931 resultados para cryptographic protocols


Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Japanese language is recognised as being more difficult than European languages, needing three times more tuition time to reach comparable levels of proficiency. Encouraging Japanese as a Foreign Language (JFL) students to become aware of, and effectively use, learner strategies is one way to assist them become more controlled, effective learners leading to enhanced language learning. This thesis investigates the development and implementation of a JFL curriculum implemented in a university course for students learning JFL. The curriculum was developed specifically to assist beginner university students with the development of learner strategies appropriate for a JFL reading context. The theoretical underpinning of the study was informed by Educational Criticism (Eisner, 1998), which aims to describe, interpret and evaluate the processes of interaction between the teacher, the learner and the curriculum and the students' learning processes in a tertiary JFL classroom. The study investigated the effect on student learning processes of a JFL reading program that incorporated explicit learner strategy instruction and identified factors that enhanced or impeded the development of learner strategy knowledge. The participants in the study were 29 students enrolled in the course, 10 of whom volunteered to undertake additional tasks, and the two teachers who implemented the curriculum. Data collection involved a number of different strategies to observe the students' participation in the classroom and learning experiences. Learning processes were investigated through TOL protocols, classroom observations, course evaluations, interviews, and learner strategy use measurement instruments (SILL, SILK and SORS) to document student uptake of learner strategies. The design of the study and its applied focus recognised my expertise as a JFL teacher, curriculum writer and researcher, an approach that aligns with the purpose of a Professional Doctorate. Four general thematics, or principles, were identified in this study: „h Explicit learner strategy instruction provides the context for students to develop awareness of learner strategies and take control of their learning; „h Collaborative learning and interaction with teachers offers students the opportunity for shared knowledge construction; „h Reflection offers teachers and students the opportunity to reflect on their own learning style and strategy knowledge, and raises awareness of other available strategies; and „h Diverse cultural and linguistic backgrounds have an impact on curriculum implementation and student uptake of learner strategies. The study¡¦s methodological contribution is that it is one of the first in Australia to use Educational Criticism (Eisner, 1998) as a research methodology. The findings contribute to theoretical knowledge in the fields of Applied Linguistics, Second Language Teaching and Learning, Second Language Acquisition and JFL Teaching and Learning by offering new knowledge on the importance of learner strategies in the beginner JFL classroom, the potential of explicit strategy instruction, the value of reflection for both teachers and students, and the important role of the teacher in the process of curriculum implementation. The general principles identified and the findings of this in-depth study of a JFL classroom can be drawn upon to inform other teaching practice situations, and invite practitioners from not just Japanese, but from other language areas and other disciplines, to examine and improve their own practices, and suggest further research questions to pursue this line of enquiry.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper proposes how ecological dynamics, a theory focusing on the performer-environment relationship, provides a basis for understanding skill acquisition in sport. From this perspective, learners are conceptualized as complex, neurobiological systems in which inherent self-organisation tendencies support the emergence of adaptive behaviours under a range of interacting task and environmental constraints. Intentions, perceptions and actions are viewed as intertwined processes which underpin functional movement solutions assembled by each learner during skill acquisition. These ideas suggest that skill acquisition programmes need to sample information from the performance environment to guide behaviour in practice tasks. Skill acquisition task protocols should allow performers to use movement variability to explore and create opportunities for action, rather than constraining them to passively receiving information. This conceptualisation also needs to characterize the design of talent evaluation tests, which need to faithfully represent the perception-action relationships in the performance environment. Since the dynamic nature of changing task constraints in sports cannot be predicted over longer timescales, an implication is that talent programmes should focus on developing performance expertise in each individual, rather than over-relying on identification of expert performers at specific points in time.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We conducted on-road and simulator studies to explore the mechanisms underpinning driver-rider crashes. In Study 1 the verbal protocols of 40 drivers and riders were assessed at intersections as part of a 15km on-road route in Melbourne. Network analysis of the verbal transcripts highlighted key differences in the situation awareness of drivers and riders at intersections. In a further study using a driving simulator we examined in car drivers the influence of acute exposure to motorcyclists. In a 15 min simulated drive, 40 drivers saw either no motorcycles or a high number of motorcycles in the surrounding traffic. In a subsequent 45-60 min drive, drivers were asked to detect motorcycles in traffic. The proportion of motorcycles was manipulated so that there was either a high (120) or low (6) number of motorcycles during the drive. Those drivers exposed to a high number of motorcycles were significantly faster at detecting motorcycles. Fundamentally, the incompatible situation awareness at intersections by drivers and riders underpins the conflicts. Study 2 offers some suggestion for a countermeasure here, although more research around schema and exposure training to support safer interactions is needed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Driver behaviour at rail level crossings represents a key area for further research. This paper describes an on-road study comparing novice and experienced driver situation awareness at rural rail level crossings. Participants provided verbal protocols while driving a pre-determined rural route incorporating ten rail level crossings. Driver situation awareness was assessed using a network analysis approach. The analysis revealed key differences between novice and experienced drivers' situation awareness. In particular, the novice drivers seemed to be more reliant on rail level crossing warnings and their situation awareness was less focussed on the environment outside of the rail level crossing. In closing, the implications for rail level crossing safety are discussed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Collisions among trains and cars at road/rail level crossings (LXs) can have severe consequences such as high level of fatalities, injuries and significant financial losses. As communication and positioning technologies have significantly advanced, implementing vehicular ad hoc networks (VANETs) in the vicinity of unmanned LXs, generally LXs without barriers, is seen as an efficient and effective approach to mitigate or even eliminate collisions without imposing huge infrastructure costs. VANETs necessitate unique communication strategies, in which routing protocols take a prominent part in their scalability and overall performance, through finding optimised routes quickly and with low bandwidth overheads. This article studies a novel geo-multicast framework that incorporates a set of models for communication, message flow and geo-determination of endangered vehicles with a reliable receiver-based geo-multicast protocol to support cooperative level crossings (CLXs), which provide collision warnings to the endangered motorists facing road/rail LXs without barriers. This framework is designed and studied as part of a $5.5 m Government and industry funded project, entitled 'Intelligent-Transport-Systems to improve safety at road/rail crossings'. Combined simulation and experimental studies of the proposed geo-multicast framework have demonstrated promising outcomes as cooperative awareness messages provide actionable critical information to endangered drivers who are identified by CLXs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Quantity and timing of protein ingestion are major factors regulating myofibrillar protein synthesis (MPS). However, the effect of specific ingestion patterns on MPS throughout a 12 h period is unknown. We determined how different distributions of protein feeding during 12 h recovery after resistance exercise affects anabolic responses in skeletal muscle. Twenty-four healthy trained males were assigned to three groups (n = 8/group) and undertook a bout of resistance exercise followed by ingestion of 80 g of whey protein throughout 12 h recovery in one of the following protocols: 8 × 10 g every 1.5 h (PULSE); 4 × 20 g every 3 h (intermediate: INT); or 2 × 40 g every 6 h (BOLUS). Muscle biopsies were obtained at rest and after 1, 4, 6, 7 and 12 h post exercise. Resting and post-exercise MPS (l-[ring-(13)C6] phenylalanine), and muscle mRNA abundance and cell signalling were assessed. All ingestion protocols increased MPS above rest throughout 1-12 h recovery (88-148%, P < 0.02), but INT elicited greater MPS than PULSE and BOLUS (31-48%, P < 0.02). In general signalling showed a BOLUS>INT>PULSE hierarchy in magnitude of phosphorylation. MuRF-1 and SLC38A2 mRNA were differentially expressed with BOLUS. In conclusion, 20 g of whey protein consumed every 3 h was superior to either PULSE or BOLUS feeding patterns for stimulating MPS throughout the day. This study provides novel information on the effect of modulating the distribution of protein intake on anabolic responses in skeletal muscle and has the potential to maximize outcomes of resistance training for attaining peak muscle mass.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

PURPOSE We have previously shown that the aminoacidemia caused by the consumption of a rapidly digested protein after resistance exercise enhances muscle protein synthesis (MPS) more than the amino acid (AA) profile associated with a slowly digested protein. Here, we investigated whether differential feeding patterns of a whey protein mixture commencing before exercise affect postexercise intracellular signaling and MPS. METHODS Twelve resistance-trained males performed leg resistance exercise 45 min after commencing each of three volume-matched nutrition protocols: placebo (PLAC, artificially sweetened water), BOLUS (25 g of whey protein + 5 g of leucine dissolved in artificially sweetened water; 1× 500 mL), or PULSE (15× 33-mL aliquots of BOLUS drink every 15 min). RESULTS The preexercise rise in plasma AA concentration with PULSE was attenuated compared with BOLUS (P < 0.05); this effect was reversed after exercise, with two-fold greater leucine concentrations in PULSE compared with BOLUS (P < 0.05). One-hour postexercise, phosphorylation of p70 S6K and rpS6 was increased above baseline with BOLUS and PULSE, but not PLAC (P < 0.05); furthermore, PULSE > BOLUS (P < 0.05). MPS throughout 5 h of recovery was higher with protein ingestion compared with PLAC (0.037 ± 0.007), with no differences between BOLUS or PULSE (0.085 ± 0.013 vs. 0.095 ± 0.010%•h, respectively, P = 0.56). CONCLUSIONS Manipulation of aminoacidemia before resistance exercise via different patterns of intake of protein altered plasma AA profiles and postexercise intracellular signaling. However, there was no difference in the enhancement of the muscle protein synthetic response after exercise. Protein sources producing a slow AA release, when consumed before resistance exercise in sufficient amounts, are as effective as rapidly digested proteins in promoting postexercise MPS.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

INTRODUCTION It is known that the vascular morphology and functionality are changed following closed soft tissue trauma (CSTT) [1], and bone fractures [2]. The disruption of blood vessels may lead to hypoxia and necrosis. Currently, most clinical methods for the diagnosis and monitoring of CSTT with or without bone fractures are primarily based on qualitative measures or practical experience, making the diagnosis subjective and inaccurate. There is evidence that CSTT and early vascular changes following the injury delay the soft tissue tissue and bone healing [3]. However, a precise qualitative and quantitative morphological assessment of vasculature changes after trauma is currently missing. In this research, we aim to establish a diagnostic framework to assess the 3D vascular morphological changes after standardized CSTT in a rat model qualitatively and quantitatively using contrast-enhanced micro-CT imaging. METHODS An impact device was used for the application of a controlled reproducible CSTT to the left thigh (Biceps Femoris) of anaesthetized male Wistar rats. After euthanizing the animals at 6 hours, 24 hours, 3 days, 7 days, or 14 days after trauma, CSTT was qualitatively evaluated by macroscopic visual observation of the skin and muscles. For visualization of the vasculature, the blood vessels of sacrificed rats were flushed with heparinised saline and then perfused with a radio-opaque contrast agent (Microfil, MV 122, Flowtech, USA) using an infusion pump. After allowing the contrast agent to polymerize overnight, both hind-limbs were dissected, and then the whole injured and contra-lateral control limbs were imaged using a micro-CT scanner (µCT 40, Scanco Medical, Switzerland) to evaluate the vascular morphological changes. Correlated biopsy samples were also taken from the CSTT region of both injured and control legs. The morphological parameters such as the vessel volume ratio (VV/TV), vessel diameter (V.D), spacing (V.Sp), number (V.N), connectivity (V.Conn) and the degree of anisotropy (DA) were then quantified by evaluating the scans of biopsy samples using the micro-CT imaging system. RESULTS AND DISCUSSION A qualitative evaluation of the CSTT has shown that the developed impact protocols were capable of producing a defined and reproducible injury within the region of interest (ROI), resulting in a large hematoma and moderate swelling in both lateral and medial sides of the injured legs. Also, the visualization of the vascular network using 3D images confirmed the ability to perfuse the large vessels and a majority of the microvasculature consistently (Figure 1). Quantification of the vascular morphology obtained from correlated biopsy samples has demonstrated that V.D and V.N and V.Sp were significantly higher in the injured legs 24 hours after impact in comparison with the control legs (p<0.05). The evaluation of the other time points is currently progressing. CONCLUSIONS The findings of this research will contribute to a better understanding of the changes to the vascular network architecture following traumatic injuries and during healing process. When interpreted in context of functional changes, such as tissue oxygenation, this will allow for objective diagnosis and monitoring of CSTT and serve as validation for future non-invasive clinical assessment modalities.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The need to address on-road motorcycle safety in Australia is important due to the disproportionately high percentage of riders and pillions killed and injured each year. One approach to preventing motorcycle-related injury is through training and education. However, motorcycle rider training lacks empirical support as an effective road safety countermeasure to reduce crash involvement. Previous reviews have highlighted that risk-taking is a contributing factor in many motorcycle crashes, rather than merely a lack of vehicle-control skills (Haworth & Mulvihill, 2005; Jonah, Dawson & Bragg, 1982; Watson et al, 1996). Hence, though the basic vehicle-handling skills and knowledge of road rules that are taught in most traditional motorcycle licence training programs may be seen as an essential condition of safe riding, they do not appear to be sufficient in terms of crash reduction. With this in mind there is considerable scope for the improvement of program focus and content for rider training and education. This program of research examined an existing traditional pre-licence motorcycle rider training program and formatively evaluated the addition of a new classroom-based module to address risky riding; the Three Steps to Safer Riding program. The pilot program was delivered in the real world context of the Q-Ride motorcycle licensing system in the state of Queensland, Australia. Three studies were conducted as part of the program of research: Study 1, a qualitative investigation of delivery practices and student learning needs in an existing rider training course; Study 2, an investigation of the extent to which an existing motorcycle rider training course addressed risky riding attitudes and motives; and Study 3, a formative evaluation of the new program. A literature review as well as the investigation of learning needs for motorcyclists in Study 1 aimed to inform the initial planning and development of the Three Steps to Safer Riding program. Findings from Study 1 suggested that the training delivery protocols used by the industry partner training organisation were consistent with a learner-centred approach and largely met the learning needs of trainee riders. However, it also found that information from the course needs to be reinforced by on-road experiences for some riders once licensed and that personal meaning for training information was not fully gained until some riding experience had been obtained. While this research informed the planning and development of the new program, a project team of academics and industry experts were responsible for the formulation of the final program. Study 2 and Study 3 were conducted for the purpose of formative evaluation and program refinement. Study 2 served primarily as a trial to test research protocols and data collection methods with the industry partner organisation and, importantly, also served to gather comparison data for the pilot program which was implemented with the same rider training organisation. Findings from Study 2 suggested that the existing training program of the partner organisation generally had a positive (albeit small) effect on safety in terms of influencing attitudes to risk taking, the propensity for thrill seeking, and intentions to engage in future risky riding. However, maintenance of these effects over time and the effects on riding behaviour remain unclear due to a low response rate upon follow-up 24 months after licensing. Study 3 was a formative evaluation of the new pilot program to establish program effects and possible areas for improvement. Study 3a examined the short term effects of the intervention pilot on psychosocial factors underpinning risky riding compared to the effects of the standard traditional training program (examined in Study 2). It showed that the course which included the Three Steps to Safer Riding program elicited significantly greater positive attitude change towards road safety than the existing standard licensing course. This effect was found immediately following training, and mean scores for attitudes towards safety were also maintained at the 12 month follow-up. The pilot program also had an immediate effect on other key variables such as risky riding intentions and the propensity for thrill seeking, although not significantly greater than the traditional standard training. A low response rate at the 12 month follow-up unfortunately prevented any firm conclusions being drawn regarding the impact of the pilot program on self-reported risky riding once licensed. Study 3a further showed that the use of intermediate outcomes such as self-reported attitudes and intentions for evaluation purposes provides insights into the mechanisms underpinning risky riding that can be changed by education and training. A multifaceted process evaluation conducted in Study 3b confirmed that the intervention pilot was largely delivered as designed, with course participants also rating most aspects of training delivery highly. The complete program of research contributed to the overall body of knowledge relating to motorcycle rider training, with some potential implications for policy in the area of motorcycle rider licensing. A key finding of the research was that psychosocial influences on risky riding can be shaped by structured education that focuses on awareness raising at a personal level and provides strategies to manage future riding situations. However, the formative evaluation was mainly designed to identify areas of improvement for the Three Steps to Safer Riding program and found several areas of potential refinement to improve future efficacy of the program. This included aspects of program content, program delivery, resource development, and measurement tools. The planned future follow-up of program participants' official crash and traffic offence records over time may lend further support for the application of the program within licensing systems. The findings reported in this thesis offer an initial indication that the Three Steps to Safer Riding is a useful resource to accompany skills-based training programs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Gifted students who have a reading disability have learning characteristics that set them apart from their peers. The ability to read impacts upon all areas of the formal curriculum in which print-based texts are common. Therefore, the full intellectual development of gifted students with a reading disability can be repressed because their access to learning opportunities is reduced. When the different learning needs caused by concomitant giftedness and reading disability are not met, it can have serious implications for both academic achievement and the social-emotional wellbeing of these students. In order to develop a deeper understanding of this vulnerable group of students, this study investigated the learning characteristics of gifted students with a reading disability. Furthermore, it investigated how the learning characteristics of these students impact upon their lived experiences. Since achievement and motivation have been shown to be closely linked to self-efficacy, self-efficacy theory underpinned the conceptual framework of the study. The study used a descriptive case study approach to document the lived experiences of gifted students with a reading disability. Nine participants aged between 11 and 18, who were formally identified as gifted with a reading disability, took part in the study. Data sources in the case study database included: cognitive assessments, such as WISC assessments, Stanford Binet 5, or the Raven's Standard Progressive Matrices; the WIAT II reading assessment; the Reader Self-Perception Scale; document reviews; parent and teacher checklists designed to gain information about the students' learning characteristics; and semi-structured interviews with students. The study showed that gifted students with a reading disability display a complex profile of learning strengths and weaknesses. As a result, they face a daily struggle of trying to reconcile the confusion of being able to complete some tasks to a high level, while struggling to read. The study sheds light on the myriad of issues faced by the students at school. It revealed that when the particular learning characteristics and needs of gifted students with a reading disability are recognised and met, these students can experience academic success, and avoid the serious social-emotional complications cited in previous studies. Indeed, rather than suffering from depression, disengagement from learning, and demotivation, these students were described as resilient, independent, determined, goal oriented and motivated to learn and persevere. Notably, the students in the study had developed effective coping strategies for dealing with the daily challenges they faced. These strategies are outlined in the thesis together with the advice students offered for helping other gifted students with a reading disability to succeed. Their advice is significant for all teachers who wish to nurture the potential of those students who face the challenge of being gifted with a reading disability, and for the parents of these students. This research advances knowledge pertaining to the theory of self-efficacy, and self-efficacy in reading specifically, by showing that although gifted students with a reading disability have low self-efficacy, the level is not the same for all aspects of reading. Furthermore, despite low self-efficacy in reading these students remained motivated. The study also enhances existing knowledge in the areas of gifted education and special education because it documents the lived experience of gifted students with a specific learning disability in reading from the students' perspectives. Based on a synthesis of the literature and research findings, an Inclusive Pathway Model is proposed that describes a framework to support gifted students with a reading disability so that they might achieve, and remain socially and emotionally well-adjusted. The study highlights the importance of clear identification protocols (such as the use of a range of assessment sources, discussions with students and parents, and an awareness of the characteristics of gifted students with a reading disability) and support mechanisms for assisting students (for example, differentiated reading instruction and the use of assistive technology).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Even though web security protocols are designed to make computer communication secure, it is widely known that there is potential for security breakdowns at the human-machine interface. This paper examines findings from a qualitative study investigating the identification of security decisions used on the web. The study was designed to uncover how security is perceived in an individual user's context. Study participants were tertiary qualified individuals, with a focus on HCI designers, security professionals and the general population. The study identifies that security frameworks for the web are inadequate from an interaction perspective, with even tertiary qualified users having a poor or partial understanding of security, of which they themselves are acutely aware. The result is that individuals feel they must protect themselves on the web. The findings contribute a significant mapping of the ways in which individuals reason and act to protect themselves on the web. We use these findings to highlight the need to design for trust at three levels, and the need to ensure that HCI design does not impact on the users' main identified protection mechanism: separation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A fundamental part of many authentication protocols which authenticate a party to a human involves the human recognizing or otherwise processing a message received from the party. Examples include typical implementations of Verified by Visa in which a message, previously stored by the human at a bank, is sent by the bank to the human to authenticate the bank to the human; or the expectation that humans will recognize or verify an extended validation certificate in a HTTPS context. This paper presents general definitions and building blocks for the modelling and analysis of human recognition in authentication protocols, allowing the creation of proofs for protocols which include humans. We cover both generalized trawling and human-specific targeted attacks. As examples of the range of uses of our construction, we use the model presented in this paper to prove the security of a mutual authentication login protocol and a human-assisted device pairing protocol.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Sector wide interest in Reframe: QUT’s Evaluation Framework continues with a number of institutions requesting finer details as QUT embeds the new approach to evaluation across the university in 2013. This interest, both nationally and internationally has warranted QUT’s collegial response to draw upon its experiences from developing Reframe into distilling and offering Kaleidoscope back to the sector. The word Reframe is a relevant reference for QUT’s specific re-evaluation, reframing and adoption of a new approach to evaluation; whereas Kaleidoscope reflects the unique lens through which any other institution will need to view their own cultural specificity and local context through an extensive user-led stakeholder engagement approach when introducing new approaches to learning and teaching evaluation. Kaleidoscope’s objectives are for QUT to develop its research-based stakeholder approach to distil the successful experience exhibited in the Reframe Project into a transferable set of guidelines for use by other tertiary institutions across the sector. These guidelines will assist others to design, develop, and deploy, their own culturally specific widespread organisational change informed by stakeholder engagement and organisational buy-in. It is intended that these guidelines will promote, support and enable other tertiary institutions to embark on their own evaluation projects and maximise impact. Kaleidoscope offers an institutional case study of widespread organisational change underpinned by Reframe’s (i) evidence-based methodology; (ii) research including published environmental scan, literature review (Alderman, et al., 2012), development of a conceptual model (Alderman, et al., in press 2013), project management principles (Alderman & Melanie, 2012) and national conference peer reviews; and (iii) year-long strategic project with national outreach to collaboratively engage the development of a draft set of National Guidelines. Kaleidoscope’s aims are to inform Higher Education evaluation policy development through national stakeholder engagement, the finalisation of proposed National Guidelines. In correlation with the conference paper, the authors will present a Draft Guidelines and Framework ready for external peer review by evaluation practitioners from the Higher Education sector, as part of Kaleidoscope’s dissemination strategy (Hinton & Gannaway, 2011) applying illuminative evaluation theory (Parlett & Hamilton, 1976), through conference workshops and ongoing discussions (Shapiro, et al., 1983; Jacobs, 2000). The initial National Guidelines will be distilled from the Reframe: QUT’s Evaluation Framework’s Policy, Protocols, and incorporated Business Rules. It is intended that the outcomes of Kaleidoscope are owned by and reflect sectoral engagement, including iterative evaluation through multiple avenues of dissemination and collaboration including the Higher Education sector. The dissemination strategy with the inclusion of Illuminative Evaluation methodology provides an inclusive opportunity for other institutions and stakeholders across the Higher Education sector to give voice through the information-gathering component of evaluating the draft Guidelines, providing a comprehensive understanding of the complex realities experienced across the Higher Education sector, and thereby ‘illuminating’ both the shared and unique lenses and contexts. This process will enable any final guidelines developed to have broader applicability, greater acceptance, enhanced sustainability and additional relevance benefiting the Higher Education sector, and the adoption and adaption by any single institution for their local contexts.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Non-linear feedback shift register (NLFSR) ciphers are cryptographic tools of choice of the industry especially for mobile communication. Their attractive feature is a high efficiency when implemented in hardware or software. However, the main problem of NLFSR ciphers is that their security is still not well investigated. The paper makes a progress in the study of the security of NLFSR ciphers. In particular, we show a distinguishing attack on linearly filtered NLFSR (or LF-NLFSR) ciphers. We extend the attack to a linear combination of LF-NLFSRs. We investigate the security of a modified version of the Grain stream cipher and show its vulnerability to both key recovery and distinguishing attacks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background IL-23 is a member of the IL-6 super-family and plays key roles in cancer. Very little is currently known about the role of IL-23 in non-small cell lung cancer (NSCLC). Methods RT-PCR and chromatin immunopreciptiation (ChIP) were used to examine the levels, epigenetic regulation and effects of various drugs (DNA methyltransferase inhibitors, Histone Deacetylase inhibitors and Gemcitabine) on IL-23 expression in NSCLC cells and macrophages. The effects of recombinant IL-23 protein on cellular proliferation were examined by MTT assay. Statistical analysis consisted of Student's t-test or one way analysis of variance (ANOVA) where groups in the experiment were three or more. Results In a cohort of primary non-small cell lung cancer (NSCLC) tumours, IL-23A expression was significantly elevated in patient tumour samples (p<0.05). IL-23A expression is epigenetically regulated through histone post-translational modifications and DNA CpG methylation. Gemcitabine, a chemotherapy drug indicated for first-line treatment of NSCLC also induced IL-23A expression. Recombinant IL-23 significantly increased cellular proliferation in NSCLC cell lines. Conclusions These results may therefore have important implications for treating NSCLC patients with either epigenetic targeted therapies or Gemcitabine. © 2012 Elsevier Ireland Ltd.