2 resultados para microrna target systems


Relevância:

30.00% 30.00%

Publicador:

Resumo:

INTRODUCTION: Development of a therapy for bone metastases is of paramount importance for castration-resistant prostate cancer (CRPC). The osteomimetic properties of CRPC confer a propensity to metastasize to osseous sites. Micro-ribonucleic acid (miRNA) is non-coding RNA that acts as a post-transcriptional regulator of multiple proteins and associated pathways. Therefore identification of miRNAs could reveal a valid third generation therapy for CRPC. Areas covered: miR34a has been found to play an integral role in the progression of prostate cancer, particularly in the regulation of metastatic genes involved in migration, intravasation, extravasation, bone attachment and bone homeostasis. The correlation between miR34a down-regulation and metastatic progression has generated substantial interest in this field. Expert opinion: Examination of the evidence reveals that miR34a is an ideal target for gene therapy for metastatic CRPC. We also conclude that future studies should focus on the effects of miR34a upregulation in CRPC with respect to migration, translocation to bone micro-environment and osteomimetic phenotype development. The success of miR34a as a therapeutic is reliant on the development of appropriate delivery systems and targeting to the bone micro-environment. In tandem with any therapeutic studies, biomarker serum levels should also be ascertained as an indicator of successful miR34a delivery.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Network security monitoring remains a challenge. As global networks scale up, in terms of traffic, volume and speed, effective attribution of cyber attacks is increasingly difficult. The problem is compounded by a combination of other factors, including the architecture of the Internet, multi-stage attacks and increasing volumes of nonproductive traffic. This paper proposes to shift the focus of security monitoring from the source to the target. Simply put, resources devoted to detection and attribution should be redeployed to efficiently monitor for targeting and prevention of attacks. The effort of detection should aim to determine whether a node is under attack, and if so, effectively prevent the attack. This paper contributes by systematically reviewing the structural, operational and legal reasons underlying this argument, and presents empirical evidence to support a shift away from attribution to favour of a target-centric monitoring approach. A carefully deployed set of experiments are presented and a detailed analysis of the results is achieved.