detector (OIMD): As discussed in the previous paragraph, the energy detector can only determine whether or not a change has occurred; it cannot flag which mode is responsible for the deterioration. The OIMD seeks to address this shortcoming. It uses optimal detection theory to test for sudden changes in individual modes. In practice, one can have an OIMD operating for all modes within a system, so that changes in any of the modes can be detected. Like the energy detector, the OIMD is based on a statistical model and a subsequently derived threshold test. The Kalman Innovation Detector (KID): This detector is an alternative to the OIMD. Unlike the OIMD, however, it does not explicitly monitor individual modes. Rather it relies on a key property of a Kalman filter, namely that the Kalman innovation (the difference between the estimated and observed outputs) is white as long as the Kalman filter model is valid. A Kalman filter model is set to represent a particular power system. If some event in the power system (such as equipment failure) causes a sudden change to the power system, the Kalman model will no longer be valid and the innovation will no longer be white. Furthermore, if there is a detrimental system change, the innovation spectrum will display strong peaks in the spectrum at frequency locations associated with changes. Hence the innovation spectrum can be monitored to both set-off an “alarm” when a change occurs and to identify which modal frequency has given rise to the change. The threshold for alarming is based on the simple Chi-Squared PDF for a normalised white noise spectrum [14, 15]. While the method can identify the mode which has deteriorated, it does not necessarily indicate whether there has been a frequency or damping change. The PPM discussed next can monitor frequency changes and so can provide some discrimination in this regard. The Polynomial Phase Method (PPM): In [16] the cubic phase (CP) function was introduced as a tool for revealing frequency related spectral changes. This thesis extends the cubic phase function to a generalised class of polynomial phase functions which can reveal frequency related spectral changes in power systems. A statistical analysis of the technique is performed. When applied to power system analysis, the PPM can provide knowledge of sudden shifts in frequency through both the new frequency estimate and the polynomial phase coefficient information. This knowledge can be then cross-referenced with other detection methods to provide improved detection benchmarks.
Resumo:
Objective: To examine exercise-induced changes in the reward value of food during medium-term supervised exercise in obese individuals. ---------- Subjects/Methods: The study was a 12-week supervised exercise intervention prescribed to expend 500 kcal/day, 5 d/week. 34 sedentary obese males and females were identified as responders (R) or non-responders (NR) to the intervention according to changes in body composition relative to measured energy expended during exercise. Food reward (ratings of liking and wanting, and relative preference by forced choice pairs) for an array of food images was assessed before and after an acute exercise bout. ---------- Results. 20 responders and 14 non-responders were identified. R lost 5.2 kg±2.4 of total fat mass and NR lost 1.7 kg±1.4. After acute exercise, liking for all foods increased in NR compared to no change in R. Furthermore, NR showed an increase in wanting and relative preference for high-fat sweet foods. These differences were independent of 12-weeks regular exercise and weight loss. ---------- Conclusion. Individuals who showed an immediate post-exercise increase in liking and increased wanting and preference for high-fat sweet foods displayed a smaller reduction in fat mass with exercise. For some individuals, exercise increases the reward value of food and diminishes the impact of exercise on fat loss.
Resumo:
Prostrate Cancer(PCa)is the most common cause of cancer death amongst Western males. PCa occurs in two distinct stages. In its early stage, growth and development is dependent primarily on male sex hormones (androgens) such as testosterone, although other growth factors have roles maintaining PCa cell survival in this stage. In the later stage of PCa development, growth and.maintenance is independent of androgen stimulation and growth factors including Insulin-like Growth Factor -1 (IGf.:·l) and Epidermal Growth Factor (EGF) are thought to have more crucial roles in cell survival and PCa progression. PCa, in its late stages, is highly aggressive and metastatic, that is, tumorigenic cells migrate from the primary site of the body (prostate) and travel via the systemic and lymphatic circulation, residing and colonising in the bone, lymph node, lung, and in more rare cases, the brain. Metastasis involves both cell migration and tissue degradation activities. The degradation of the extracellular matrix (ECM), the tissue surrounding the organ, is mediated in part by members of a family of 26 proteins called the Matrix Metalloproteases (MMPs), whilst ceil adhesion molecules, of which proteins known as Integrins are included, mediate ce11 migration. A family of proteins known as the ADAMs (A Disintegrin . And Metalloprotease domain) were a recently characterised family at the commencement of this study and now comprise 34 members. Because of their dual nature, possessing an active metaiioprotease domain, homologous to that of the MMPs, and an integrin-binding domain capable of regulating cell-cell and cell-ECM contacts, it was thought likely that members of the ADAMs family may have implications for the progression of aggressive cancers such as those ofthe prostate. This study focussed on two particular ADAMs -9 and -10. ADAM-9 has an active metalloprotease domain, which has been shown to degrade constituents of the ECM, including fibronectin, in vitro. It also has an integrin-binding capacity through association with key integrins involved in PCa progression, such as a6~1. ADAM-10 has no such integrin binding activities, but its bovine orthologue, MADM, is able to degrade coHagen type IV, a major component of basement membranes. It is likely human ADAM-10 has the same activity. It is also known to cleave Ll -a protein involved in cell anchorage activities - and collagen type XVII - which is a principal component of the hemidesmosomes of cellular tight junctions. The cleavage of these proteins enables the cell to be released from the surrounding environment and commence migratory activities, as required in metastasis. Previous studies in this laboratory showed the mRNA expression of the five ADAMs -9,- 10, -11, -15 and -17 in PCa cell lines, characteristic of androgen-dependent and androgen independent disease. These studies were furthered by the characterisation of AD AM-9, -10 and -17 mRNA regulation by Dihydrotestosterone (DHT) in the androgen-responsive cell line (LNCaP). ADAM-9 and -10 mRNA levels were elevated in response to DHT stimulation. Further to these observations, the expression of ADAM-9 and -10 was shown in primary prostate biopsies from patients with PCa. ADAM-1 0 was expressed in the cytoplasm and on the ceH membrane in epithelial and basal cells ofbenign prostate glands, but in high-grade PCa glands, ADAM-I 0 expression was localised to the nucleus and its expression levels appeared to be elevated when compared to low-grade PCa glands. These studies provided a strong background for the hypothesis that ADAM-9 and -10 have key roles in the development ofPCa and provided a basis for further studies.The aims of this study were to: 1) characterise the expression, localisation and levels, of ADAM-9 and -10 mRNA and protein in cell models representing characteristics of normal through androgen-dependent to androgen-independent PCa, as well as to expand the primary PCa biopsy data for ADAM-9 and ADAM-10 to encompass PCa bone metastases 2) establish an in vitro cell system, which could express elevated levels of ADAM-1 0 so that functional cell-based assays such as cell migration, invasion and attachment could be carried out, and 3) to extend the previous hormonal regulation data, to fully characterise the response of ADAM-9 and -10 mRNA and protein levels to DHT, IGF-1, DHT plus IGF-1 and EGF in the hormonal/growth factor responsive cell line LNCaP. For aim 1 (expression of ADAM-9 and -10 mRNA and protein), ADAM-9 and -10 mRNA were characterised by R T -PCR, while their protein products were analysed by Western blot. Both ADAM-9 and -10 mRNA and protein were expressed at readily detectable levels across progressively metastatic PCa cell lines model that represent characteristics of low-grade,. androgen-dependent (LNCaP and C4) to high-grade, androgen-independent (C4-2 and C4-2B) PCa. When the non-tumorigenic prostate cell line RWPE-1 was compared with the metastatic PCa cell line PC-3, differential expression patterns were seen by Western blot analysis. For ADAM-9, the active form was expressed at higher levels in RWPE-1, whilst subcellular fractionation showed that the active form of ADAM-9 was predominantly located in the cell nucleus. For ADAM-I 0, in both of the cell Jines, a nuclear specific isoform of the mature, catalytically active ADAM-I 0 was found. This isoforrn differed by -2 kDa in Mr (smaller) than the cytoplasmic specific isoform. Unprocessed ADAM-I 0 was readily detected in R WPE-1 cell lines but only occasionally detected in PC-3 cell lines. Immunocytochemistry using ADAM-9 and -10 specific antibodies confirmed nuclear, cytoplasmic and membrane expression of both ADAMs in these two cell lines. To examine the possibility of ADAM-9 and -10 being shed into the extracellular environment, membrane vesicles that are constitutively shed from the cell surface and contain membrane-associated proteins were collected from the media of the prostate cell lines RWPE-1, LNCaP and PC-3. ADAM-9 was readily detectable in RWPE- 1 and LNCaP cell membrane vesicles by Western blot analysis, but not in PC-3 cells, whilst the expression of ADAM-I 0 was detected in shed vesicles from each of these prostate cell lines. By Laser Capture Microdissection (LCM), secretory epithelial cells of primary prostate gland biopsies were isolated from benign and malignant glands. These secretory cells, by Western blot analysis, expressed similar Mr bands for ADAM-9 and -10 that were found in PCa cell lines in vitro, indicating that the nuclear specific isoforrn of ADAM-I 0 was present in PCa primary tumours and may represent the predominantly nuclear form of ADAM-I 0 expression, previously shown in high-grade PCa by immunohistochemistry (IHC). ADAM-9 and -10 were also examined by IHC in bone metastases taken from PCa patients at biopsy. Both ADAMs could be detected at levels similar to those shown for Prostate Specific Antigen (PSA) in these biopsies. Furthermore, both ADAM-9 and -10 were predominantly membrane- bound with occasional nuclear expression. For aim 2, to establish a cell system that over-expressed levels of ADAM-10, two fulllength ADAM-I 0 mammalian expression vectors were constructed; ADAM-I 0 was cloned into pcDNA3.1, which contains a CMV promoter, and into pMEP4, containing an inducible metallothionine promoter, whose activity is stimulated by the addition of CdC}z. The efficiency of these two constructs was tested by way of transient transfection in the PCa cell line PC-3, whilst the pcDNA3.1 construct was also tested in the RWPE-1 prostate cell line. Resultant Western blot analysis for all transient transfection assays showed that levels of ADAM-I 0 were not significantly elevated in any case, when compared to levels of the housekeeping gene ~-Tubulin, despite testing various levels of vector DNA, and, for pMEP4, the induction of the transfected cell system with different degrees of stimulation with CdCh to activate the metallothionine promoter post-transfection. Another study in this laboratory found similar results when the same full length ADAM-10 sequence was cloned into a Green Fluorescent Protein (GFP) expressing vector, as no fluorescence was observed by means of transient tran sfection in the same, and other, PCa cell lines. It was hypothesised that the Kozak sequence included in the full-length construct (human ADAMI 0 naturally occurring sequence) is not strong enough to initiate translation in an artificial system, in cells, which, as described in Aim 1, are already expressing readily detectable levels of endogenous ADAM-10. As a result, time constraints prevented any further progress with Aim 2 and functional studies including cell attachment, invasion and migration were unable to be explored. For Aim 3, to characterise the response of ADAM-9 and -10 mRNA and protein levels to DHT, IGF-1, DHT plus IGF-1 and EGF in LNCaP cells, the levels of ADAM-9 and -10 mRNA were not stimulated by DHT or IGF-I alone, despite our previous observations that initially characterised ADAM-9 and -10 mRNA as being responsive to DHT. However, IGF-1 in synergy with DHT did significantly elevate mRNA levels ofboth ADAMs. In the case of ADAM-9 and -10 protein, the same trends of stimulation as found at the rnRNA level were shown by Western blot analysis when ADAM-9 and -10 signal intensity was normalised with the housekeeping protein ~-Tubulin. For EGF treatment, both ADAM-9 and -10 mRNA and protein levels were significantly elevated, and further investigation vm found this to be the case for each of these ADAMs proteins in the nuclear fractions of LNCaP cells. These studies are the first to describe extensively, the expression and hormonal/growth factor regulation of two members of the ADAMs family ( -9 and -1 0) in PCa. These observations imply that the expression of ADAM-9 and -10 have varied roles in PCa whilst it develops from androgen-sensitive (early stage disease), through to an androgeninsensitive (late-stage), metastatic disease. Further studies are now required to investigate the several key areas of focus that this research has revealed, including: • Investigation of the cellular mechanisms that are involved in actively transporting the ADAMs to the cell's nuclear compartment and the ADAMs functional roles in the cell nucleus. • The construction of a full-length human ADAM-10 mammalian expression construct with the introduction of a new Kozak sequence, that elevates ADAM-I 0 expression in an in vitro cell system are required, so that functional assays such as cell invasion, migration and attachment may be carried out to fmd the functional consequences of ADAM expression on cellular behaviour. • The regulation studies also need to be extended by confirming the preliminary observations that the nuclear levels of ADAMs may also be elevated by hormones and growth factors such as DHT, IGF-1 and EGF, as well as the regulation of levels of plasma membrany vesicle associated ADAM expression. Given the data presented in this study, it is likely the ADAMs have differential roles throughout the development of PCa due to their differential cellular localisation and synergistic growth-factor regulation. These observations, along with those further studies outlined above, are necessary in identifying these specific components ofPCa metastasis to which the ADAMs may contribute.
Resumo:
Stream ciphers are encryption algorithms used for ensuring the privacy of digital telecommunications. They have been widely used for encrypting military communications, satellite communications, pay TV encryption and for voice encryption of both fixed lined and wireless networks. The current multi year European project eSTREAM, which aims to select stream ciphers suitable for widespread adoptation, reflects the importance of this area of research. Stream ciphers consist of a keystream generator and an output function. Keystream generators produce a sequence that appears to be random, which is combined with the plaintext message using the output function. Most commonly, the output function is binary addition modulo two. Cryptanalysis of these ciphers focuses largely on analysis of the keystream generators and of relationships between the generator and the keystream it produces. Linear feedback shift registers are widely used components in building keystream generators, as the sequences they produce are well understood. Many types of attack have been proposed for breaking various LFSR based stream ciphers. A recent attack type is known as an algebraic attack. Algebraic attacks transform the problem of recovering the key into a problem of solving multivariate system of equations, which eventually recover the internal state bits or the key bits. This type of attack has been shown to be effective on a number of regularly clocked LFSR based stream ciphers. In this thesis, algebraic attacks are extended to a number of well known stream ciphers where at least one LFSR in the system is irregularly clocked. Applying algebriac attacks to these ciphers has only been discussed previously in the open literature for LILI-128. In this thesis, algebraic attacks are first applied to keystream generators using stop-and go clocking. Four ciphers belonging to this group are investigated: the Beth-Piper stop-and-go generator, the alternating step generator, the Gollmann cascade generator and the eSTREAM candidate: the Pomaranch cipher. It is shown that algebraic attacks are very effective on the first three of these ciphers. Although no effective algebraic attack was found for Pomaranch, the algebraic analysis lead to some interesting findings including weaknesses that may be exploited in future attacks. Algebraic attacks are then applied to keystream generators using (p; q) clocking. Two well known examples of such ciphers, the step1/step2 generator and the self decimated generator are investigated. Algebraic attacks are shown to be very powerful attack in recovering the internal state of these generators. A more complex clocking mechanism than either stop-and-go or the (p; q) clocking keystream generators is known as mutual clock control. In mutual clock control generators, the LFSRs control the clocking of each other. Four well known stream ciphers belonging to this group are investigated with respect to algebraic attacks: the Bilateral-stop-and-go generator, A5/1 stream cipher, Alpha 1 stream cipher, and the more recent eSTREAM proposal, the MICKEY stream ciphers. Some theoretical results with regards to the complexity of algebraic attacks on these ciphers are presented. The algebraic analysis of these ciphers showed that generally, it is hard to generate the system of equations required for an algebraic attack on these ciphers. As the algebraic attack could not be applied directly on these ciphers, a different approach was used, namely guessing some bits of the internal state, in order to reduce the degree of the equations. Finally, an algebraic attack on Alpha 1 that requires only 128 bits of keystream to recover the 128 internal state bits is presented. An essential process associated with stream cipher proposals is key initialization. Many recently proposed stream ciphers use an algorithm to initialize the large internal state with a smaller key and possibly publicly known initialization vectors. The effect of key initialization on the performance of algebraic attacks is also investigated in this thesis. The relationships between the two have not been investigated before in the open literature. The investigation is conducted on Trivium and Grain-128, two eSTREAM ciphers. It is shown that the key initialization process has an effect on the success of algebraic attacks, unlike other conventional attacks. In particular, the key initialization process allows an attacker to firstly generate a small number of equations of low degree and then perform an algebraic attack using multiple keystreams. The effect of the number of iterations performed during key initialization is investigated. It is shown that both the number of iterations and the maximum number of initialization vectors to be used with one key should be carefully chosen. Some experimental results on Trivium and Grain-128 are then presented. Finally, the security with respect to algebraic attacks of the well known LILI family of stream ciphers, including the unbroken LILI-II, is investigated. These are irregularly clock- controlled nonlinear filtered generators. While the structure is defined for the LILI family, a particular paramater choice defines a specific instance. Two well known such instances are LILI-128 and LILI-II. The security of these and other instances is investigated to identify which instances are vulnerable to algebraic attacks. The feasibility of recovering the key bits using algebraic attacks is then investigated for both LILI- 128 and LILI-II. Algebraic attacks which recover the internal state with less effort than exhaustive key search are possible for LILI-128 but not for LILI-II. Given the internal state at some point in time, the feasibility of recovering the key bits is also investigated, showing that the parameters used in the key initialization process, if poorly chosen, can lead to a key recovery using algebraic attacks.