984 resultados para 125-781
Resumo:
OBJECTIVE: Ovarian cancer is the leading cause of death from gynecologic malignancies in the Western world. Fibroblast growth factor receptor (FGFR) signaling has been implicated to play a role in ovarian tumorigenesis. Mutational activation of one member of this receptor family, FGFR2, is a frequent event in endometrioid endometrial cancer. Given the similarities in the histologic and molecular genetics of ovarian and endometrial cancers, we hypothesized that activating FGFR2 mutations may occur in a subset of endometrioid ovarian tumors, and possibly other histotypes. METHODS: Six FGFR2 exons were sequenced in 120 primary ovarian tumors representing the major histologic subtypes. RESULTS: FGFR2 mutation was detected at low frequency in endometrioid (1/46, 2.2%) and serous (1/41, 2.4%) ovarian cancer. No mutations were detected in clear cell, mucinous, or mixed histology tumors or in the ovarian cancer cell lines tested. Functional characterization of the FGFR2 mutations confirmed that the mutations detected in ovarian cancer result in receptor activation. CONCLUSIONS: Despite the low incidence of FGFR2 mutations in ovarian cancer, the two FGFR2 mutations identified in ovarian tumors (S252W, Y376C) overlap with the oncogenic mutations previously identified in endometrial tumors, suggesting activated FGFR2 may contribute to ovarian cancer pathogenesis in a small subset of ovarian tumors.
An approach to statistical lip modelling for speaker identification via chromatic feature extraction
Resumo:
This paper presents a novel technique for the tracking of moving lips for the purpose of speaker identification. In our system, a model of the lip contour is formed directly from chromatic information in the lip region. Iterative refinement of contour point estimates is not required. Colour features are extracted from the lips via concatenated profiles taken around the lip contour. Reduction of order in lip features is obtained via principal component analysis (PCA) followed by linear discriminant analysis (LDA). Statistical speaker models are built from the lip features based on the Gaussian mixture model (GMM). Identification experiments performed on the M2VTS1 database, show encouraging results
Resumo:
p53 is the central member of a critical tumor suppressor pathway in virtually all tumor types, where it is silenced mainly by missense mutations. In melanoma, p53 predominantly remains wild type, thus its role has been neglected. To study the effect of p53 on melanocyte function and melanomagenesis, we crossed the 'high-p53'Mdm4+/- mouse to the well-established TP-ras0/+ murine melanoma progression model. After treatment with the carcinogen dimethylbenzanthracene (DMBA), TP-ras0/+ mice on the Mdm4+/- background developed fewer tumors with a delay in the age of onset of melanomas compared to TP-ras0/+ mice. Furthermore, we observed a dramatic decrease in tumor growth, lack of metastasis with increased survival of TP-ras0/+: Mdm4+/- mice. Thus, p53 effectively prevented the conversion of small benign tumors to malignant and metastatic melanoma. p53 activation in cultured primary melanocyte and melanoma cell lines using Nutlin-3, a specific Mdm2 antagonist, supported these findings. Moreover, global gene expression and network analysis of Nutlin-3-treated primary human melanocytes indicated that cell cycle regulation through the p21WAF1/CIP1 signaling network may be the key anti-melanomagenic activity of p53.
Resumo:
There has recently been noted a rapid increase in research attention to projects that involve outside partners. Our knowledge of such inter-organizational projects, however, is limited. This paper reports large scale data from a repeated trend survey amongst 2000 SMEs in 2006 and 2009 that focused on inter-organizational project ventures. Our major findings indicate that the overall prevalence of inter-organizational project ventures remained significant and stable over time, even despite the economic crisis. Moreover, we find that these ventures predominantly solve repetitive rather than unique tasks and are embedded in prior relations between the partnering organizations. These findings provide empirical support for the recent claims that project management should pay more attention to inter-organizational forms of project organization, and suggest that the archetypical view of projects as being unique in every respect should be reconsidered. Both have important implications for project management, especially in the area of project-based learning.
Resumo:
The field of bereavement and grief has been expanding to recognise the potential for growth following the loss of a loved one. This study sought to examine the effect of the relationship to the deceased and perceptions of the severity of the trauma on dimensions of posttraumatic growth. Participants were 146 people who had lost either: a) a first degree relative, b) a second degree relative, or c) a non-related friend. Results demonstrated that both severity and the relationship to the bereaved differentiate posttraumatic growth outcomes. For example, participants who had lost a first degree relative reported higher levels of growth than those who had lost a second degree relative. Consistent with previous research in general trauma populations, the more severe the loss was rated, the higher the levels of growth. Implications for practice are discussed.
Resumo:
Defence organisations perform information security evaluations to confirm that electronic communications devices are safe to use in security-critical situations. Such evaluations include tracing all possible dataflow paths through the device, but this process is tedious and error-prone, so automated reachability analysis tools are needed to make security evaluations faster and more accurate. Previous research has produced a tool, SIFA, for dataflow analysis of basic digital circuitry, but it cannot analyse dataflow through microprocessors embedded within the circuit since this depends on the software they run. We have developed a static analysis tool that produces SIFA compatible dataflow graphs from embedded microcontroller programs written in C. In this paper we present a case study which shows how this new capability supports combined hardware and software dataflow analyses of a security critical communications device.
Resumo:
Data flow analysis techniques can be used to help assess threats to data confidentiality and integrity in security critical program code. However, a fundamental weakness of static analysis techniques is that they overestimate the ways in which data may propagate at run time. Discounting large numbers of these false-positive data flow paths wastes an information security evaluator's time and effort. Here we show how to automatically eliminate some false-positive data flow paths by precisely modelling how classified data is blocked by certain expressions in embedded C code. We present a library of detailed data flow models of individual expression elements and an algorithm for introducing these components into conventional data flow graphs. The resulting models can be used to accurately trace byte-level or even bit-level data flow through expressions that are normally treated as atomic. This allows us to identify expressions that safely downgrade their classified inputs and thereby eliminate false-positive data flow paths from the security evaluation process. To validate the approach we have implemented and tested it in an existing data flow analysis toolkit.
Resumo:
This article presents a novel approach to confidentiality violation detection based on taint marking. Information flows are dynamically tracked between applications and objects of the operating system such as files, processes and sockets. A confidentiality policy is defined by labelling sensitive information and defining which information may leave the local system through network exchanges. Furthermore, per application profiles can be defined to restrict the sets of information each application may access and/or send through the network. In previous works, we focused on the use of mandatory access control mechanisms for information flow tracking. In this current work, we have extended the previous information flow model to track network exchanges, and we are able to define a policy attached to network sockets. We show an example application of this extension in the context of a compromised web browser: our implementation detects a confidentiality violation when the browser attempts to leak private information to a remote host over the network.
Resumo:
Quantum theory has recently been employed to further advance the theory of information retrieval (IR). A challenging research topic is to investigate the so called quantum-like interference in users’ relevance judgement process, where users are involved to judge the relevance degree of each document with respect to a given query. In this process, users’ relevance judgement for the current document is often interfered by the judgement for previous documents, due to the interference on users’ cognitive status. Research from cognitive science has demonstrated some initial evidence of quantum-like cognitive interference in human decision making, which underpins the user’s relevance judgement process. This motivates us to model such cognitive interference in the relevance judgement process, which in our belief will lead to a better modeling and explanation of user behaviors in relevance judgement process for IR and eventually lead to more user-centric IR models. In this paper, we propose to use probabilistic automaton(PA) and quantum finite automaton (QFA), which are suitable to represent the transition of user judgement states, to dynamically model the cognitive interference when the user is judging a list of documents.
Resumo:
Purpose: Colorectal cancer patients diagnosed with stage I or II disease are not routinely offered adjuvant chemotherapy following resection of the primary tumor. However, up to 10% of stage I and 30% of stage II patients relapse within 5 years of surgery from recurrent or metastatic disease. The aim of this study was to determine if tumor-associated markers could detect disseminated malignant cells and so identify a subgroup of patients with early-stage colorectal cancer that were at risk of relapse. Experimental Design: We recruited consecutive patients undergoing curative resection for early-stage colorectal cancer. Immunobead reverse transcription-PCR of five tumor-associated markers (carcinoembryonic antigen, laminin γ2, ephrin B4, matrilysin, and cytokeratin 20) was used to detect the presence of colon tumor cells in peripheral blood and within the peritoneal cavity of colon cancer patients perioperatively. Clinicopathologic variables were tested for their effect on survival outcomes in univariate analyses using the Kaplan-Meier method. A multivariate Cox proportional hazards regression analysis was done to determine whether detection of tumor cells was an independent prognostic marker for disease relapse. Results: Overall, 41 of 125 (32.8%) early-stage patients were positive for disseminated tumor cells. Patients who were marker positive for disseminated cells in post-resection lavage samples showed a significantly poorer prognosis (hazard ratio, 6.2; 95% confidence interval, 1.9-19.6; P = 0.002), and this was independent of other risk factors. Conclusion: The markers used in this study identified a subgroup of early-stage patients at increased risk of relapse post-resection for primary colorectal cancer. This method may be considered as a new diagnostic tool to improve the staging and management of colorectal cancer. © 2006 American Association for Cancer Research.
Resumo:
The widespread development of Decision Support System (DSS) in construction indicate that the evaluation of software become more important than before. However, it is identified that most research in construction discipline did not attempt to assess its usability. Therefore, little is known about the approach on how to properly evaluate a DSS for specific problem. In this paper, we present a practical framework that can be guidance for DSS evaluation. It focuses on how to evaluate software that is dedicatedly designed for consultant selection problem. The framework features two main components i.e. Sub-system Validation and Face Validation. Two case studies of consultant selection at Malaysian Department of Irrigation and Drainage were integrated in this framework. Some inter-disciplinary area such as Software Engineering, Human Computer Interaction (HCI) and Construction Project Management underpinned the discussion of the paper. It is anticipated that this work can foster better DSS development and quality decision making that accurately meet the client’s expectation and needs
Resumo:
Sfinks is a shift register based stream cipher designed for hardware implementation. The initialisation state update function is different from the state update function used for keystream generation. We demonstrate state convergence during the initialisation process, even though the individual components used in the initialisation are one-to-one. However, the combination of these components is not one-to-one.