936 resultados para Suspicious lesion


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The complete genome sequence of bovine papillomavirus 2 (BPV2) from Brazilian Amazon Region was determined using multiple-primed rolling circle amplification followed by Illumina sequencing. The genome is 7,947 bp long, with 45.9% GC content. It encodes seven early (E1, E2, E4, E5, E6, E7, and E8) and two late (L1 and L2) genes. The complete genome of a BPV2 can help in future studies since this BPV type is highly reported worldwide although the lack of complete genome sequences available.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Endosomal Sorting Complex Required for Transport (ESCRT)-complex is composed of four complexes, ESCRT-0-III. They sequentially act on a late endosome to sort mono-ubiquitinated transmembrane proteins into the intralumenal vesicle, forming of a multivesicular body(MVB) that is delivered to vacuole for degradation. In Arabidopsis thaliana, the loss of an ESCRT-I component, elch displays a cytokinesis defect; while a dominant negative expression of an ESCRT-III component results in cell death due to vacuolar loss. In this work, the function of a plant-specific ELCH-interactor, CELL DEATH RELATED FYVE/SYLF DOMAIN CONTAINING 1 (CFS1) and its influences on the ESCRT-complex function are investigated. CFS1 is a phosphatidylinositol-3-phosphate- and actin-binding protein. The cfs1 mutants mimic lesions in the first eldest leaf that propagate to the next eldest one. Genetic analyses have demonstrated that cell death in cfs1 does not require a functional ESCRT-I component; nevertheless, the loss of CFS1 alleviates elchcytokinesis defect, suggesting its influence on the ESCRT-I function. Further analyses reveal that cfs1 accumulates autophagosomes throughout its lifespan due to a decrease in autophagosome degradation, suggesting that as the plant ages, the cumulated autophagosomes falsely trigger effectors-triggered immunity that executes cell death in cfs1. As the ESCRT-complex has been demonstrated to be involved in the delivery of autophagosomes to vacuole and CFS1 homolog, CFS2 reportedly interacts with ATG8, it can be postulated from the results of this work that CFS1 alone or together with CFS2 function in sequestering mature autophagosomes onto MVBs. At the MVBs, the ESCRT-complex then mediates the fusion of autophagosome and MVB for subsequent delivery to vacuole.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

I am suspicious of tools without a purpose - tools that are not developed in response to a clearly defined problem. Of course tools without a purpose can still be useful. However the development of first generation CAD was seriously impeded because the solution came before the problem. We are in danger of repeating this mistake if we do not clarify the nature of the problem that we are trying to solve with the next generation of tools. Back in the 1980s I used to add a postscript slide at the end of CAD conference presentations and the applause would invariably turn to concern. The slide simple asked: can anyone remember what it was about design that needed aiding before we had computer aided design?

Relevância:

10.00% 10.00%

Publicador:

Resumo:

INTRODUCTION Inflammation is a protective attempt to facilitate the removal of damaged tissue and to initiate the healing response in other tissues. However, after spinal cord injury (SCI), this response is prolonged leading to secondary degeneration and glial scarring. Here, we investigate the potential of sustained delivery of pro-inflammatory factors vascular endothelial growth factor (VEGF) and platelet derived growth factor (PDGF) to increase early inflammatory events and promote inflammatory resolution. Method Animal ethics approval was obtained from the Queensland University of Technology. Adult Wistar-Kyoto rats (12-16 weeks old) were subjected to laminectomies and T10 hemisections. Animals were then randomised to treatment (implantation of osmotic pump (Alzet) loaded with 5ug VEGF & 5 ug PDGF) or control groups (lesion control or lesion plus pump delivering PBS). Rats were sacrificed at one month and the spinal cords were harvested and examined by immunohistology, using anti-neurofilament-200(NF200) and anti- ionized calcium binding adapter molecule 1 (Iba1). One way ANOVA was used for statistic analysis. Results At 1 month, active pump-treated cords showed a high level of axonal filament throughout the defects as compared to the control groups. The mean lesion size, as measured by NF200, was 0.47mm2 for the lesion control, 0.39mm2 for the vehicle control and 0.078mm2 for the active pump group. Significant differences were detected between the active pump group and the two control groups (AP vs LC p= 0.017 AG vs VC p= 0.004). Iba-1 staining also showed significant differences in the post-injury inflammatory response. Discussion We have shown that axons and activated microglia are co-located in the lesion of the treated cord. We hypothesise the delivery of VEGF/PDGF increases the local vessel permeability to inflammatory cells and activates these along with the resident microglia to threshold population, which ultimately resolved the prolonged inflammation. Here, we have shown that maintaining the inflammatory signals for at least 7 days improved the morphology of the injured cord. Conclusion This study has shown that boosting inflammation, by delivery VEGF/PDGF, in the early phase of SCI helps to reduce secondary degeneration and may promote inflammation resolution. This treatment may provide a platform for other neuro-regenrative therapies.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Automatic detection of suspicious activities in CCTV camera feeds is crucial to the success of video surveillance systems. Such a capability can help transform the dumb CCTV cameras into smart surveillance tools for fighting crime and terror. Learning and classification of basic human actions is a precursor to detecting suspicious activities. Most of the current approaches rely on a non-realistic assumption that a complete dataset of normal human actions is available. This paper presents a different approach to deal with the problem of understanding human actions in video when no prior information is available. This is achieved by working with an incomplete dataset of basic actions which are continuously updated. Initially, all video segments are represented by Bags-Of-Words (BOW) method using only Term Frequency-Inverse Document Frequency (TF-IDF) features. Then, a data-stream clustering algorithm is applied for updating the system's knowledge from the incoming video feeds. Finally, all the actions are classified into different sets. Experiments and comparisons are conducted on the well known Weizmann and KTH datasets to show the efficacy of the proposed approach.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Despite all attempts to prevent fraud, it continues to be a major threat to industry and government. Traditionally, organizations have focused on fraud prevention rather than detection, to combat fraud. In this paper we present a role mining inspired approach to represent user behaviour in Enterprise Resource Planning (ERP) systems, primarily aimed at detecting opportunities to commit fraud or potentially suspicious activities. We have adapted an approach which uses set theory to create transaction profiles based on analysis of user activity records. Based on these transaction profiles, we propose a set of (1) anomaly types to detect potentially suspicious user behaviour and (2) scenarios to identify inadequate segregation of duties in an ERP environment. In addition, we present two algorithms to construct a directed acyclic graph to represent relationships between transaction profiles. Experiments were conducted using a real dataset obtained from a teaching environment and a demonstration dataset, both using SAP R/3, presently the most predominant ERP system. The results of this empirical research demonstrate the effectiveness of the proposed approach.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Two areas of particular importance in prostate cancer progression are primary tumour development and metastasis. These processes involve a number of physiological events, the mediators of which are still being discovered and characterised. Serine proteases have been shown to play a major role in cancer invasion and metastasis. The recently discovered phenomenon of their activation of a receptor family known as the protease activated receptors (PARs) has extended their physiological role to that of signaling molecule. Several serine proteases are expressed by malignant prostate cancer cells, including members of the kallikreinrelated peptidase (KLK) serine protease family, and increasingly these are being shown to be associated with prostate cancer progression. KLK4 is highly expressed in the prostate and expression levels increase during prostate cancer progression. Critically, recent studies have implicated KLK4 in processes associated with cancer. For example, the ectopic over-expression of KLK4 in prostate cancer cell lines results in an increased ability of these cells to form colonies, proliferate and migrate. In addition, it has been demonstrated that KLK4 is a potential mediator of cellular interactions between prostate cancer cells and osteoblasts (bone forming cells). The ability of KLK4 to influence cellular behaviour is believed to be through the selective cleavage of specific substrates. Identification of relevant in vivo substrates of KLK4 is critical to understanding the pathophysiological roles of this enzyme. Significantly, recent reports have demonstrated that several members of the KLK family are able to activate PARs. The PARs are relatively new members of the seven transmembrane domain containing G protein coupled receptor (GPCR) family. PARs are activated through proteolytic cleavage of their N-terminus by serine proteases, the resulting nascent N-terminal binds intramolecularly to initiate receptor activation. PARs are involved in a number of patho-physiological processes, including vascular repair and inflammation, and a growing body of evidence suggests roles in cancer. While expression of PAR family members has been documented in several types of cancers, including prostate, the role of these GPCRs in prostate cancer development and progression is yet to be examined. Interestingly, several studies have suggested potential roles in cellular invasion through the induction of cytoskeletal reorganisation and expression of basement membrane-degrading enzymes. Accordingly, this program of research focussed on the activation of the PARs by the prostate cancer associated enzyme KLK4, cellular processing of activated PARs and the expression pattern of receptor and agonist in prostate cancer. For these studies KLK4 was purified from the conditioned media of stably transfected Sf9 insect cells expressing a construct containing the complete human KLK4 coding sequence in frame with a V5 epitope and poly-histidine encoding sequences. The first aspect of this study was the further characterisation of this recombinant zymogen form of KLK4. The recombinant KLK4 zymogen was demonstrated to be activatable by the metalloendopeptidase thermolysin and amino terminal sequencing indicated that thermolysin activated KLK4 had the predicted N-terminus of mature active KLK4 (31IINED). Critically, removal of the pro-region successfully generated a catalytically active enzyme, with comparable activity to a previously published recombinant KLK4 produced from S2 insect cells. The second aspect of this study was the activation of the PARs by KLK4 and the initiation of signal transduction. This study demonstrated that KLK4 can activate PAR-1 and PAR-2 to mobilise intracellular Ca2+, but failed to activate PAR-4. Further, KLK4 activated PAR-1 and PAR-2 over distinct concentration ranges, with KLK4 activation and mobilisation of Ca2+ demonstrating higher efficacy through PAR-2. Thus, the remainder of this study focussed on PAR-2. KLK4 was demonstrated to directly cleave a synthetic peptide that mimicked the PAR-2 Nterminal activation sequence. Further, KLK4 mediated Ca2+ mobilisation through PAR-2 was accompanied by the initiation of the extra-cellular regulated kinase (ERK) cascade. The specificity of intracellular signaling mediated through PAR-2 by KLK4 activation was demonstrated by siRNA mediated protein depletion, with a reduction in PAR-2 protein levels correlating to a reduction in KLK4 mediated Ca2+mobilisation and ERK phosphorylation. The third aspect of this study examined cellular processing of KLK4 activated PAR- 2 in a prostate cancer cell line. PAR-2 was demonstrated to be expressed by five prostate derived cell lines including the prostate cancer cell line PC-3. It was also demonstrated by flow cytometry and confocal microscopy analyses that activation of PC-3 cell surface PAR-2 by KLK4 leads to internalisation of this receptor in a time dependent manner. Critically, in vivo relevance of the interaction between KLK4 and PAR-2 was established by the observation of the co-expression of receptor and agonist in primary prostate cancer and prostate cancer bone lesion samples by immunohistochemical analysis. Based on the results of this study a number of exciting future studies have been proposed, including, delineating differences in KLK4 cellular signaling via PAR-1 and PAR-2 and the role of PAR-1 and PAR-2 activation by KLK4 in prostate cancer cells and bone cells in prostate cancer progression.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Monitoring Internet traffic is critical in order to acquire a good understanding of threats to computer and network security and in designing efficient computer security systems. Researchers and network administrators have applied several approaches to monitoring traffic for malicious content. These techniques include monitoring network components, aggregating IDS alerts, and monitoring unused IP address spaces. Another method for monitoring and analyzing malicious traffic, which has been widely tried and accepted, is the use of honeypots. Honeypots are very valuable security resources for gathering artefacts associated with a variety of Internet attack activities. As honeypots run no production services, any contact with them is considered potentially malicious or suspicious by definition. This unique characteristic of the honeypot reduces the amount of collected traffic and makes it a more valuable source of information than other existing techniques. Currently, there is insufficient research in the honeypot data analysis field. To date, most of the work on honeypots has been devoted to the design of new honeypots or optimizing the current ones. Approaches for analyzing data collected from honeypots, especially low-interaction honeypots, are presently immature, while analysis techniques are manual and focus mainly on identifying existing attacks. This research addresses the need for developing more advanced techniques for analyzing Internet traffic data collected from low-interaction honeypots. We believe that characterizing honeypot traffic will improve the security of networks and, if the honeypot data is handled in time, give early signs of new vulnerabilities or breakouts of new automated malicious codes, such as worms. The outcomes of this research include: • Identification of repeated use of attack tools and attack processes through grouping activities that exhibit similar packet inter-arrival time distributions using the cliquing algorithm; • Application of principal component analysis to detect the structure of attackers’ activities present in low-interaction honeypots and to visualize attackers’ behaviors; • Detection of new attacks in low-interaction honeypot traffic through the use of the principal component’s residual space and the square prediction error statistic; • Real-time detection of new attacks using recursive principal component analysis; • A proof of concept implementation for honeypot traffic analysis and real time monitoring.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Despite all attempts to prevent fraud, it continues to be a major threat to industry and government. Traditionally, organizations have focused on fraud prevention rather than detection, to combat fraud. In this paper we present a role mining inspired approach to represent user behaviour in Enterprise Resource Planning (ERP) systems, primarily aimed at detecting opportunities to commit fraud or potentially suspicious activities. We have adapted an approach which uses set theory to create transaction profiles based on analysis of user activity records. Based on these transaction profiles, we propose a set of (1) anomaly types to detect potentially suspicious user behaviour, and (2) scenarios to identify inadequate segregation of duties in an ERP environment. In addition, we present two algorithms to construct a directed acyclic graph to represent relationships between transaction profiles. Experiments were conducted using a real dataset obtained from a teaching environment and a demonstration dataset, both using SAP R/3, presently the predominant ERP system. The results of this empirical research demonstrate the effectiveness of the proposed approach.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Disability following a stroke can impose various restrictions on patients’ attempts at participating in life roles. The measurement of social participation, for instance, is important in estimating recovery and assessing quality of care at the community level. Thus, the identification of factors influencing social participation is essential in developing effective measures for promoting the reintegration of stroke survivors into the community. Data were collected from 188 stroke survivors (mean age 71.7 years) 12 months after discharge from a stroke rehabilitation hospital. Of these survivors, 128 (61 %) had suffered a first ever stroke, and 81 (43 %) had a right hemisphere lesion. Most (n = 156, 83 %) were living in their own home, though 32 (17 %) were living in residential care facilities. Path analysis was used to test a hypothesized model of participation restriction which included the direct and indirect effects between social, psychological and physical outcomes and demographic variables. Participation restriction was the dependent variable. Exogenous independent variables were age, functional ability, living arrangement and gender. Endogenous independent variables were depressive symptoms, state self-esteem and social support satisfaction. The path coefficients showed functional ability having the largest direct effect on participation restriction. The results also showed that more depressive symptoms, low state self-esteem, female gender, older age and living in a residential care facility had a direct effect on participation restriction. The explanatory variables accounted for 71% of the variance in explaining participation restriction. Prediction models have empirical and practical applications such as suggesting important factors to be considered in promoting stroke recovery. The findings suggest that interventions offered over the course of rehabilitation should be aimed at improving functional ability and promoting psychological aspects of recovery. These are likely to enhance stroke survivors resume or maximize their social participation so that they may fulfill productive and positive life roles.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

One of the faba bean viruses found in West Asia and North Africa was identified as broad bean mottle virus (BBMV) by host reactions, particle morphology and size, serology, and granular, often vesiculated cytoplasmic inclusions. Detailed research on four isolates, one each from Morocco, Tunisia, Sudan and Syria, provided new information on the virus. The isolates, though indistinguishable in ELISA or gel-diffusion tests, differed slightly in host range and symptoms. Twenty-one species (12 legumes and 9 non-legumes) out of 27 tested were systemically infected, and 14 of these by all four isolates. Infection in several species was symptomless, but major legumes such as chickpea, lentil and especially pea, suffered severely from infection. All 23 genotypes of faba bean, 2 of chickpea, 4 of lentil, 11 out of 21 of Phaseolus bean, and 16 out of 17 of pea were systemically sensitive to the virus. Twelve plant species were found to be new potential hosts and cucumber a new local-lesion test plant of the virus. BBMV particles occurred in faba bean plants in very high concentrations and seed transmission in this species (1.37%) was confirmed. An isolate from Syria was purified and two antisera were produced, one of which was used in ELISA to detect BBMV in faba bean field samples. Two hundred and three out of the 789 samples with symptoms suggestive of virus infection collected in 1985, 1986 and 1987, were found infected with BBMV: 4 out of 70 (4/70) tested samples from Egypt, 0/44 from Lebanon, 1/15 from Morocco, 46/254 from Sudan, 72/269 from Syria and 80/137 from Tunisia. This is the first report on its occurrence in Egypt, Syria and Tunisia. The virus is a potential threat to crop improvement in the region.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Aim and objective: The primary aim was to examine the prevalence of poststroke depression in Chinese stroke survivors six months after discharge from a rehabilitation hospital. A second aim was to determine whether six-month poststroke depression was associated with psychological, social and physical outcomes and demographic variables.---------- Background: There has been increasing recognition of the influence of depression on poststroke recovery. While some previous studies report associations between depression and social, psychological, physical and clinical outcomes, few studies had sufficient sample sizes for regression analysis thereby limiting the clinical applicability of their findings. ---------- Design: A cross-sectional design was used.---------- Method: Data were collected from 124 male and 86 female stroke survivors (mean age 71Æ7, SD 10Æ2 years). The Geriatric Depression Scale was used to measure depression, the State Self-esteem Scale to measure state self-esteem, the London Handicap Scale to measure participation restriction, the Social Support Questionnaire to measure satisfaction with social support and the Modified Barthel Index to measure functional ability. Results. Forty-two survivors (20Æ5%) reported mild and 33 (16Æ1%) reported severe depression. The presence of depression was associated with low levels of state self-esteem, social support satisfaction and functional ability. Logistic regression analysis revealed that these variables were statistically significant in predicting the probability of having depression (p < 0Æ05). ---------- Conclusions: Analyses in the present study revealed distinct patterns of correlates of depression, and the results were in agreement with prior studies that depression has a consistent positive ssociation with physical disability, living arrangements and social support and no significant association with the different types of brain lesion. Relevance to clinical practice. There is a need, routinely, to assess stroke survivors for depression and, where necessary, to intervene with the aim of enhancing psychological and social well-being.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cellular response to radiation damage is made by a complex network of pathways and feedback loops whose spatiotemporal organisation is still unclear despite its decisive role in determining the fate of the damaged cell. Revealing the dynamic sequence of the repair proteins is therefore critical in understanding how the DNA repair mechanisms work. There are also still open questions regarding the possible movement of damaged chromatin domains and its role as trigger for lesion recognition and signalling in the DNA repair context. The single-cell approach and the high spatial resolution offered by microbeams provide the perfect tool to study and quantify the dynamic processes associated with the induction and repair of DNA damage. We have followed the development of radiation-induced foci for three DNA damage markers (i.e. γ-H2AX, 53BP1 and hSSB1) using normal fibroblasts (AG01522), human breast adenocarcinoma cells (MCF7) and human fibrosarcoma cells (HT1080) stably transfected with yellow fluorescent protein fusion proteins following irradiation with the QUB X-ray microbeam (carbon X-rays <2 µm spot). The size and intensity of the foci has been analysed as a function of dose and time post-irradiation to investigate the dynamics of the above-mentioned DNA repair processes and monitor the remodelling of chromatin structure that the cell undergoes to deal with DNA damage.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Evaluation, selection and finally decision making are all among important issues, which engineers face in long run of projects. Engineers implement mathematical and nonmathematical methods to make accurate and correct decisions, whenever needed. As extensive as these methods are, effects of any selected method on outputs achieved and decisions made are still suspicious. This is more controversial and challengeable, where evaluation is made among non-quantitative alternatives. In civil engineering and construction management problems, criteria include both quantitative and qualitative ones, such as aesthetic, construction duration, building and operation costs, and environmental considerations. As the result, decision making frequently takes place among non-quantitative alternatives. It should be noted that traditional comparison methods, including clear-cut and inflexible mathematics, have always been criticized. This paper demonstrates a brief review of traditional methods of evaluating alternatives. It also offers a new decision making method using, fuzzy calculations. The main focus of this research is some engineering issues, which have flexible nature and vague borders. Suggested method provides analyzability of evaluation for decision makers. It is also capable to overcome multi criteria and multi-referees problems. In order to ease calculations, a program named DeMA is introduced.