206 resultados para prognostic signature

em Queensland University of Technology - ePrints Archive


Relevância:

30.00% 30.00%

Publicador:

Resumo:

BACKGROUND AND AIMS: Crohn's disease (CD) is an inflammatory bowel disease (IBD) caused by a combination of genetic, clinical, and environmental factors. Identification of CD patients at high risk of requiring surgery may assist clinicians to decide on a top-down or step-up treatment approach. METHODS: We conducted a retrospective case-control analysis of a population-based cohort of 503 CD patients. A regression-based data reduction approach was used to systematically analyse 63 genomic, clinical and environmental factors for association with IBD-related surgery as the primary outcome variable. RESULTS: A multi-factor model was identified that yielded the highest predictive accuracy for need for surgery. The factors included in the model were the NOD2 genotype (OR = 1.607, P = 2.3 × 10(-5)), having ever had perianal disease (OR = 2.847, P = 4 × 10(-6)), being post-diagnosis smokers (OR = 6.312, P = 7.4 × 10(-3)), being an ex-smoker at diagnosis (OR = 2.405, P = 1.1 × 10(-3)) and age (OR = 1.012, P = 4.4 × 10(-3)). Diagnostic testing for this multi-factor model produced an area under the curve of 0.681 (P = 1 × 10(-4)) and an odds ratio of 3.169, (95 % CI P = 1 × 10(-4)) which was higher than any factor considered independently. CONCLUSIONS: The results of this study require validation in other populations but represent a step forward in the development of more accurate prognostic tests for clinicians to prescribe the most optimal treatment approach for complicated CD patients.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The security of strong designated verifier (SDV) signature schemes has thus far been analyzed only in a two-user setting. We observe that security in a two-user setting does not necessarily imply the same in a multi-user setting for SDV signatures. Moreover, we show that existing security notions do not adequately model the security of SDV signatures even in a two-user setting. We then propose revised notions of security in a multi-user setting and show that no existing scheme satisfies these notions. A new SDV signature scheme is then presented and proven secure under the revised notions in the standard model. For the purpose of constructing the SDV signature scheme, we propose a one-pass key establishment protocol in the standard model, which is of independent interest in itself.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

- This paper presents a validation proposal for development of diagnostic and prognostic algorithms for SF6 puffer circuit-breakers reproduced from actual site waveforms. The re-ignition/restriking rates are duplicated in given circuits and the cumulative energy dissipated in interrupters by the restriking currents. The targeted objective is to provide a simulated database for diagnosis of re-ignition/restrikes relating to the phase to earth voltage and the number of re-ignition/restrikes as well as estimating the remaining life of SF6 circuit-breakers. The model-based diagnosis of a tool will be useful in monitoring re-ignition/restrikes as well as predicting a nozzle’s lifetime. This will help ATP users with practical study cases and component data compilation for shunt reactor switching and capacitor switching. This method can be easily applied with different data for the different dielectric curves of circuit breakers and networks. This paper presents modelling details and some of the available cases, required project support, the validation proposal, the specific plan for implementation and the propsed main contributions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Introduction: Evidence suggests a positive association between quality of life (QOL). and overall survival(OS). among metastatic breast cancer (BC). patients, although the relationship in early-stage BC is unclear. This work examines the association between QOL and OS following a diagnosis of early-stage BC. ----- Methods: A population-based sample of Queensland women (n=287). with early-stage, invasive, unilateral BC, were prospectively observed for a median of 6.6 years. QOL was assessed at six and 18 months post-diagnosis using the Functional Assessment of Cancer Therapy, Breast FACT-B+4. questionnaire. Raw scores for the FACT-B+4 scales were computed and individuals were categorised according to whether QOL declined, remained stable or improved over time. OS was measured from the date of diagnosis to the date of death or was censored at the date of last follow-up. Risk ratios (RR) and 95% confidence intervals (CI). for the association between QOL and OS were obtained using Cox proportional hazards survival models adjusted for confounding characteristics. ----- Results: A total of 27 (9.4%). women died during the follow-up period. Three baseline QOL scales (emotional, general and overall QOL) were significantly associated with OS, with RRs ranging between 0.89 95% CI: 0.81, 0.98; P=0.01. and 0.98 (95% CI: 0.96, 0.99; P=0.03),indicating a 2%-11% reduced risk of death for every one unit increase in QOL. When QOL was categorised according to changes between six and 18 months post-diagnosis, analyses showed that for those who experienced declines in functional and physical QOL, risk of death increased by two- (95% CI: 1.43, 12.52; P<0.01) and four-fold (95% CI: 1.15, 7.19; P=0.02), respectively. Conclusions: This work indicates that specific QOL scales at six months post-diagnosis, and changes in certain QOL scales over the subsequent 12-month period (as measured by the FACT-B+4), are associated with overall survival in women with early-stage breast cancer.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Tzeng et al. proposed a new threshold multi-proxy multi-signature scheme with threshold verification. In their scheme, a subset of original signers authenticates a designated proxy group to sign on behalf of the original group. A message m has to be signed by a subset of proxy signers who can represent the proxy group. Then, the proxy signature is sent to the verifier group. A subset of verifiers in the verifier group can also represent the group to authenticate the proxy signature. Subsequently, there are two improved schemes to eliminate the security leak of Tzeng et al.’s scheme. In this paper, we have pointed out the security leakage of the three schemes and further proposed a novel threshold multi-proxy multi-signature scheme with threshold verification.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A strong designated verifier signature scheme makes it possible for a signer to convince a designated verifier that she has signed a message in such a way that the designated verifier cannot transfer the signature to a third party, and no third party can even verify the validity of a designated verifier signature. We show that anyone who intercepts one signature can verify subsequent signatures in Zhang-Mao ID-based designated verifier signature scheme and Lal-Verma ID-based designated verifier proxy signature scheme. We propose a new and efficient ID-based designated verifier signature scheme that is strong and unforgeable. As a direct corollary, we also get a new efficient ID-based designated verifier proxy signature scheme.