881 resultados para flash crowd attack
Resumo:
Authenticated Encryption (AE) is the cryptographic process of providing simultaneous confidentiality and integrity protection to messages. This approach is more efficient than applying a two-step process of providing confidentiality for a message by encrypting the message, and in a separate pass providing integrity protection by generating a Message Authentication Code (MAC). AE using symmetric ciphers can be provided by either stream ciphers with built in authentication mechanisms or block ciphers using appropriate modes of operation. However, stream ciphers have the potential for higher performance and smaller footprint in hardware and/or software than block ciphers. This property makes stream ciphers suitable for resource constrained environments, where storage and computational power are limited. There have been several recent stream cipher proposals that claim to provide AE. These ciphers can be analysed using existing techniques that consider confidentiality or integrity separately; however currently there is no existing framework for the analysis of AE stream ciphers that analyses these two properties simultaneously. This thesis introduces a novel framework for the analysis of AE using stream cipher algorithms. This thesis analyzes the mechanisms for providing confidentiality and for providing integrity in AE algorithms using stream ciphers. There is a greater emphasis on the analysis of the integrity mechanisms, as there is little in the public literature on this, in the context of authenticated encryption. The thesis has four main contributions as follows. The first contribution is the design of a framework that can be used to classify AE stream ciphers based on three characteristics. The first classification applies Bellare and Namprempre's work on the the order in which encryption and authentication processes take place. The second classification is based on the method used for accumulating the input message (either directly or indirectly) into the into the internal states of the cipher to generate a MAC. The third classification is based on whether the sequence that is used to provide encryption and authentication is generated using a single key and initial vector, or two keys and two initial vectors. The second contribution is the application of an existing algebraic method to analyse the confidentiality algorithms of two AE stream ciphers; namely SSS and ZUC. The algebraic method is based on considering the nonlinear filter (NLF) of these ciphers as a combiner with memory. This method enables us to construct equations for the NLF that relate the (inputs, outputs and memory of the combiner) to the output keystream. We show that both of these ciphers are secure from this type of algebraic attack. We conclude that using a keydependent SBox in the NLF twice, and using two different SBoxes in the NLF of ZUC, prevents this type of algebraic attack. The third contribution is a new general matrix based model for MAC generation where the input message is injected directly into the internal state. This model describes the accumulation process when the input message is injected directly into the internal state of a nonlinear filter generator. We show that three recently proposed AE stream ciphers can be considered as instances of this model; namely SSS, NLSv2 and SOBER-128. Our model is more general than a previous investigations into direct injection. Possible forgery attacks against this model are investigated. It is shown that using a nonlinear filter in the accumulation process of the input message when either the input message or the initial states of the register is unknown prevents forgery attacks based on collisions. The last contribution is a new general matrix based model for MAC generation where the input message is injected indirectly into the internal state. This model uses the input message as a controller to accumulate a keystream sequence into an accumulation register. We show that three current AE stream ciphers can be considered as instances of this model; namely ZUC, Grain-128a and Sfinks. We establish the conditions under which the model is susceptible to forgery and side-channel attacks.
Resumo:
Denial-of-service (DoS) attacks are a growing concern to networked services like the Internet. In recent years, major Internet e-commerce and government sites have been disabled due to various DoS attacks. A common form of DoS attack is a resource depletion attack, in which an attacker tries to overload the server's resources, such as memory or computational power, rendering the server unable to service honest clients. A promising way to deal with this problem is for a defending server to identify and segregate malicious traffic as earlier as possible. Client puzzles, also known as proofs of work, have been shown to be a promising tool to thwart DoS attacks in network protocols, particularly in authentication protocols. In this thesis, we design efficient client puzzles and propose a stronger security model to analyse client puzzles. We revisit a few key establishment protocols to analyse their DoS resilient properties and strengthen them using existing and novel techniques. Our contributions in the thesis are manifold. We propose an efficient client puzzle that enjoys its security in the standard model under new computational assumptions. Assuming the presence of powerful DoS attackers, we find a weakness in the most recent security model proposed to analyse client puzzles and this study leads us to introduce a better security model for analysing client puzzles. We demonstrate the utility of our new security definitions by including two hash based stronger client puzzles. We also show that using stronger client puzzles any protocol can be converted into a provably secure DoS resilient key exchange protocol. In other contributions, we analyse DoS resilient properties of network protocols such as Just Fast Keying (JFK) and Transport Layer Security (TLS). In the JFK protocol, we identify a new DoS attack by applying Meadows' cost based framework to analyse DoS resilient properties. We also prove that the original security claim of JFK does not hold. Then we combine an existing technique to reduce the server cost and prove that the new variant of JFK achieves perfect forward secrecy (the property not achieved by original JFK protocol) and secure under the original security assumptions of JFK. Finally, we introduce a novel cost shifting technique which reduces the computation cost of the server significantly and employ the technique in the most important network protocol, TLS, to analyse the security of the resultant protocol. We also observe that the cost shifting technique can be incorporated in any Diffine{Hellman based key exchange protocol to reduce the Diffie{Hellman exponential cost of a party by one multiplication and one addition.
Resumo:
Alcohol consumption is enmeshed with Australian culture (Palk, 2008) and the use and misuse of alcohol contributes to considerable health and social harms (Barbor et al., 2010; English et al., 1995; Gutjahr, Gmel, & Rehm, 2001; Palk, 2008; Steenkamp, Harrison, & Allsop, 2002). Despite shifts in the way that alcohol is consumed and how it is used, it has been reported that one-third of all alcohol consumed is done so within licensed premises (Lang, Stockwell, Rydon, & Gamble, 1992). Consequently, licensed premises are over-represented as settings in which alcohol-related harms occur. These harms, particularly those related to violence, are associated with particular licensed premises operating in the night-time economy (Briscoe & Donnelly, 2001b; Chikritzhs, Stockwell, & Masters, 1997; Homel, Tomsen, & Thommeny, 1991; Stockwell, 1997). Police have a role in not only responding to the manifestation of harms, such as crime, injuries, assaults, domestic violence, stealing and sexual offences, but they also have a role in preventing problems, and thereby reducing alcohol and other drug-related harms (Doherty & Roche, 2003). Given the extent of alcohol consumption within licensed premises and the nature and extent of the harms, as well as the lack of opportunity to influence outcomes in other settings (e.g. the home), licensed premises offer police and other stakeholders a significant opportunity to influence positively the reduction of alcoholrelated harm. This research focuses specifically on the police role in policing licensed premises. Primarily, this research aims to investigate the factors which are relevant to why and how police officers respond to alcohol-related incidents inside and outside licensed premises. It examines the attitudes and beliefs of police and assesses their knowledge, capacity and ability to effectively police licensed premises. The research methodology uses three distinct surveys. Each contributes to understanding the motivations and practice of police officers in this important area of harm reduction. Study One involved a survey of police officers within a police district (Brisbane Central District) in Queensland, Australia and used a comprehensive questionnaire involving both quantitative and qualitative techniques. A key research outcome of Study One was the finding that officers had low levels of knowledge of the strategies that are effective in addressing alcohol-related harm both inside and outside licensed premises. Paradoxically, these officers also reported extensive recent experience in dealing with alcohol issues in these locations. In addition, these officers reported that alcohol was a significant contextual factor in the majority of matters to which they responded. Officers surveyed reported that alcohol increased the difficulty of responding to situations and that licensed premises (e.g. nightclubs, licensed clubs and hotels) were the most difficult contexts to police. Those surveyed were asked to self-assess their knowledge of the Liquor Act (Qld), which is the primary legislative authority in Queensland for regulating licensed premises. Surprisingly, well over half of the officers (65%) reported ‘no’ to ‘fair’ knowledge of the Act, despite officers believing that their skill level to police such premises was in the ‘good to very good range’. In an important finding, officers reported greater skill level to police outside licensed premises than inside such premises, indicating that officers felt less capable, from a skill perspective, to operate within the confines of a licensed premise than in the environment immediately outside such premises. Another key finding was that officers reported greater levels of training in responding to situations outside and around licensed premises than to situations inside licensed premises. Officers were also asked to identify the frequency with which they employed specified regulatory enforcement and community-based strategies. Irrespective of the type of response, ‘taking no action’ or passive policing interventions were not favoured by officers. The findings identified that officers favoured taking a range of strategies (sending home, releasing into the custody of friends, etc.) in preference to arrest. In another key finding, officers generally reported their support for operational stakeholder partnership approaches to policing licensed premises. This was evidenced by the high number of officers (over 90%) reporting that there should be shared responsibility for enforcing the provisions of the Liquor Act. Importantly, those surveyed also identified the factors which constrain or prevent them from policing licensed premises. Study Two involved interviewing a small but comprehensive group (n=11) of senior managers from within the Queensland Police Service (QPS) who have responsibility for setting operational and strategic policy. The aim of this study was to examine the attitudes, perceptions and influence that senior officers (at the strategy and policy-setting level) had on the officers at the operational level. This qualitative study was carried out using a purposive sampling (Denzin & Lincoln, 2005; Guba & Lincoln, 1989), focused interview and thematic analytic approach. The interview participants were drawn from three tiers of management at district, regional as well as the whole-of-organisational level. The first key theme emerging from the study related to role, in terms of both the QPS broader organisational role, and the individual officer role with respect to the policing of licensed premises. For the QPS organisational role, participants at all three strategic levels had a high degree of congruity as to the organisations service role; that is, to enhance public safety. With respect to participants’ beliefs as to whether police officers have knowledge and understanding of their individual roles concerning licensed premises (as opposed to the QPS role), participants reported most commonly that officers had a reasonable to clear understanding of their role. Participant comments also were supportive of the view that officers operating in the research area, Brisbane Central District (BCD), had a clearer understanding of their role than police operating in other locations. The second key theme to emerge identified a disparity between the knowledge and capability of specialist police, compared with general duties police, to police licensed premises. In fact, a number of the responses to a variety of questions differentiated specialist and general police in a range of domains. One such example related to the clarity of understanding of officer role. Participants agreed that specialist police (Liquor Enforcement & Proactive Strategies [LEAPS] officers) had more clarity of understanding in terms of their role than generalist police. Participants also were strongly of the opinion that specialist police had higher skill levels to deal with issues both inside and outside licensed premises. Some participants expressed the view that general duty police undertook purely response-related activities, or alternatively, dealt with lower order matters. Conversely, it was viewed that specialist police undertook more complex tasks because of their higher levels of knowledge and skill. The third key theme to emerge concerned the identification of barriers that serve to restrict or prevent police officers from policing licensed premises. Participant responses strongly indicated that there was a diversity of resourcing barriers that restrict police from undertaking their roles in licensed premises. Examples of such barriers were the lack of police and the low ratio of police to patrons, available officer time, and lack of organisational investment in skills and knowledge acquisition. However, some participants indicated that police resourcing in the BCD was appropriate and officers were equipped with sufficient powers (policy and legislation). Again, the issue of specialist police was raised by one participant who argued that increasing the numbers of specialist police would ameliorate the difficulties for police officers policing licensed premises. The fourth and last key theme to emerge from Study Two related to the perception of senior officers regarding the opportunity and capability of officers to leverage off external partnerships to reduce harms inside and outside licensed premises. Police working in partnership in BCD was seen as an effective harm reduction strategy and strongly supported by the participants. All participants demonstrated a high degree of knowledge as to who these partners were and could identify those government, non-government and community groups precisely. Furthermore, the majority of participants also held strong views that the partnerships were reasonably effective and worked to varying degrees depending on the nature of the partnership and issues such as resourcing. These senior officers identified better communication and coordination as factors that could potentially strengthen these partnerships. This research finding is particularly important for senior officers who have the capacity to shape the policy and strategic direction of the police service, not only in Queensland but throughout Australasia. Study Three examined the perceptions of those with links to the broader liquor industry (government, non-government and community but exclusive of police) concerning their understanding of the police role and the capacity of police to reduce alcohol-related harm inside and outside licensed premises, and their attitudes towards police. Participants (n=26) surveyed represented a range of areas including the liquor industry, business represenatives and government representatives from Queensland Fire and Rescue Service, Queensland Ambulance Service, Brisbane City Council and Queensland Health. The first key theme to emerge from Study Three related to participant understanding of the QPS organisational role, and importantly, individual officer role in policing licensed premises. In terms of participant understanding of the QPS role there was a clear understanding by the majority of participants that the police role was to act in ways consistent with the law and to otherwise engage in a range of enforcement-related activities. Participants saw such activities falling into two categories. The first category related to reactive policing, which included actions around responding to trouble in licensed premises, monitoring crowd controllers and removing trouble-makers. In the second category, proactive approaches, participants identified the following activities as consistent with that approach: early intervention with offenders, support of licensed premises operators and high visibility policing. When participants were asked about their understanding of individual officer roles in the policing of licensed premises, a range of responses were received but the consistent message that emerged was that there is a different role to be played by general duty (uniformed) police compared to specialist (LEAPS Unit) police, which reflects differences in knowledge, skill and capability. The second key theme that emerged from the data related to the external participants’ views of the knowledge and capability of specialist police, compared with general duty police, to police licensed premises. As noted in the first key theme, participants were universally of the view that the knowledge, skill and capability of police in specialist units (LEAPS Unit) was at a higher level than that of general duty police. Participants observed that these specialist officers were better trained than their colleagues in generalist areas and were therefore better able to intervene knowledgeably and authoritatively to deal with problems and issues as they emerged. Participants also reported that officers working within BCD generally had a positive attitude to their duties and had important local knowledge that they could use in the resolution of alcohol-related issues. Participants also commented on the importance of sound and effective QPS leadership, as well as the quality of the leadership in BCD. On both these measures, there was general consensus from participants, who reported positively on the importance and effectiveness of such leadership in BCD. The third key theme to emerge from Study Three concerned the identification of barriers that serve to restrict or prevent police officers from policing licensed premises. Overwhelmingly, external participants reported the lack of human resources (i.e. police officers) as the key barrier. Other resourcing limitations, such as available officer time, police computer systems, and the time taken to charge offenders, were identified as barriers. Some participants identified barriers in the liquor industry such as ‘dodgy operators’ and negative media attention as limitations. Other constraints to emerge related to government and policy barriers. These were reflected in comments about the collection by government of fees from licensees and better ‘powers’ for police to deal with offenders. The fourth and final key theme that emerged from Study Three related to the opportunities for and capability of police to leverage off external partnerships to reduce harms inside and outside licensed premises. Not surprisingly, participants had a comprehensive knowledge of a broad range of stakeholders, from a diversity of contexts, influential in addressing issues in licensed premises. Many participants reported their relationships with the police and other stakeholders as effective, productive and consistent with the objectives of partnering to reduce alcohol-related harm. On the other hand, there were those who were concerned with their relationship with other stakeholders, particularly those with a compliance function (e.g. Office of Liquor & Gaming Regulation [OLGR]). The resourcing limitations of partners and stakeholders were also raised as an important constraining factor in fulfilling the optimum relationship. Again, political issues were mentioned in terms of the impact on partnerships, with participants stating that there is at times political interference and that politicians complicate the relationships of stakeholders. There are some significant strengths with respect to the methodology of this research. The research is distinguished from previous work in that it examines these critical issues from three distinct perspectives (i.e. police officer, senior manager and external stakeholder). Other strengths relate to the strong theoretical framework that guides and informs the research. There are also some identified limitations, including the subjective nature of self-report data as well as the potential for bias by the author, which was controlled for using a range of initiatives. A further limitation concerns the potential for transferability and generalisability of the findings to other locations given the distinctive nature of the BCD. These limitations and issues of transferability are dealt with at length in the thesis. Despite a growing body of literature about contextual harms associated with alcohol, and specific research concerning police intervention in such contextual harms, there is still much to learn. While research on the subject of police engaging in alcohol-related incidents has focused on police behaviours and strategies in response to such issues, there is a paucity of research that focuses on the knowledge and understanding of officers engaged in such behaviours and practices. Given the scarcity of research dealing with the knowledge, skills and attitudes of police officers responding to harms inside and outside licensed premises, this research contributes significantly to what is a recent and growing body of research and literature in the field. The research makes a practical contribution to police agencies’ understanding of officer knowledge and police practice in ways that have the potential to shape education and training agendas, policy approaches around generalist versus specialist policing, strategic and operational strategy, as well as partnership engagements. The research also makes a theoretical contribution given that the research design is informed by the Three Circle
Resumo:
This paper presents a nonlinear gust-attenuation controller based on constrained neural-network (NN) theory. The controller aims to achieve sufficient stability and handling quality for a fixed-wing unmanned aerial system (UAS) in a gusty environment when control inputs are subjected to constraints. Constraints in inputs emulate situations where aircraft actuators fail requiring the aircraft to be operated with fail-safe capability. The proposed controller enables gust-attenuation property and stabilizes the aircraft dynamics in a gusty environment. The proposed flight controller is obtained by solving the Hamilton-Jacobi-Isaacs (HJI) equations based on an policy iteration (PI) approach. Performance of the controller is evaluated using a high-fidelity six degree-of-freedom Shadow UAS model. Simulations show that our controller demonstrates great performance improvement in a gusty environment, especially in angle-of-attack (AOA), pitch and pitch rate. Comparative studies are conducted with the proportional-integral-derivative (PID) controllers, justifying the efficiency of our controller and verifying its suitability for integration into the design of flight control systems for forced landing of UASs.
Resumo:
Purpose – This paper aims to provide insights into the moral values embodied by a popular social networking site (SNS), Facebook. Design/methodology/approach – This study is based upon qualitative fieldwork, involving participant observation, conducted over a two-year period. The authors adopt the position that technology as well as humans has a moral character in order to disclose ethical concerns that are not transparent to users of the site. Findings – Much research on the ethics of information systems has focused on the way that people deploy particular technologies, and the consequences arising, with a view to making policy recommendations and ethical interventions. By focusing on technology as a moral actor with reach across and beyond the internet, the authors reveal the complex and diffuse nature of ethical responsibility and the consequent implications for governance of SNS. Research limitations/implications – The authors situate their research in a body of work known as disclosive ethics, and argue for an ongoing process of evaluating SNS to reveal their moral importance. Along with that of other authors in the genre, this work is largely descriptive, but the paper engages with prior research by Brey and Introna to highlight the scope for theory development. Practical implications – Governance measures that require the developers of social networking sites to revise their designs fail to address the diffuse nature of ethical responsibility in this case. Such technologies need to be opened up to scrutiny on a regular basis to increase public awareness of the issues and thereby disclose concerns to a wider audience. The authors suggest that there is value in studying the development and use of these technologies in their infancy, or if established, in the experiences of novice users. Furthermore, flash points in technological trajectories can prove useful sites of investigation. Originality/value – Existing research on social networking sites either fails to address ethical concerns head on or adopts a tool view of the technologies so that the focus is on the ethical behaviour of users. The authors focus upon the agency, and hence the moral character, of technology to show both the possibilities for, and limitations of, ethical interventions in such cases.
Resumo:
Detailed mechanisms for the formation of hydroxyl or alkoxyl radicals in the reactions between tetrachloro-p-benzoquinone (TCBQ) and organic hydroperoxides are crucial for better understanding the potential carcinogenicity of polyhalogenated quinones. Herein, the mechanism of the reaction between TCBQ and H2O2 has been systematically investigated at the B3LYP/6-311++G** level of theory in the presence of different numbers of water molecules. We report that the whole reaction can easily take place with the assistance of explicit water molecules. Namely, an initial intermediate is formed first. After that, a nucleophilic attack of H2O2 onto TCBQ occurs, which results in the formation of a second intermediate that contains an OOH group. Subsequently, this second intermediate decomposes homolytically through cleavage of the O-O bond to produce a hydroxyl radical. Energy analyses suggest that the nucleophilic attack is the rate-determining step in the whole reaction. The participation of explicit water molecules promotes the reaction significantly, which can be used to explain the experimental phenomena. In addition, the effects of F, Br, and CH3 substituents on this reaction have also been studied.
Resumo:
In this paper, we present three counterfeiting attacks on the block-wise dependent fragile watermarking schemes. We consider vulnerabilities such as the exploitation of a weak correlation among block-wise dependent watermarks to modify valid watermarked %(medical or other digital) images, where they could still be verified as authentic, though they are actually not. Experimental results successfully demonstrate the practicability and consequences of the proposed attacks for some relevant schemes. The development of the proposed attack models can be used as a means to systematically examine the security levels of similar watermarking schemes.
Resumo:
The Transport Layer Security (TLS) protocol is the most widely used security protocol on the Internet. It supports negotiation of a wide variety of cryptographic primitives through different cipher suites, various modes of client authentication, and additional features such as renegotiation. Despite its widespread use, only recently has the full TLS protocol been proven secure, and only the core cryptographic protocol with no additional features. These additional features have been the cause of several practical attacks on TLS. In 2009, Ray and Dispensa demonstrated how TLS renegotiation allows an attacker to splice together its own session with that of a victim, resulting in a man-in-the-middle attack on TLS-reliant applications such as HTTP. TLS was subsequently patched with two defence mechanisms for protection against this attack. We present the first formal treatment of renegotiation in secure channel establishment protocols. We add optional renegotiation to the authenticated and confidential channel establishment model of Jager et al., an adaptation of the Bellare--Rogaway authenticated key exchange model. We describe the attack of Ray and Dispensa on TLS within our model. We show generically that the proposed fixes for TLS offer good protection against renegotiation attacks, and give a simple new countermeasure that provides renegotiation security for TLS even in the face of stronger adversaries.
Resumo:
This paper reports on current research work with children and young people on the importance of public and private space for good health, wellbeing, social, educational and developmental outcomes. In many urban locations in Australia and elsewhere, public space is under attack from developers and attempts by authorities to control public space (Watson 2006). Private space in the home and garden-backyard is also under attack from development densification and trends towards bigger houses on smaller plots of land where gardens disappear altogether or a postage stamp remains (Gleeson and Sipe 2006). At the same time public policy advocates the benefits of outdoor exercise, set alongside fears about using public space exacerbated by notions of ‘stranger danger’ and control measures such as child and youth ‘curfews’. In this increasingly complex context, it is important to discover what children and young people value and need most in using private (home) and public space. In conjunction with the University of Otago, New Zealand, children and young people are consulted to discover how they use public space in parks and shopping centres and home space and the issues encountered and their proposals for improvement, to better inform policy debate, planning and formulation (ARACY 2009).
Resumo:
This paper presents a comprehensive formal security framework for key derivation functions (KDF). The major security goal for a KDF is to produce cryptographic keys from a private seed value where the derived cryptographic keys are indistinguishable from random binary strings. We form a framework of five security models for KDFs. This consists of four security models that we propose: Known Public Inputs Attack (KPM, KPS), Adaptive Chosen Context Information Attack (CCM) and Adaptive Chosen Public Inputs Attack(CPM); and another security model, previously defined by Krawczyk [6], which we refer to as Adaptive Chosen Context Information Attack(CCS). These security models are simulated using an indistinguisibility game. In addition we prove the relationships between these five security models and analyse KDFs using the framework (in the random oracle model).
Resumo:
Migraine is a common neurological disease with a genetic basis affecting approximately 12% of the population. Pain during a migraine attack is associated with activation of the trigeminal nerve system, which carries pain signals from the meninges and the blood vessels infusing the meninges to the trigeminal nucleus in the brain stem. The release of inflammatory mediators following cortical spreading depression (CSD) may further promote and sustain the activation and sensitization of meningeal nociceptors, inducing the persistent throbbing headache characterised in migraine. Lymphotoxin α (LTA) is a cytokine secreted by lymphocytes and is a member of the tumour necrosis factor (TNF) family. Genetic variation with the TNF and LTA genes may contribute to threshold brain excitability, propagation of neuronal hyperexcitability and thus initiation and maintenance of a migraine attack. Three LTA variants rs2009658, rs2844482 and rs2229094 were identified in a recent pGWAS study conducted in the Norfolk Island population as being potentially implicated in migraine with nominally significant p values of p = 0.0093, p = 0.0088 and p = 0.033 respectively. To determine whether these SNPs played a role in migraine in a general outbred population these SNPs were gentoyped in a large case control Australian Caucasian population and tested for association with migraine. All three SNPs showed no association in our cohort (p > 0.05). Validation of GWAS data in independent case-controls cohorts is essential to establish risk validity within specific population groups. The importance of cytokines in modulating neural inflammation and pain threshold in addition to other studies showing associations between TNF-α and SNPs in the LTA gene with migraine, suggests that LTA could be an important factor contributing to migraine. Although the present study did not support a role for the tested LTA variants in migraine, investigation of other variants within the LTA gene is still warranted.
Resumo:
PURPOSE: We sought to determine whether conjunctival ultraviolet autofluorescence (UVAF), a biomarker of outdoor light exposure, is associated with myopia. METHODS: We performed a cross-sectional study on Norfolk Island and recruited individuals aged ≥ 15 years. Participants completed a sun-exposure questionnaire and underwent non-cycloplegic autorefraction. Conjunctival UVAF used a specially adapted electronic flash system fitted with UV-transmission filters (transmittance range 300-400 nm, peak 365 nm) as the excitation source. Temporal and nasal conjunctival UVAF was measured in both eyes using computerized photographic analysis with the sum referred to as "total UVAF." RESULTS: In 636 participants, prevalence of myopia decreased with an increasing quartile of total UVAF (P(trend) = 0.002). Median total UVAF was lower in subjects with myopia (spherical equivalent [SE] ≤ -1.0 diopter [D]) than participants without myopia: 16.6 mm(2) versus 28.6 mm(2), P = 0.001. In the multivariable model that adjusted for age, sex, smoking, cataract, height and weight, UVAF was independently associated with myopia (SE ≤ -1.0 D): odds ratio (OR) for total UVAF (per 10 mm(2)) was 0.81, 95% confidence interval (CI) 0.69 to 0.94, P = 0.007. UVAF was also significantly associated with myopia when analysis was restricted to subjects <50 years, and in moderate-severe myopia (SE ≤ -3.0 D). Prevalence of myopia decreased with increasing time outdoors (P(trend) = 0.03), but time outdoors was not associated with myopia on multivariable analysis. CONCLUSIONS: Study authors identified a protective association between increasing UVAF and myopia. The protective association of higher UVAF against myopia was stronger than that of increased levels of time spent outdoors as measured by this study's questionnaire. Future studies should investigate the association between UVAF and incident myopia, and its relationship to myopic progression.
Resumo:
BACKGROUND: Transcatheter closure of patent foramen ovale (PFO) has rapidly evolved as the preferred management strategy for the prevention of recurrent cerebrovascular events in patients with cryptogenic stroke and presumed paradoxical embolus. There is limited outcome data in patients treated with this therapy particularly for the newer devices. METHODS: Data from medical records, catheter, and echocardiography databases on 70 PFO procedures performed was collected prospectively. RESULTS: The cohort consisted of 70 patients (mean age 43.6 years, range 19 to 77 years), of whom 51% were male. The indications for closure were cryptogenic cerebrovascular accident (CVA) or transient ischemic attack (TIA) in 64 (91%) and peripheral emboli in two (2.8%) patients and cryptogenic ST-elevation myocardial infarction in one (1.4%), refractory migraine in one (1.4%), decompression sickness in one (1.4%), and orthodeoxia in one (1.4%) patient, respectively. All patients had demonstrated right-to-left shunting on bubble study. The procedures were guided by intracardiac echocardiography in 53%, transesophageal echocardiography in 39%, and the remainder by transthoracic echo alone. Devices used were the Amplatzer PFO Occluder (AGA Medical) (sizes 18-35 mm) in 49 (70%) and the Premere device (St. Jude Medical) in 21 (30%). In-hospital complications consisted of one significant groin hematoma with skin infection. Echocardiographic follow-up at 6 months revealed that most patients had no or trivial residual shunt (98.6%), while one patient (1.4%) had a mild residual shunt. At a median of 11 months' follow-up (range 1 month to 4.3 years), no patients (0%) experienced further CVA/TIAs or paradoxical embolic events during follow-up. CONCLUSION: PFO causing presumed paradoxical embolism can be closed percutaneously with a low rate of significant residual shunting and very few complications. Recurrent index events are uncommon at medium-term (up to 4 years) follow-up.
Resumo:
Introduction Gene expression profiling has enabled us to demonstrate the heterogeneity of breast cancers. The potential of a tumour to grow and metastasise is partly dependant on its ability to initiate angiogenesis or growth and remodelling of new blood vessels, usually from a pre-existing vascular network, to ensure delivery of oxygen, nutrients, and growth factors to rapidly dividing transformed cells along with access to the systemic circulation. Cell–cell signalling of semaphorin ligands through interaction with their plexin receptors is important for the homeostasis and morphogenesis of many tissues and has been widely studied for a role in neural connectivity, cancer, cell migration and immune responses. This study investigated the role of four semaphorin/plexin signalling genes in human breast cancers in vivo and in vitro. Materials and methods mRNA was extracted from formalin fixed paraffin embedded archival breast invasive ductal carcinoma tissue samples of progressive grades (grades I–III) and compared to tissue from benign tumours. Gene expression profiles were determined by microarray using the Affymetrix GeneChip® Human Genome U133 Plus 2.0 Arrays and validated by Q-PCR using a Corbett RotorGene 6000. Following validation, the gene expression profile of the identified targets was correlated with those of the human breast cancer cell lines MCF-7 and MDA-MD-231. Results The array data revealed that 888 genes were found to be significantly (p ≤ 0.05) differentially expressed between grades I and II tumours and 563 genes between grade III and benign tumours. From these genes, we identified four genes involved in semaphorin–plexin signalling including SEMA4D which has previously been identified as being involved in increased angiogenesis in breast cancers, and three other genes, SEMA4F, PLXNA2 and PLXNA3, which in the literature were associated with tumourigenesis, but not directly in breast tumourigenesis. The microarray analysis revealed that SEMA4D was significantly (P = 0.0347) down-regulated in the grade III tumours compared to benign tumours; SEMA4F, was significantly (P = 0.0159) down-regulated between grades I and II tumours; PLXNA2 was significantly (P = 0.036) down-regulated between grade III and benign tumours and PLXNA3 significantly (P = 0.042) up-regulated between grades I and II tumours. Gene expression of SEMA4D was validated using Q-PCR, demonstrating the same expression profile in both data sets. When the sample set was increased to incorporate more cases, SEMA4D continued to follow the same expression profile, including statistical significance for the differences observed and small standard deviations. In vitro the same pattern was present where expression for SEMA4D was significantly higher in MDA-MB-231 cells when compared to MCF-7 cells. The expression of SEMA4F, PLXNA2 and PLXNA3 could not be validated using Q-PCR, however in vitro analysis of these three genes revealed that both SEMA4F and PLXNA3 followed the microarray trend in expression, although they did not reach significance. In contrast, PLXNA2 demonstrated statistical significance and was in concordance with the literature. Discussion We, and others, have proposed SEMA4D to be a gene with a potentially protective effect in benign tumours that contributes to tumour growth and metastatic suppression. Previous data supports a role for SEMA4F as a tumour suppressor in the peripheral nervous system but our data seems to indicate that the gene is involved in tumour progression in breast cancer. Our in vitro analysis of PLXNA2 revealed that the gene has higher expression in more aggressive breast cancer cell types. Finally, our in vitro analysis on PLXNA3 also suggest that this gene may have some form of growth suppressive role in breast cancer, in addition to a similar role for the gene previously reported in ovarian cancer. From the data obtained in this study, SEMA4D may have a role in more aggressive and potentially metastatic breast tumours. Conclusions Semaphorins and their receptors, the plexins, have been implicated in numerous aspects of neural development, however their expression in many other epithelial tissues suggests that the semaphorin–plexin signalling system also contributes to blood vessel growth and development. These findings warrant further investigation of the role of semaphorins and plexins and their role in normal and tumour-induced angiogenesis in vivo and in vitro. This may represent a new front of attack in anti-angiogenic therapies of breast and other cancers.
Resumo:
Migraine is a debilitating neurovascular disorder, with a substantial genetic component. The exact cause of a migraine attack is unknown; however cortical hyperexcitability is thought to play a role. As Gamma-aminobutyric Acid (GABA) is the major inhibitory neurotransmitter in the brain, malfunctioning of this system may be a cause of the hyperexcitability. To date, there has been limited research examining the gene expression or genetics of GABA receptors in relation to migraine. The aim of our study was to determine if GABA receptors play a role in migraine by investigating their gene expression using profile in migraine affected individuals and non-affected controls by Q-PCR. Gene expression of GABA(A) receptor subunit isoforms (GABRA3, GABRB3, GABRQ) and GABA(B) receptor 2 (GABBR2) was quantified in mRNA obtained from peripheral blood leukocytes from 28 migraine subjects and 22 healthy control subjects. Analysis of results showed that two of the tested genes, GABRA3 and GABBR2, were significantly down regulated in migraineurs (P=0.018; P=0.017), compared to controls. Results from the other tested genes did not show significant gene expression variation. The results indicate that there may be specific GABA receptor gene expression variation in migraine, particularly involving the GABRA3 and GABBR2 genes. This study also identifies GABRA3 and GABBR2 as potential biomarkers to select migraineurs that may be more responsive to GABA agonists with future investigations in this area warranted.