991 resultados para sequence components


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Prostrate Cancer(PCa)is the most common cause of cancer death amongst Western males. PCa occurs in two distinct stages. In its early stage, growth and development is dependent primarily on male sex hormones (androgens) such as testosterone, although other growth factors have roles maintaining PCa cell survival in this stage. In the later stage of PCa development, growth and.maintenance is independent of androgen stimulation and growth factors including Insulin-like Growth Factor -1 (IGf.:·l) and Epidermal Growth Factor (EGF) are thought to have more crucial roles in cell survival and PCa progression. PCa, in its late stages, is highly aggressive and metastatic, that is, tumorigenic cells migrate from the primary site of the body (prostate) and travel via the systemic and lymphatic circulation, residing and colonising in the bone, lymph node, lung, and in more rare cases, the brain. Metastasis involves both cell migration and tissue degradation activities. The degradation of the extracellular matrix (ECM), the tissue surrounding the organ, is mediated in part by members of a family of 26 proteins called the Matrix Metalloproteases (MMPs), whilst ceil adhesion molecules, of which proteins known as Integrins are included, mediate ce11 migration. A family of proteins known as the ADAMs (A Disintegrin . And Metalloprotease domain) were a recently characterised family at the commencement of this study and now comprise 34 members. Because of their dual nature, possessing an active metaiioprotease domain, homologous to that of the MMPs, and an integrin-binding domain capable of regulating cell-cell and cell-ECM contacts, it was thought likely that members of the ADAMs family may have implications for the progression of aggressive cancers such as those ofthe prostate. This study focussed on two particular ADAMs -9 and -10. ADAM-9 has an active metalloprotease domain, which has been shown to degrade constituents of the ECM, including fibronectin, in vitro. It also has an integrin-binding capacity through association with key integrins involved in PCa progression, such as a6~1. ADAM-10 has no such integrin binding activities, but its bovine orthologue, MADM, is able to degrade coHagen type IV, a major component of basement membranes. It is likely human ADAM-10 has the same activity. It is also known to cleave Ll -a protein involved in cell anchorage activities - and collagen type XVII - which is a principal component of the hemidesmosomes of cellular tight junctions. The cleavage of these proteins enables the cell to be released from the surrounding environment and commence migratory activities, as required in metastasis. Previous studies in this laboratory showed the mRNA expression of the five ADAMs -9,- 10, -11, -15 and -17 in PCa cell lines, characteristic of androgen-dependent and androgen independent disease. These studies were furthered by the characterisation of AD AM-9, -10 and -17 mRNA regulation by Dihydrotestosterone (DHT) in the androgen-responsive cell line (LNCaP). ADAM-9 and -10 mRNA levels were elevated in response to DHT stimulation. Further to these observations, the expression of ADAM-9 and -10 was shown in primary prostate biopsies from patients with PCa. ADAM-1 0 was expressed in the cytoplasm and on the ceH membrane in epithelial and basal cells ofbenign prostate glands, but in high-grade PCa glands, ADAM-I 0 expression was localised to the nucleus and its expression levels appeared to be elevated when compared to low-grade PCa glands. These studies provided a strong background for the hypothesis that ADAM-9 and -10 have key roles in the development ofPCa and provided a basis for further studies.The aims of this study were to: 1) characterise the expression, localisation and levels, of ADAM-9 and -10 mRNA and protein in cell models representing characteristics of normal through androgen-dependent to androgen-independent PCa, as well as to expand the primary PCa biopsy data for ADAM-9 and ADAM-10 to encompass PCa bone metastases 2) establish an in vitro cell system, which could express elevated levels of ADAM-1 0 so that functional cell-based assays such as cell migration, invasion and attachment could be carried out, and 3) to extend the previous hormonal regulation data, to fully characterise the response of ADAM-9 and -10 mRNA and protein levels to DHT, IGF-1, DHT plus IGF-1 and EGF in the hormonal/growth factor responsive cell line LNCaP. For aim 1 (expression of ADAM-9 and -10 mRNA and protein), ADAM-9 and -10 mRNA were characterised by R T -PCR, while their protein products were analysed by Western blot. Both ADAM-9 and -10 mRNA and protein were expressed at readily detectable levels across progressively metastatic PCa cell lines model that represent characteristics of low-grade,. androgen-dependent (LNCaP and C4) to high-grade, androgen-independent (C4-2 and C4-2B) PCa. When the non-tumorigenic prostate cell line RWPE-1 was compared with the metastatic PCa cell line PC-3, differential expression patterns were seen by Western blot analysis. For ADAM-9, the active form was expressed at higher levels in RWPE-1, whilst subcellular fractionation showed that the active form of ADAM-9 was predominantly located in the cell nucleus. For ADAM-I 0, in both of the cell Jines, a nuclear specific isoform of the mature, catalytically active ADAM-I 0 was found. This isoforrn differed by -2 kDa in Mr (smaller) than the cytoplasmic specific isoform. Unprocessed ADAM-I 0 was readily detected in R WPE-1 cell lines but only occasionally detected in PC-3 cell lines. Immunocytochemistry using ADAM-9 and -10 specific antibodies confirmed nuclear, cytoplasmic and membrane expression of both ADAMs in these two cell lines. To examine the possibility of ADAM-9 and -10 being shed into the extracellular environment, membrane vesicles that are constitutively shed from the cell surface and contain membrane-associated proteins were collected from the media of the prostate cell lines RWPE-1, LNCaP and PC-3. ADAM-9 was readily detectable in RWPE- 1 and LNCaP cell membrane vesicles by Western blot analysis, but not in PC-3 cells, whilst the expression of ADAM-I 0 was detected in shed vesicles from each of these prostate cell lines. By Laser Capture Microdissection (LCM), secretory epithelial cells of primary prostate gland biopsies were isolated from benign and malignant glands. These secretory cells, by Western blot analysis, expressed similar Mr bands for ADAM-9 and -10 that were found in PCa cell lines in vitro, indicating that the nuclear specific isoforrn of ADAM-I 0 was present in PCa primary tumours and may represent the predominantly nuclear form of ADAM-I 0 expression, previously shown in high-grade PCa by immunohistochemistry (IHC). ADAM-9 and -10 were also examined by IHC in bone metastases taken from PCa patients at biopsy. Both ADAMs could be detected at levels similar to those shown for Prostate Specific Antigen (PSA) in these biopsies. Furthermore, both ADAM-9 and -10 were predominantly membrane- bound with occasional nuclear expression. For aim 2, to establish a cell system that over-expressed levels of ADAM-10, two fulllength ADAM-I 0 mammalian expression vectors were constructed; ADAM-I 0 was cloned into pcDNA3.1, which contains a CMV promoter, and into pMEP4, containing an inducible metallothionine promoter, whose activity is stimulated by the addition of CdC}z. The efficiency of these two constructs was tested by way of transient transfection in the PCa cell line PC-3, whilst the pcDNA3.1 construct was also tested in the RWPE-1 prostate cell line. Resultant Western blot analysis for all transient transfection assays showed that levels of ADAM-I 0 were not significantly elevated in any case, when compared to levels of the housekeeping gene ~-Tubulin, despite testing various levels of vector DNA, and, for pMEP4, the induction of the transfected cell system with different degrees of stimulation with CdCh to activate the metallothionine promoter post-transfection. Another study in this laboratory found similar results when the same full length ADAM-10 sequence was cloned into a Green Fluorescent Protein (GFP) expressing vector, as no fluorescence was observed by means of transient tran sfection in the same, and other, PCa cell lines. It was hypothesised that the Kozak sequence included in the full-length construct (human ADAMI 0 naturally occurring sequence) is not strong enough to initiate translation in an artificial system, in cells, which, as described in Aim 1, are already expressing readily detectable levels of endogenous ADAM-10. As a result, time constraints prevented any further progress with Aim 2 and functional studies including cell attachment, invasion and migration were unable to be explored. For Aim 3, to characterise the response of ADAM-9 and -10 mRNA and protein levels to DHT, IGF-1, DHT plus IGF-1 and EGF in LNCaP cells, the levels of ADAM-9 and -10 mRNA were not stimulated by DHT or IGF-I alone, despite our previous observations that initially characterised ADAM-9 and -10 mRNA as being responsive to DHT. However, IGF-1 in synergy with DHT did significantly elevate mRNA levels ofboth ADAMs. In the case of ADAM-9 and -10 protein, the same trends of stimulation as found at the rnRNA level were shown by Western blot analysis when ADAM-9 and -10 signal intensity was normalised with the housekeeping protein ~-Tubulin. For EGF treatment, both ADAM-9 and -10 mRNA and protein levels were significantly elevated, and further investigation vm found this to be the case for each of these ADAMs proteins in the nuclear fractions of LNCaP cells. These studies are the first to describe extensively, the expression and hormonal/growth factor regulation of two members of the ADAMs family ( -9 and -1 0) in PCa. These observations imply that the expression of ADAM-9 and -10 have varied roles in PCa whilst it develops from androgen-sensitive (early stage disease), through to an androgeninsensitive (late-stage), metastatic disease. Further studies are now required to investigate the several key areas of focus that this research has revealed, including: • Investigation of the cellular mechanisms that are involved in actively transporting the ADAMs to the cell's nuclear compartment and the ADAMs functional roles in the cell nucleus. • The construction of a full-length human ADAM-10 mammalian expression construct with the introduction of a new Kozak sequence, that elevates ADAM-I 0 expression in an in vitro cell system are required, so that functional assays such as cell invasion, migration and attachment may be carried out to fmd the functional consequences of ADAM expression on cellular behaviour. • The regulation studies also need to be extended by confirming the preliminary observations that the nuclear levels of ADAMs may also be elevated by hormones and growth factors such as DHT, IGF-1 and EGF, as well as the regulation of levels of plasma membrany vesicle associated ADAM expression. Given the data presented in this study, it is likely the ADAMs have differential roles throughout the development of PCa due to their differential cellular localisation and synergistic growth-factor regulation. These observations, along with those further studies outlined above, are necessary in identifying these specific components ofPCa metastasis to which the ADAMs may contribute.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Stream ciphers are encryption algorithms used for ensuring the privacy of digital telecommunications. They have been widely used for encrypting military communications, satellite communications, pay TV encryption and for voice encryption of both fixed lined and wireless networks. The current multi year European project eSTREAM, which aims to select stream ciphers suitable for widespread adoptation, reflects the importance of this area of research. Stream ciphers consist of a keystream generator and an output function. Keystream generators produce a sequence that appears to be random, which is combined with the plaintext message using the output function. Most commonly, the output function is binary addition modulo two. Cryptanalysis of these ciphers focuses largely on analysis of the keystream generators and of relationships between the generator and the keystream it produces. Linear feedback shift registers are widely used components in building keystream generators, as the sequences they produce are well understood. Many types of attack have been proposed for breaking various LFSR based stream ciphers. A recent attack type is known as an algebraic attack. Algebraic attacks transform the problem of recovering the key into a problem of solving multivariate system of equations, which eventually recover the internal state bits or the key bits. This type of attack has been shown to be effective on a number of regularly clocked LFSR based stream ciphers. In this thesis, algebraic attacks are extended to a number of well known stream ciphers where at least one LFSR in the system is irregularly clocked. Applying algebriac attacks to these ciphers has only been discussed previously in the open literature for LILI-128. In this thesis, algebraic attacks are first applied to keystream generators using stop-and go clocking. Four ciphers belonging to this group are investigated: the Beth-Piper stop-and-go generator, the alternating step generator, the Gollmann cascade generator and the eSTREAM candidate: the Pomaranch cipher. It is shown that algebraic attacks are very effective on the first three of these ciphers. Although no effective algebraic attack was found for Pomaranch, the algebraic analysis lead to some interesting findings including weaknesses that may be exploited in future attacks. Algebraic attacks are then applied to keystream generators using (p; q) clocking. Two well known examples of such ciphers, the step1/step2 generator and the self decimated generator are investigated. Algebraic attacks are shown to be very powerful attack in recovering the internal state of these generators. A more complex clocking mechanism than either stop-and-go or the (p; q) clocking keystream generators is known as mutual clock control. In mutual clock control generators, the LFSRs control the clocking of each other. Four well known stream ciphers belonging to this group are investigated with respect to algebraic attacks: the Bilateral-stop-and-go generator, A5/1 stream cipher, Alpha 1 stream cipher, and the more recent eSTREAM proposal, the MICKEY stream ciphers. Some theoretical results with regards to the complexity of algebraic attacks on these ciphers are presented. The algebraic analysis of these ciphers showed that generally, it is hard to generate the system of equations required for an algebraic attack on these ciphers. As the algebraic attack could not be applied directly on these ciphers, a different approach was used, namely guessing some bits of the internal state, in order to reduce the degree of the equations. Finally, an algebraic attack on Alpha 1 that requires only 128 bits of keystream to recover the 128 internal state bits is presented. An essential process associated with stream cipher proposals is key initialization. Many recently proposed stream ciphers use an algorithm to initialize the large internal state with a smaller key and possibly publicly known initialization vectors. The effect of key initialization on the performance of algebraic attacks is also investigated in this thesis. The relationships between the two have not been investigated before in the open literature. The investigation is conducted on Trivium and Grain-128, two eSTREAM ciphers. It is shown that the key initialization process has an effect on the success of algebraic attacks, unlike other conventional attacks. In particular, the key initialization process allows an attacker to firstly generate a small number of equations of low degree and then perform an algebraic attack using multiple keystreams. The effect of the number of iterations performed during key initialization is investigated. It is shown that both the number of iterations and the maximum number of initialization vectors to be used with one key should be carefully chosen. Some experimental results on Trivium and Grain-128 are then presented. Finally, the security with respect to algebraic attacks of the well known LILI family of stream ciphers, including the unbroken LILI-II, is investigated. These are irregularly clock- controlled nonlinear filtered generators. While the structure is defined for the LILI family, a particular paramater choice defines a specific instance. Two well known such instances are LILI-128 and LILI-II. The security of these and other instances is investigated to identify which instances are vulnerable to algebraic attacks. The feasibility of recovering the key bits using algebraic attacks is then investigated for both LILI- 128 and LILI-II. Algebraic attacks which recover the internal state with less effort than exhaustive key search are possible for LILI-128 but not for LILI-II. Given the internal state at some point in time, the feasibility of recovering the key bits is also investigated, showing that the parameters used in the key initialization process, if poorly chosen, can lead to a key recovery using algebraic attacks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Component software has many benefits, most notably increased software re-use; however, the component software process places heavy burdens on programming language technology, which modern object-oriented programming languages do not address. In particular, software components require specifications that are both sufficiently expressive and sufficiently abstract, and, where possible, these specifications should be checked formally by the programming language. This dissertation presents a programming language called Mentok that provides two novel programming language features enabling improved specification of stateful component roles. Negotiable interfaces are interface types extended with protocols, and allow specification of changing method availability, including some patterns of out-calls and re-entrance. Type layers are extensions to module signatures that allow specification of abstract control flow constraints through the interfaces of a component-based application. Development of Mentok's unique language features included creation of MentokC, the Mentok compiler, and formalization of key properties of Mentok in mini-languages called MentokP and MentokL.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Uncooperative iris identification systems at a distance and on the move often suffer from poor resolution and poor focus of the captured iris images. The lack of pixel resolution and well-focused images significantly degrades the iris recognition performance. This paper proposes a new approach to incorporate the focus score into a reconstruction-based super-resolution process to generate a high resolution iris image from a low resolution and focus inconsistent video sequence of an eye. A reconstruction-based technique, which can incorporate middle and high frequency components from multiple low resolution frames into one desired super-resolved frame without introducing false high frequency components, is used. A new focus assessment approach is proposed for uncooperative iris at a distance and on the move to improve performance for variations in lighting, size and occlusion. A novel fusion scheme is then proposed to incorporate the proposed focus score into the super-resolution process. The experiments conducted on the The Multiple Biometric Grand Challenge portal database shows that our proposed approach achieves an EER of 2.1%, outperforming the existing state-of-the-art averaging signal-level fusion approach by 19.2% and the robust mean super-resolution approach by 8.7%.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Aims--Telemonitoring (TM) and structured telephone support (STS) have the potential to deliver specialised management to more patients with chronic heart failure (CHF), but their efficacy is still to be proven. Objectives To review randomised controlled trials (RCTs) of TM or STS on all- cause mortality and all-cause and CHF-related hospitalisations in patients with CHF, as a non-invasive remote model of specialised disease-management intervention.--Methods and Results--Data sources:We searched 15 electronic databases and hand-searched bibliographies of relevant studies, systematic reviews, and meeting abstracts. Two reviewers independently extracted all data. Study eligibility and participants: We included any randomised controlled trials (RCT) comparing TM or STS to usual care of patients with CHF. Studies that included intensified management with additional home or clinic visits were excluded. Synthesis: Primary outcomes (mortality and hospitalisations) were analysed; secondary outcomes (cost, length of stay, quality of life) were tabulated.--Results: Thirty RCTs of STS and TM were identified (25 peer-reviewed publications (n=8,323) and five abstracts (n=1,482)). Of the 25 peer-reviewed studies, 11 evaluated TM (2,710 participants), 16 evaluated STS (5,613 participants) and two tested both interventions. TM reduced all-cause mortality (risk ratio (RR 0•66 [95% CI 0•54-0•81], p<0•0001) and STS showed similar trends (RR 0•88 [95% CI 0•76-1•01], p=0•08). Both TM (RR 0•79 [95% CI 0•67-0•94], p=0•008) and STS (RR 0•77 [95% CI 0•68-0•87], p<0•0001) reduced CHF-related hospitalisations. Both interventions improved quality of life, reduced costs, and were acceptable to patients. Improvements in prescribing, patient-knowledge and self-care, and functional class were observed.--Conclusion: TM and STS both appear effective interventions to improve outcomes in patients with CHF.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The DNA of three biological variants, G1, Ic and G2, which originated from the same greenhouse isolate of rice tungro bacilliform virus (RTBV) at the International Rice Research Institute (IRRI), was cloned and sequenced. Comparison of the sequences revealed small differences in genome sizes. The variants were between 95 and 99% identical at the nucleotide and amino acid levels. Alignment of the three genome sequences with those of three published RTBV sequences (Phi-1, Phi-2 and Phi-3) revealed numerous nucleotide substitutions and some insertions and deletions. The published RTBV sequences originated from the same greenhouse isolate at IRRI 20, 11 and 9 years ago. All open reading frames (ORFs) and known functional domains were conserved across the six variants. The cysteine-rich region of ORF3 showed the greatest variation. When the six DNA sequences from IRRI were compared with that of an isolate from Malaysia (Serdang), similar changes were observed in the cysteine-rich region in addition to other nucleotide substitutions and deletions across the genome. The aligned nucleotide sequences of the IRRI variants and Serdang were used to analyse phylogenetic relationships by the bootstrapped parsimony, distance and maximum-likelihood methods. The isolates clustered in three groups: Serdang alone; Ic and G1; and Phi-1, Phi-2, Phi-3 and G2. The distribution of phylogenetically informative residues in the IRRI sequences shared with the Serdang sequence and the differing tree topologies for segments of the genome suggested that recombination, as well as substitutions and insertions or deletions, has played a role in the evolution of RTBV variants. The significance and implications of these evolutionary forces are discussed in comparison with badnaviruses and caulimoviruses.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The complete nucleotide sequence of rice tungro spherical virus (RTSV) strain Vt6, originally from Mindanao, the Philippines, with higher virulence to resistant rice cultivars, was determined and compared with the published sequence for the Philippine-type strain A (RTSV-A-Shen). It was reported that RTSV-A was not able to infect a rice resistant cultivar TKM 6 (10). RTSV-Vt6 and RTSV-A-Shen share 90% and 95% homology at nucleotide and amino-acid levels, respectively. The N-terminal leader sequence of RTSV-Vt6 contained a 39-amino acids-region (positions 65 to 103) which was totally different from that of RTSV-A-Shen; the difference resulted from frame shifting by nucleotide insertions and deletions. To confirm the amino-acid sequence differences of the leader polypeptide, the same region was cloned and sequenced using a newly obtained variant of RTSV-type 6, which had been collected in the field of IRRI, and seven field isolates from Mindanao, the Philippines. Since all the sequences of the target region are identical to that of the Vt6 leader polypeptide, the sequence difference in the leader region seems not to correlate with the virulence of Vt6.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper describes algorithms that can musically augment the realtime performance of electronic dance music by generating new musical material by morphing. Note sequence morphing involves the algorithmic generation of music that smoothly transitions between two existing musical segments. The potential of musical morphing in electronic dance music is outlined and previous research is summarised; including discussions of relevant music theoretic and algorithmic concepts. An outline and explanation is provided of a novel Markov morphing process that uses similarity measures to construct transition matrices. The paper reports on a ‘focus-concert’ study used to evaluate this morphing algorithm and to compare its output with performances from a professional DJ. Discussions of this trial include reflections on some of the aesthetic characteristics of note sequence morphing. The research suggests that the proposed morphing technique could be effectively used in some electronic dance music contexts.