982 resultados para Claiborne, Harry Eugene
Resumo:
Articular cartilage provides a low-friction surface for joint articulation, with boundary lubrication facilitated by proteoglycan 4 (PRG4), which is secreted by chondrocytes of the superficial zone. Chondrocytes from different zones are phenotypically distinct, and their phenotypes in vitro are influenced by the system in which they are cultured. We hypothesized that culturing cells from the superficial (S) zone in two-dimensional monolayer or three-dimensional alginate would affect their synthesis of PRG4, and that subsequently seeding them atop alginate-recovered cells from the middle/ deep (M) zone in various proportions would result in tissue-engineered constructs with varying levels of PRG4 secretion and matrix accumulation. During monolayer culture, S cells retained their PRG4-secreting phenotype, whereas in alginate culture the percentage of cells secreting PRG4 decreased with time. Constructs formed with increasing percentages of S cells decreased in thickness and matrix accumulation, depending on both the culture conditions before construct formation and the S-cell density. PRG4-secreting cells were localized to the S-cell seeded construct surface, with secretion rates of 0.1–4 pg/cell/day or 0.1–1 pg/cell/day for constructs formed with monolayer-recovered or alginate-recovered S cells, respectively. Tailoring secretion of PRG4 in cartilage constructs may be useful for enhancing low-friction properties at the articular surface, while maintaining other surfaces free of PRG4 for enhancing integration with surrounding tissues.
Resumo:
An initialisation process is a key component in modern stream cipher design. A well-designed initialisation process should ensure that each key-IV pair generates a different key stream. In this paper, we analyse two ciphers, A5/1 and Mixer, for which this does not happen due to state convergence. We show how the state convergence problem occurs and estimate the effective key-space in each case.
Resumo:
Sfinks is a shift register based stream cipher designed for hardware implementation. The initialisation state update function is different from the state update function used for keystream generation. We demonstrate state convergence during the initialisation process, even though the individual components used in the initialisation are one-to-one. However, the combination of these components is not one-to-one.
Resumo:
Both the SSS and SOBER-t32 stream cipher designs use a single word-based shift register and a nonlinear filter function to produce keystream. In this paper we show that the algebraic attack method previously applied to SOBER-t32 is prevented from succeeding on SSS by the use of the key dependent substitution box (SBox) in the nonlinear filter of SSS. Additional assumptions and modifications to the SSS cipher in an attempt to enable algebraic analysis result in other difficulties that also render the algebraic attack infeasible. Based on these results, we conclude that a well chosen key-dependent substitution box used in the nonlinear filter of the stream cipher provides resistance against such algebraic attacks.
Resumo:
During the course of several natural disasters in recent years, Twitter has been found to play an important role as an additional medium for many–to–many crisis communication. Emergency services are successfully using Twitter to inform the public about current developments, and are increasingly also attempting to source first–hand situational information from Twitter feeds (such as relevant hashtags). The further study of the uses of Twitter during natural disasters relies on the development of flexible and reliable research infrastructure for tracking and analysing Twitter feeds at scale and in close to real time, however. This article outlines two approaches to the development of such infrastructure: one which builds on the readily available open source platform yourTwapperkeeper to provide a low–cost, simple, and basic solution; and, one which establishes a more powerful and flexible framework by drawing on highly scaleable, state–of–the–art technology.
Resumo:
Normal thoracic kyphosis Cobb angle for T5-T12 is most commonly reported as a range of 20-40º [1]. Patients with adolescent idiopathic scoliosis (AIS) exhibit a reduced thoracic kyphosis or hypokyphosis [2] accompanying the coronal and rotary distortion components. As a result, surgical restoration of the thoracic kyphosis while maintaining lumbar lordosis and overall sagittal balance is a critical aspect of achieving good clinical outcomes in AIS patients. Previous studies report an increase in thoracic kyphosis after anterior surgical approaches [3] and a flattening of sagittal contours following posterior approaches [4]. Difficulties with measuring sagittal parameters on radiographs are avoided with reformatted sagittal CT reconstructions due to the superior endplate clarity afforded by this imaging modality and are the subject of analysis in this study.
Resumo:
Background. Previous studies report an increase in thoracic kyphosis after anterior approaches and a flattening of sagittal contours following posterior approaches. Difficulties with measuring sagittal parameters on radiographs are avoided with reformatted sagittal CT reconstructions due to the superior endplate clarity afforded by this imaging modality. Methods. A prospective study of 30 Lenke 1 adolescent idiopathic scoliosis (AIS) patients receiving selective thoracoscopic anterior spinal fusion (TASF) was performed. Participants had ethically approved low dose CT scans at minimum 24 months after surgery in addition to their standard care following surgery. The change in sagittal contours on supine CT was compared to standing radiographic measurements of the same patients and with previous studies. Inter-observer variability was assessed as well as whether hypokyphotic and normokyphotic patient groups responded differently to the thoracoscopic anterior approach. Results. Mean T5-12 kyphosis Cobb angle increased by 11.8 degrees and lumbar lordosis increased by 5.9 degrees on standing radiographs two years after surgery. By comparison, CT measurements of kyphosis and lordosis increased by 12.3 degrees and 7.0 degrees respectively. 95% confidence intervals for inter-observer variability of sagittal contour measurements on supine CT ranged between 5-8 degrees. TASF had a slightly greater corrective effect on patients who were hypokyphotic before surgery compared with those who were normokyphotic. Conclusions. Restoration of sagittal profile is an important goal of scoliosis surgery, but reliable measurement with radiographs suffers from poor endplate clarity. TASF significantly improves thoracic kyphosis and lumbar lordosis while preserving proximal and distal junctional alignment in thoracic AIS patients. Supine CT allows greater endplate clarity for sagittal Cobb measurements and linear relationships were found between supine CT and standing radiographic measurements. In this study, improvements in sagittal kyphosis and lordosis following surgery were in agreement with prior anterior surgery studies, and add to the current evidence suggesting that anterior correction is more capable than posterior approaches of addressing the sagittal component of both the instrumented and adjacent non instrumented segments following surgical correction of progressive Lenke 1 idiopathic scoliosis.
Resumo:
This paper presents a model for generating a MAC tag with a stream cipher using the input message indirectly. Several recent proposals represent instances of this model with slightly different options. We investigate the security of this model for different options, and identify cases which permit forgery attacks. Based on this, we present a new forgery attack on version 1.4 of 128-EIA3. Design recommendations to enhance the security of proposals following this general model are given.
Resumo:
This paper presents a model for generating a MAC tag by injecting the input message directly into the internal state of a nonlinear filter generator. This model generalises a similar model for unkeyed hash functions proposed by Nakano et al. We develop a matrix representation for the accumulation phase of our model and use it to analyse the security of the model against man-in-the-middle forgery attacks based on collisions in the final register contents. The results of this analysis show that some conclusions of Nakano et al regarding the security of their model are incorrect. We also use our results to comment on several recent MAC proposals which can be considered as instances of our model and specify choices of options within the model which should prevent the type of forgery discussed here. In particular, suitable initialisation of the register and active use of a secure nonlinear filter will prevent an attacker from finding a collision in the final register contents which could result in a forged MAC.