WorldWideScience

Sample records for thrombospondin-related anonymous protein

  1. Molecular characterization of a new Babesia bovis thrombospondin-related anonymous protein (BbTRAP2.

    Directory of Open Access Journals (Sweden)

    Mohamad Alaa Terkawi

    Full Text Available A gene encoding a Babesia bovis protein that shares significant degree of similarity to other apicomplexan thrombospondin-related anonymous proteins (TRAPs was found in the genomic database and designated as BbTRAP2. Recombinant protein containing a conserved region of BbTRAP2 was produced in E. coli. A high antigenicity of recombinant BbTRAP2 (rBbTRAP2 was observed with field B. bovis-infected bovine sera collected from geographically different regions of the world. Moreover, antiserum against rBbTRAP2 specifically reacted with the authentic protein by Western blot analysis and an indirect fluorescent antibody test. Three bands corresponding to 104-, 76-, and 44-kDa proteins were identified in the parasite lysates and two bands of 76- and 44-kDa proteins were detected in the supernatant of cultivated parasites, indicating that BbTRAP2 was proteolytically processed and shed into the culture. Apical and surface localizations of BbTRAP2 were observed in the intracellular and extracellular parasites, respectively, by confocal laser microscopic examination. Moreover, native BbTRAP2 was precipitated by bovine erythrocytes, suggesting its role in the attachment to erythrocytes. Furthermore, the specific antibody to rBbTRAP2 inhibited the growth of B. bovis in a concentration-dependent manner. Consistently, pre-incubation of the free merozoites with the antibody to rBbTRAP2 resulted in an inhibition of the parasite invasion into host erythrocytes. Interestingly, the antibody to rBbTRAP2 was the most inhibitive for the parasite's growth as compared to those of a set of antisera produced against different recombinant proteins, including merozoite surface antigen 2c (BbMSA-2c, rhoptry-associated protein 1 C-terminal (BbRAP-1CT, and spherical body protein 1 (BbSBP-1. These results suggest that BbTRAP2 might be a potential candidate for development of a subunit vaccine against B. bovis infection.

  2. Macroglia-derived thrombospondin 2 regulates alterations of presynaptic proteins of retinal neurons following elevated hydrostatic pressure.

    Science.gov (United States)

    Wang, Shuchao; Hu, Tu; Wang, Zhen; Li, Na; Zhou, Lihong; Liao, Lvshuang; Wang, Mi; Liao, Libin; Wang, Hui; Zeng, Leping; Fan, Chunling; Zhou, Hongkang; Xiong, Kun; Huang, Jufang; Chen, Dan

    2017-01-01

    Many studies on retinal injury and repair following elevated intraocular pressure suggest that the survival ratio of retinal neurons has been improved by various measures. However, the visual function recovery is far lower than expected. The homeostasis of retinal synapses in the visual signal pathway is the key structural basis for the delivery of visual signals. Our previous studies found that complicated changes in the synaptic structure between retinal neurons occurred much earlier than obvious degeneration of retinal ganglion cells in rat retinae. The lack of consideration of these earlier retinal synaptic changes in the rescue strategy may be partly responsible for the limited visual function recovery with the types of protective methods for retinal neurons used following elevated intraocular pressure. Thus, research on the modulatory mechanisms of the synaptic changes after elevated intraocular pressure injury may give new light to visual function rescue. In this study, we found that thrombospondin 2, an important regulator of synaptogenesis in central nervous system development, was distributed in retinal macroglia cells, and its receptor α2δ-1 was in retinal neurons. Cell cultures including mixed retinal macroglia cells/neuron cultures and retinal neuron cultures were exposed to elevated hydrostatic pressure for 2 h. The expression levels of glial fibrillary acidic protein (the marker of activated macroglia cells), thrombospondin 2, α2δ-1 and presynaptic proteins were increased following elevated hydrostatic pressure in mixed cultures, but the expression levels of postsynaptic proteins were not changed. SiRNA targeting thrombospondin 2 could decrease the upregulation of presynaptic proteins induced by the elevated hydrostatic pressure. However, in retinal neuron cultures, elevated hydrostatic pressure did not affect the expression of presynaptic or postsynaptic proteins. Rather, the retinal neuron cultures with added recombinant thrombospondin 2

  3. Monoclonal antibodies to murine thrombospondin-1 and thrombospondin-2 reveal differential expression patterns in cancer and low antigen expression in normal tissues

    International Nuclear Information System (INIS)

    Bujak, Emil; Pretto, Francesca; Ritz, Danilo; Gualandi, Laura; Wulhfard, Sarah; Neri, Dario

    2014-01-01

    There is a considerable interest for the discovery and characterization of tumor-associated antigens, which may facilitate antibody-based pharmacodelivery strategies. Thrombospondin-1 and thrombospondin-2 are homologous secreted proteins, which have previously been reported to be overexpressed during remodeling typical for wound healing and tumor progression and to possibly play a functional role in cell proliferation, migration and apoptosis. To our knowledge, a complete immunohistochemical characterization of thrombospondins levels in normal rodent tissues has not been reported so far. Using antibody phage technology, we have generated and characterized monoclonal antibodies specific to murine thrombospondin-1 and thrombospondin-2, two antigens which share 62% aminoacid identity. An immunofluorescence analysis revealed that both antigens are virtually undetectable in normal mouse tissues, except for a weak staining of heart tissue by antibodies specific to thrombospondin-1. The analysis also showed that thrombospondin-1 was strongly expressed in 5/7 human tumors xenografted in nude mice, while it was only barely detectable in 3/8 murine tumors grafted in immunocompetent mice. By contrast, a high-affinity antibody to thrombospondin-2 revealed a much lower level of expression of this antigen in cancer specimens. Our analysis resolves ambiguities related to conflicting reports on thrombosponding expression in health and disease. Based on our findings, thrombospondin-1 (and not thrombospondin-2) may be considered as a target for antibody-based pharmacodelivery strategies, in consideration of its low expression in normal tissues and its upregulation in cancer. - Highlights: • High affinity monoclonal antibodies to murine and human TSP1 and 2 were raised. • Both antigens are virtually undetectable in normal mouse tissues. • Strong positivity of human tumor xenografts for TSP1 was detected. • Study revealed much lower level of TSP2 expression in cancer specimens

  4. Monoclonal antibodies to murine thrombospondin-1 and thrombospondin-2 reveal differential expression patterns in cancer and low antigen expression in normal tissues

    Energy Technology Data Exchange (ETDEWEB)

    Bujak, Emil [Department of Chemistry and Applied Biosciences, Swiss Federal Institute of Technology (ETH Zürich), Vladimir-Prelog-Weg 2, CH-8093 Zurich (Switzerland); Pretto, Francesca; Ritz, Danilo; Gualandi, Laura; Wulhfard, Sarah [Philochem AG, Libernstrasse 3, CH-8112 Otelfingen (Switzerland); Neri, Dario, E-mail: neri@pharma.ethz.ch [Department of Chemistry and Applied Biosciences, Swiss Federal Institute of Technology (ETH Zürich), Vladimir-Prelog-Weg 2, CH-8093 Zurich (Switzerland)

    2014-09-10

    There is a considerable interest for the discovery and characterization of tumor-associated antigens, which may facilitate antibody-based pharmacodelivery strategies. Thrombospondin-1 and thrombospondin-2 are homologous secreted proteins, which have previously been reported to be overexpressed during remodeling typical for wound healing and tumor progression and to possibly play a functional role in cell proliferation, migration and apoptosis. To our knowledge, a complete immunohistochemical characterization of thrombospondins levels in normal rodent tissues has not been reported so far. Using antibody phage technology, we have generated and characterized monoclonal antibodies specific to murine thrombospondin-1 and thrombospondin-2, two antigens which share 62% aminoacid identity. An immunofluorescence analysis revealed that both antigens are virtually undetectable in normal mouse tissues, except for a weak staining of heart tissue by antibodies specific to thrombospondin-1. The analysis also showed that thrombospondin-1 was strongly expressed in 5/7 human tumors xenografted in nude mice, while it was only barely detectable in 3/8 murine tumors grafted in immunocompetent mice. By contrast, a high-affinity antibody to thrombospondin-2 revealed a much lower level of expression of this antigen in cancer specimens. Our analysis resolves ambiguities related to conflicting reports on thrombosponding expression in health and disease. Based on our findings, thrombospondin-1 (and not thrombospondin-2) may be considered as a target for antibody-based pharmacodelivery strategies, in consideration of its low expression in normal tissues and its upregulation in cancer. - Highlights: • High affinity monoclonal antibodies to murine and human TSP1 and 2 were raised. • Both antigens are virtually undetectable in normal mouse tissues. • Strong positivity of human tumor xenografts for TSP1 was detected. • Study revealed much lower level of TSP2 expression in cancer specimens

  5. Plasmodium vivax thrombospondin related adhesion protein: immunogenicity and protective efficacy in rodents and Aotus monkeys

    Directory of Open Access Journals (Sweden)

    Angélica Castellanos

    2007-06-01

    Full Text Available The thrombospondin related adhesion protein (TRAP is a malaria pre-erythrocytic antigen currently pursued as malaria vaccine candidate to Plasmodium falciparum. In this study, a long synthetic peptide (LSP representing a P. vivax TRAP fragment involved in hepatocyte invasion was formulated in both Freund and Montanide ISA 720 adjutants and administered by IM and subcutaneous routes to BALB/c mice and Aotus monkeys. We measured specific humoral immune responses in both animal species and performed a sporozoite challenge in Aotus monkeys to assess the protective efficacy of the vaccine. After immunization both mice and Aotus seroconverted as shown by ELISA, and the specific anti-peptide antibodies cross reacted with the parasite in IFAT assays. Only two out of six immunized animals became infected after P. vivax sporozoite challenge as compared with four out of six animals from the control group. These results suggest that this TRAP fragment has protective potential against P. vivax malaria and deserves further studies as vaccine candidate.

  6. Differential expression of pancreatitis associated protein and thrombospondins in arterial vs venous tissues

    Science.gov (United States)

    Szasz, Theodora; Eddy, Susan; Paulauskis, Joseph; Burnett, Robert; Ellekilde, Merete; Iovanna, Juan L.; Watts, Stephanie W.

    2015-01-01

    BACKGROUND/AIMS Arteries and veins modulate cardiovascular homeostasis and contribute to hypertension pathogenesis. Functional differences between arteries and veins are based upon differences in gene expression. To better characterize these expression patterns, and to identify candidate genes that could be manipulated selectively in the venous system, we performed whole genome expression profiling of arteries and veins. METHODS We used the CodeLink platform and the major artery (thoracic aorta) and vein (caudal vena cava) of the rat. RESULTS The most prominent difference was pancreatitis associated protein (PAP1), expressed 64-fold higher in vena cava vs aorta. Expression of mRNA for thrombospondins (TSP-1, TSP-4) was greater than 5-fold higher in veins vs arteries. Higher mRNA expression of thrombospondins (TSP-1, 2, 4) and PAP1 in vena cava vs aorta was confirmed by PCR. Immunohistochemical analysis of tissue sections qualitatively confirmed a higher expression of these proteins in vena cava vs aorta. CONCLUSION This is the first gene array study of adult rat arterial and venous tissues, and also the first study to report differences in inflammatory genes between arteries and veins. Data from these studies may provide novel insights into the genetic basis for functional differences between arteries and veins in health and disease. PMID:19571575

  7. Valproic acid decreases urothelial cancer cell proliferation and induces thrombospondin-1 expression

    Directory of Open Access Journals (Sweden)

    Byler Timothy K

    2012-08-01

    Full Text Available Abstract Background Prevention of bladder cancer recurrence is a central challenge in the management of this highly prevalent disease. The histone deacetylase inhibitor valproic acid (sodium valproate has anti-angiogenic properties and has been shown to decrease bladder cancer growth in model systems. We have previously shown reduced expression of thrombospondin-1 in a mouse model and in human bladder cancer relative to normal urothelium. We speculated that inhibition of angiogenesis by valproate might be mediated by this anti-angiogenic protein. Methods Bladder cancer cell lines UMUC3 and T24 were treated with valproate or another histone deacetylase inhibitor, vorinostat, in culture for a period of three days. Proliferation was assessed by alamar blue reduction. Gene expression was evaluated by reverse transcription of RNA and quantitative PCR. Results Proliferation assays showed treatment with valproate or vorinostat decreased proliferation in both cell lines. Histone deacetylase inhibition also increased relative expression of thrombospondin-1 up to 8 fold at 5 mM valproate. Conclusions Histone deacetylase inhibitors warrant further study for the prevention or treatment of bladder cancer.

  8. Serotype 3 pneumococci sequester platelet-derived human thrombospondin-1 via the adhesin and immune evasion protein Hic.

    Science.gov (United States)

    Binsker, Ulrike; Kohler, Thomas P; Krauel, Krystin; Kohler, Sylvia; Habermeyer, Johanna; Schwertz, Hansjörg; Hammerschmidt, Sven

    2017-04-07

    Streptococcus pneumoniae serotype 3 strains emerge frequently within clinical isolates of invasive diseases. Bacterial invasion into deeper tissues is associated with colonization and immune evasion mechanisms. Thus, pneumococci express a versatile repertoire of surface proteins sequestering and interacting specifically with components of the human extracellular matrix and serum. Hic, a PspC-like pneumococcal surface protein, possesses vitronectin and factor H binding activity. Here, we show that heterologously expressed Hic domains interact, similar to the classical PspC molecule, with human matricellular thrombospondin-1 (hTSP-1). Binding studies with isolated human thrombospondin-1 and various Hic domains suggest that the interaction between hTSP-1 and Hic differs from binding to vitronectin and factor H. Binding of Hic to hTSP-1 is inhibited by heparin and chondroitin sulfate A, indicating binding to the N-terminal globular domain or type I repeats of hTSP-1. Competitive inhibition experiments with other pneumococcal hTSP-1 adhesins demonstrated that PspC and PspC-like Hic recognize similar domains, whereas PavB and Hic can bind simultaneously to hTSP-1. In conclusion, Hic binds specifically hTSP-1; however, truncation in the N-terminal part of Hic decreases the binding activity, suggesting that the full length of the α-helical regions of Hic is required for an optimal interaction. © 2017 by The American Society for Biochemistry and Molecular Biology, Inc.

  9. Thrombospondins: old players, new games.

    Science.gov (United States)

    Stenina-Adognravi, Olga

    2013-10-01

    Thrombospondins (TSPs) are secreted extracellular matrix (ECM) proteins from TSP family, which consists of five homologous members. They share a complex domain structure and have numerous binding partners in ECM and multiple cell surface receptors. Information that has emerged over the past decade identifies TSPs as important mediators of cellular homeostasis, assigning new important roles in cardiovascular pathology to these proteins. Recent studies of the functions of TSP in the cardiovascular system, diabetes and aging, which placed several TSPs in a position of critical regulators, demonstrated the involvement of these proteins in practically every aspect of cardiovascular pathophysiology related to atherosclerosis: inflammation, immunity, leukocyte recruitment and function, function of vascular cells, angiogenesis, and responses to hypoxia, ischemia and hyperglycemia. TSPs are also critically important in the development and ultimate outcome of the complications associated with atherosclerosis--myocardial infarction, and heart hypertrophy and failure. Their expression and significance increase with age and with the progression of diabetes, two major contributors to the development of atherosclerosis and its complications. This overview of recent literature examines the latest information on the newfound functions of TSPs that emphasize the importance of ECM in cardiovascular homeostasis and pathology. The functions of TSPs in myocardium, vasculature, vascular complications of diabetes, aging and immunity are discussed.

  10. Thrombospondin-4 knockout in hypertension protects small-artery endothelial function but induces aortic aneurysms

    NARCIS (Netherlands)

    Palao, Teresa; Rippe, Catarina; van Veen, Henk; VanBavel, Ed; Swärd, Karl; Bakker, Erik N. T. P.

    2016-01-01

    Thrombospondin-4 (TSP-4) is a multidomain calcium-binding protein that has both intracellular and extracellular functions. As an extracellular matrix protein, it is involved in remodeling processes. Previous work showed that, in the cardiovascular system, TSP-4 expression is induced in the heart in

  11. Thrombospondin-1, -2 and -5 have differential effects on vascular smooth muscle cell physiology

    Energy Technology Data Exchange (ETDEWEB)

    Helkin, Alex; Maier, Kristopher G. [SUNY Upstate Medical University, Division of Vascular Surgery and Endovascular Services, Syracuse, NY (United States); Department of Veterans Affairs VA Healthcare Network Upstate New York at Syracuse, Syracuse, NY (United States); Gahtan, Vivian, E-mail: gahtanv@upstate.edu [SUNY Upstate Medical University, Division of Vascular Surgery and Endovascular Services, Syracuse, NY (United States); Department of Veterans Affairs VA Healthcare Network Upstate New York at Syracuse, Syracuse, NY (United States)

    2015-09-04

    Introduction: The thrombospondins (TSPs) are matricellular proteins that exert multifunctional effects by binding cytokines, cell-surface receptors and other proteins. TSPs play important roles in vascular pathobiology and are all expressed in arterial lesions. The differential effects of TSP-1, -2, and -5 represent a gap in knowledge in vascular smooth muscle cell (VSMC) physiology. Our objective is to determine if structural differences of the TSPs imparted different effects on VSMC functions critical to the formation of neointimal hyperplasia. We hypothesize that TSP-1 and -2 induce similar patterns of migration, proliferation and gene expression, while the effects of TSP-5 are different. Methods: Human aortic VSMC chemotaxis was tested for TSP-2 and TSP-5 (1–40 μg/mL), and compared to TSP-1 and serum-free media (SFM) using a modified Boyden chamber. Next, VSMCs were exposed to TSP-1, TSP-2 or TSP-5 (0.2–40 μg/mL). Proliferation was assessed by MTS assay. Finally, VSMCs were exposed to TSP-1, TSP-2, TSP-5 or SFM for 3, 6 or 24 h. Quantitative real-time PCR was performed on 96 genes using a microfluidic card. Statistical analysis was performed by ANOVA or t-test, with p < 0.05 being significant. Results: TSP-1, TSP-2 and TSP-5 at 20 μg/mL all induce chemotaxis 3.1 fold compared to serum-free media. TSP-1 and TSP-2 induced proliferation 53% and 54% respectively, whereas TSP-5 did not. In the gene analysis, overall, cardiovascular system development and function is the canonical pathway most influenced by TSP treatment, and includes multiple growth factors, cytokines and proteases implicated in cellular migration, proliferation, vasculogenesis, apoptosis and inflammation pathways. Conclusions and relevance: The results of this study indicate TSP-1, -2, and -5 play active roles in VSMC physiology and gene expression. Similarly to TSP-1, VSMC chemotaxis to TSP-2 and -5 is dose-dependent. TSP-1 and -2 induces VSMC proliferation, but TSP-5 does not, likely

  12. Structure of thrombospondin type 3 repeats in bacterial outer membrane protein A reveals its intra-repeat disulfide bond-dependent calcium-binding capability

    Energy Technology Data Exchange (ETDEWEB)

    Dai, Shuyan; Sun, Cancan; Tan, Kemin; Ye, Sheng; Zhang, Rongguang

    2017-09-01

    Eukaryotic thrombospondin type 3 repeat (TT3R) is an efficient calcium ion (Ca2+) binding motif only found in mammalian thrombospondin family. TT3R has also been found in prokaryotic cellulase Cel5G, which was thought to forfeit the Ca2+-binding capability due to the formation of intra-repeat disulfide bonds, instead of the inter-repeat ones possessed by eukaryotic TT3Rs. In this study, we have identified an enormous number of prokaryotic TT3R-containing proteins belonging to several different protein families, including outer membrane protein A (OmpA), an important structural protein connecting the outer membrane and the periplasmic peptidoglycan layer in gram-negative bacteria. Here, we report the crystal structure of the periplasmic region of OmpA from Capnocytophaga gingivalis, which contains a linker region comprising five consecutive TT3Rs. The structure of OmpA-TT3R exhibits a well-ordered architecture organized around two tightly-coordinated Ca2+ and confirms the presence of abnormal intra-repeat disulfide bonds. Further mutagenesis studies showed that the Ca2+-binding capability of OmpA-TT3R is indeed dependent on the proper formation of intra-repeat disulfide bonds, which help to fix a conserved glycine residue at its proper position for Ca2+ coordination. Additionally, despite lacking inter repeat disulfide bonds, the interfaces between adjacent OmpA-TT3Rs are enhanced by both hydrophobic and conserved aromatic-proline interactions.

  13. A diverse host thrombospondin-type-1 repeat protein repertoire promotes symbiont colonization during establishment of cnidarian-dinoflagellate symbiosis.

    Science.gov (United States)

    Neubauer, Emilie-Fleur; Poole, Angela Z; Neubauer, Philipp; Detournay, Olivier; Tan, Kenneth; Davy, Simon K; Weis, Virginia M

    2017-05-08

    The mutualistic endosymbiosis between cnidarians and dinoflagellates is mediated by complex inter-partner signaling events, where the host cnidarian innate immune system plays a crucial role in recognition and regulation of symbionts. To date, little is known about the diversity of thrombospondin-type-1 repeat (TSR) domain proteins in basal metazoans or their potential role in regulation of cnidarian-dinoflagellate mutualisms. We reveal a large and diverse repertoire of TSR proteins in seven anthozoan species, and show that in the model sea anemone Aiptasia pallida the TSR domain promotes colonization of the host by the symbiotic dinoflagellate Symbiodinium minutum . Blocking TSR domains led to decreased colonization success, while adding exogenous TSRs resulted in a 'super colonization'. Furthermore, gene expression of TSR proteins was highest at early time-points during symbiosis establishment. Our work characterizes the diversity of cnidarian TSR proteins and provides evidence that these proteins play an important role in the establishment of cnidarian-dinoflagellate symbiosis.

  14. Differential expression of pancreatitis-associated protein and thrombospondins in arterial versus venous tissues.

    Science.gov (United States)

    Szasz, Theodora; Eddy, Susan; Paulauskis, Joseph; Burnett, Robert; Ellekilde, Merete; Iovanna, Juan L; Watts, Stephanie W

    2009-01-01

    Arteries and veins modulate cardiovascular homeostasis and contribute to hypertension pathogenesis. Functional differences between arteries and veins are based upon differences in gene expression. To better characterize these expression patterns, and to identify candidate genes that could be manipulated selectively in the venous system, we performed whole genome expression profiling of arteries and veins. We used the CodeLink platform and the major artery (thoracic aorta) and vein (caudal vena cava) of the rat. The most prominent difference was pancreatitis-associated protein (PAP1), expressed 64-fold higher in vena cava versus aorta. Expression of mRNA for thrombospondins (TSP-1, TSP-4) was greater than 5-fold higher in veins versus arteries. Higher mRNA expression of TSP-1, TSP-2, TSP-4 and PAP1 in vena cava versus aorta was confirmed by PCR. Immunohistochemical analysis of tissue sections qualitatively confirmed a higher expression of these proteins in vena cava versus aorta. This is the first gene array study of adult rat arterial and venous tissues, and also the first study to report differences in inflammatory genes between arteries and veins. Data from these studies may provide novel insights into the genetic basis for functional differences between arteries and veins in health and disease. Copyright 2009 S. Karger AG, Basel.

  15. The Roles of Thrombospondins in Hemorrhagic Stroke

    Directory of Open Access Journals (Sweden)

    Xuan Wu

    2017-01-01

    Full Text Available Hemorrhagic stroke is a devastating cerebrovascular disease with significant morbidity and mortality worldwide. Thrombospondins (TSPs, as matricellular proteins, belong to the TSP family which is comprised of five members. All TSPs modulate a variety of cellular functions by binding to various receptors. Recently, TSPs gained attention in the area of hemorrhagic stroke, especially TSP-1. TSP-1 participates in angiogenesis, the inflammatory response, apoptosis, and fibrosis after hemorrhagic stroke through binding to various molecules including but not limited to CD36, CD47, and TGF-β. In this review, we will discuss the roles of TSPs in hemorrhagic stroke and focus primarily on TSP-1.

  16. Decreased astrocytic thrombospondin-1 secretion after chronic ammonia treatment reduces the level of synaptic proteins: in vitro and in vivo studies.

    Science.gov (United States)

    Jayakumar, Arumugam R; Tong, Xiao Y; Curtis, Kevin M; Ruiz-Cordero, Roberto; Shamaladevi, Nagarajarao; Abuzamel, Missa; Johnstone, Joshua; Gaidosh, Gabriel; Rama Rao, Kakulavarapu V; Norenberg, Michael D

    2014-11-01

    Chronic hepatic encephalopathy (CHE) is a major complication in patients with severe liver disease. Elevated blood and brain ammonia levels have been implicated in its pathogenesis, and astrocytes are the principal neural cells involved in this disorder. Since defective synthesis and release of astrocytic factors have been shown to impair synaptic integrity in other neurological conditions, we examined whether thrombospondin-1 (TSP-1), an astrocytic factor involved in the maintenance of synaptic integrity, is also altered in CHE. Cultured astrocytes were exposed to ammonia (NH₄Cl, 0.5-2.5 mM) for 1-10 days, and TSP-1 content was measured in cell extracts and culture media. Astrocytes exposed to ammonia exhibited a reduction in intra- and extracellular TSP-1 levels. Exposure of cultured neurons to conditioned media from ammonia-treated astrocytes showed a decrease in synaptophysin, PSD95, and synaptotagmin levels. Conditioned media from TSP-1 over-expressing astrocytes that were treated with ammonia, when added to cultured neurons, reversed the decline in synaptic proteins. Recombinant TSP-1 similarly reversed the decrease in synaptic proteins. Metformin, an agent known to increase TSP-1 synthesis in other cell types, also reversed the ammonia-induced TSP-1 reduction. Likewise, we found a significant decline in TSP-1 level in cortical astrocytes, as well as a reduction in synaptophysin content in vivo in a rat model of CHE. These findings suggest that TSP-1 may represent an important therapeutic target for CHE. Defective release of astrocytic factors may impair synaptic integrity in chronic hepatic encephalopathy. We found a reduction in the release of the astrocytic matricellular proteins thrombospondin-1 (TSP-1) in ammonia-treated astrocytes; such reduction was associated with a decrease in synaptic proteins caused by conditioned media from ammonia-treated astrocytes. Exposure of neurons to CM from ammonia-treated astrocytes, in which TSP-1 is over

  17. Thrombospondin-2 Influences the Proportion of Cartilage and Bone During Fracture Healing

    OpenAIRE

    Taylor, Douglas K; Meganck, Jeffrey A; Terkhorn, Shawn; Rajani, Rajiv; Naik, Amish; O'Keefe, Regis J; Goldstein, Steven A; Hankenson, Kurt D

    2009-01-01

    Thrombospondin-2 (TSP2) is a matricellular protein with increased expression during growth and regeneration. TSP2-null mice show accelerated dermal wound healing and enhanced bone formation. We hypothesized that bone regeneration would be enhanced in the absence of TSP2. Closed, semistabilized transverse fractures were created in the tibias of wildtype (WT) and TSP2-null mice. The fractures were examined 5, 10, and 20 days after fracture using ?CT, histology, immunohistochemistry, quantitativ...

  18. Vascular Response to Intra-arterial Injury in the Thrombospondin-1 Null Mouse

    OpenAIRE

    Budhani, Faisal; Leonard, Katherine A.; Bergdahl, Andreas; Gao, Jimin; Lawler, Jack; Davis, Elaine C.

    2007-01-01

    Thrombospondin-1 (TSP-1) is a multifunctional, extracellular matrix protein that has been implicated in the regulation of smooth muscle cell proliferation, migration and differentiation during vascular development and injury. Vascular injury in wildtype and TSP-1 null mice was carried out by insertion of a straight spring guidewire into the femoral artery via a muscular arterial branch. Blood flow was restored after the muscular branch was ligated. The injury completely denuded the endotheliu...

  19. Data anonymization patent landscape

    Directory of Open Access Journals (Sweden)

    Mirjana Pejić Bach

    2017-01-01

    Full Text Available The omnipresent, unstoppable increase in digital data has led to a greater understanding of the importance of data privacy. Different approaches are used to implement data privacy. The goal of this paper is to develop a data anonymization patent landscape, by determining the following: (i the trend in data anonymization patenting, (ii the type of technical content protected in data anonymization, (iii the organizations and countries most active in patenting data anonymization know-how; and (iv the topics emerging most often in patent titles. Patents from the PatSeer database relating to data anonymization from 2001 to 2015 were analyzed. We used the longitudinal approach in combination with text mining techniques to develop a data anonymization patent landscape. The results indicated the following. The number of single patent families is growing with a high increase after 2010, thus indicating a positive trend in the area of patenting data anonymization solutions. The majority of patenting activities relate to the G Physics section. Organizations from the USA and Japan assigned the majority of patents related to data anonymization. The results of text mining indicate that the most often used word in titles of data anonymization patents are “anonym*, “method”, “data” and “system”. Several additional words that indicated the most frequent topics related to data anonymization were: “equipment”, “software”, “protection”, “identification”, or “encryption”, and specific topics such as “community”, “medical”, or “service”.

  20. Alterations in the α2 δ ligand, thrombospondin-1, in a rat model of spontaneous absence epilepsy and in patients with idiopathic/genetic generalized epilepsies.

    Science.gov (United States)

    Santolini, Ines; Celli, Roberta; Cannella, Milena; Imbriglio, Tiziana; Guiducci, Michela; Parisi, Pasquale; Schubert, Julian; Iacomino, Michele; Zara, Federico; Lerche, Holger; Moyanova, Slavianka; Ngomba, Richard Teke; van Luijtelaar, Gilles; Battaglia, Giuseppe; Bruno, Valeria; Striano, Pasquale; Nicoletti, Ferdinando

    2017-11-01

    Thrombospondins, which are known to interact with the α 2 δ subunit of voltage-sensitive calcium channels to stimulate the formation of excitatory synapses, have recently been implicated in the process of epileptogenesis. No studies have been so far performed on thrombospondins in models of absence epilepsy. We examined whether expression of the gene encoding for thrombospondin-1 was altered in the brain of WAG/Rij rats, which model absence epilepsy in humans. In addition, we examined the frequency of genetic variants of THBS1 in a large cohort of children affected by idiopathic/genetic generalized epilepsies (IGE/GGEs). We measured the transcripts of thrombospondin-1 and α 2 δ subunit, and protein levels of α 2 δ, Rab3A, and the vesicular glutamate transporter, VGLUT1, in the somatosensory cortex and ventrobasal thalamus of presymptomatic and symptomatic WAG/Rij rats and in two control strains by real-time polymerase chain reaction (PCR) and immunoblotting. We examined the genetic variants of THBS1 and CACNA2D1 in two independent cohorts of patients affected by IGE/GGE recruited through the Genetic Commission of the Italian League Against Epilepsy (LICE) and the EuroEPINOMICS-CoGIE Consortium. Thrombospondin-1 messenger RNA (mRNA) levels were largely reduced in the ventrobasal thalamus of both presymptomatic and symptomatic WAG/Rij rats, whereas levels in the somatosensory cortex were unchanged. VGLUT1 protein levels were also reduced in the ventrobasal thalamus of WAG/Rij rats. Genetic variants of THBS1 were significantly more frequent in patients affected by IGE/GGE than in nonepileptic controls, whereas the frequency of CACNA2D1 was unchanged. These findings suggest that thrombospondin-1 may have a role in the pathogenesis of IGE/GGEs. Wiley Periodicals, Inc. © 2017 International League Against Epilepsy.

  1. Intermolecular interactions of thrombospondins drive their accumulation in extracellular matrix

    OpenAIRE

    Kim, Dae Joong; Christofidou, Elena D.; Keene, Douglas R.; Hassan Milde, Marwah; Adams, Josephine C.

    2015-01-01

    Thrombospondins participate in many aspects of tissue organization in adult tissue homeostasis, and their dysregulation contributes to pathological processes such as fibrosis and tumor progression. The incorporation of thrombospondins into extracellular matrix (ECM) as discrete puncta has been documented in various tissue and cell biological contexts, yet the underlying mechanisms remain poorly understood. We find that collagen fibrils are disorganized in multiple tissues of Thbs1 −/− mice. I...

  2. TAIL1: an isthmin-like gene, containing type 1 thrombospondin-repeat and AMOP domain, mapped to ARVD1 critical region.

    Science.gov (United States)

    Rossi, Valeria; Beffagna, Giorgia; Rampazzo, Alessandra; Bauce, Barbara; Danieli, Gian Antonio

    2004-06-23

    Isthmins represent a novel family of vertebrate secreted proteins containing one copy of the thrombospondin type 1 repeat (TSR), which in mammals is shared by several proteins with diverse biological functions, including cell adhesion, angiogenesis, and patterning of developing nervous system. We have determined the genomic organization of human TAIL1 (thrombospondin and AMOP containing isthmin-like 1), a novel isthmin-like gene encoding a protein that contains a TSR and a C-terminal AMOP domain (adhesion-associated domain in MUC4 and other proteins), characteristic of extracellular proteins involved in adhesion processes. TAIL1 gene encompasses more than 24.4 kb. Analysis of the DNA sequence surrounding the putative transcriptional start region revealed a TATA-less promoter located in a CpG island. Several consensus binding sites for the transcription factors Sp1 and MZF-1 were identified in this promoter region. In humans, TAIL1 gene is located on chromosome 14q24.3 within ARVD1 (arrhythmogenic right ventricular dysplasia/cardiomyopathy, type 1) critical region; preliminary evidence suggests that it is expressed in several tissues, showing multiple alternative splicing.

  3. Thrombospondin-1 serum levels do not correlate with pelvic pain in patients with ovarian endometriosis

    Directory of Open Access Journals (Sweden)

    Manero Manuel

    2009-11-01

    Full Text Available Abstract Objetive Thrombospondin-1 serum levels is correlate with pelvic pain in patients with ovarian endometriosis. Patients Thrombospondin-1 serum levels were prospectively analysed in 51 patients (group A asymptomatic patients or patients presenting mild dysmenorrhea and women comprised group B severe dysmenorrhea and/or chronic pelvic pain and/or dyspareunia who underwent surgery for cystic ovarian endometriosis to asses whether a correlation exists among thrombospondin-1 serum levels and pelvic pain. Results From 56 patients, five cases were ultimateley excluded, because the histological diagnosis was other than cystic ovarian endometriosis (2 teratomas and 3 haemorragic cysts. The mean thrombospondin-1 serum levels in group A was 256,69 pg/ml_+37,07 and in group B was 291,41 pg/ml + 35,59. Conclusion Pain symptoms in ovarian endometriosis is not correlated with thrombospondin-1 serum levels.

  4. Spatial variation in genetic diversity and natural selection on the thrombospondin-related adhesive protein locus of Plasmodium vivax (PvTRAP.

    Directory of Open Access Journals (Sweden)

    Rattiporn Kosuwin

    Full Text Available Thrombospondin-related adhesive protein (TRAP of malaria parasites is essential for sporozoite motility and invasions into mosquito's salivary gland and vertebrate's hepatocyte; thereby, it is a promising target for pre-erythrocytic vaccine. TRAP of Plasmodium vivax (PvTRAP exhibits sequence heterogeneity among isolates, an issue relevant to vaccine development. To gain insights into variation in the complete PvTRAP sequences of parasites in Thailand, 114 vivax malaria patients were recruited in 2006-2007 from 4 major endemic provinces bordering Myanmar (Tak in the northwest, n = 30 and Prachuap Khirikhan in the southwest, n = 25, Cambodia (Chanthaburi in the east, n = 29 and Malaysia (Yala and Narathiwat in the south, n = 30. In total, 26 amino acid substitutions were detected and 9 of which were novel, resulting in 44 distinct haplotypes. Haplotype and nucleotide diversities were lowest in southern P. vivax population while higher levels of diversities were observed in other populations. Evidences of positive selection on PvTRAP were demonstrated in domains II and IV and purifying selection in domains I, II and VI. Genetic differentiation was significant between each population except that between populations bordering Myanmar where transmigration was common. Regression analysis of pairwise linearized Fst and geographic distance suggests that P. vivax populations in Thailand have been isolated by distance. Sequence diversity of PvTRAP seems to be temporally stable over one decade in Tak province based on comparison of isolates collected in 1996 (n = 36 and 2006-2007. Besides natural selection, evidences of intragenic recombination have been supported in this study that could maintain and further generate diversity in this locus. It remains to be investigated whether amino acid substitutions in PvTRAP could influence host immune responses although several predicted variant T cell epitopes drastically altered the epitope

  5. THINKING ABOUT REFERRALS TO ALCOHOLICS ANONYMOUS IN RELATIONAL WAYS

    Directory of Open Access Journals (Sweden)

    Christopher K. Bitten

    2010-02-01

    Full Text Available This article examines Alcoholics Anonymous (AA as a relational therapy, seen through the lens of the relational needs described by Richard Erskine. AA as a resource may be underemployed by therapists who do not realize its potential to heal the relational damage suffered and inflicted by their alcoholic clients. Common misconceptions about AA are addressed, and ways for therapists to facilitate successful referrals of clients to AA are described. The author posits that there is a synergistic benefit in combining integrative psychotherapy with the client’s involvement in AA.

  6. Th1 immune response to Plasmodium falciparum recombinant thrombospondin-related adhesive protein (TRAP) antigen is enhanced by TLR3-specific adjuvant, poly(I:C) in BALB/c mice.

    Science.gov (United States)

    Mehrizi, A A; Ameri Torzani, M; Zakeri, S; Jafary Zadeh, A; Babaeekhou, L

    2018-07-01

    Sporozoite-based malaria vaccines have provided a gold standard for malaria vaccine development, and thrombospondin-related adhesive protein (TRAP) serves as the main vaccine candidate antigen on sporozoites. As recombinant malaria vaccine candidate antigens are poorly immunogenic, additional appropriate immunostimulants, such as an efficient adjuvant, are highly essential to modulate Th1-cell predominance and also to induce a protective and long-lived immune response. In this study, polyinosinic:polycytidylic acid [poly(I:C)], the ligand of TLR3, was considered as the potential adjuvant for vaccines targeting stronger Th1-based immune responses. For this purpose, BALB/c mice were immunized with rPfTRAP delivered in putative poly(I:C) adjuvant, and humoural and cellular immune responses were determined in different immunized mouse groups. Delivery of rPfTRAP with poly(I:C) induced high levels and titres of persisted and also high-avidity anti-rPfTRAP IgG antibodies comparable to complete Freund's adjuvant (CFA)/incomplete Freund's adjuvant (IFA) adjuvant after the second boost. In addition, rPfTRAP formulated with poly(I:C) elicited a higher ratio of IFN-γ/IL-5, IgG2a/IgG1, and IgG2b/IgG1 than with CFA/IFA, indicating that poly(I:C) supports the induction of a stronger Th1-based immune response. This is a first time study which reveals the potential of rPfTRAP delivery in poly(I:C) to increase the level, avidity and durability of both anti-PfTRAP cytophilic antibodies and Th1 cytokines. © 2018 John Wiley & Sons Ltd.

  7. Thrombospondin-4 is a putative tumour-suppressor gene in colorectal cancer that exhibits age-related methylation

    International Nuclear Information System (INIS)

    Greco, Sonia A; Leggett, Barbara A; Whitehall, Vicki LJ; Chia, June; Inglis, Kelly J; Cozzi, Sarah-Jane; Ramsnes, Ingunn; Buttenshaw, Ronald L; Spring, Kevin J; Boyle, Glen M; Worthley, Daniel L

    2010-01-01

    Thrombospondin-4 (THBS4) is a member of the extracellular calcium-binding protein family and is involved in cell adhesion and migration. The aim of this study was to evaluate the potential role of deregulation of THBS4 expression in colorectal carcinogenesis. Of particular interest was the possible silencing of expression by methylation of the CpG island in the gene promoter. Fifty-five sporadic colorectal tumours stratified for the CpG Island Methylator Phenotype (CIMP) were studied. Immunohistochemical staining of THBS4 protein was assessed in normal and tumour specimens. Relative levels of THBS4 transcript expression in matched tumours and normal mucosa were also determined by quantitative RT-PCR. Colony forming ability was examined in 8 cell lines made to overexpress THBS4. Aberrant promoter hypermethylation was investigated as a possible mechanism of gene disruption using MethyLight. Methylation was also assessed in the normal colonic tissue of 99 patients, with samples biopsied from four regions along the length of the colon. THBS4 expression was significantly lower in tumour tissue than in matched normal tissue. Immunohistochemical examination demonstrated that THBS4 protein was generally absent from normal epithelial cells and tumours, but was occasionally expressed at low levels in the cytoplasm towards the luminal surface in vesicular structures. Forced THBS4 over-expression caused a 50-60% repression of tumour colony growth in all eight cell lines examined compared to control cell lines. Tumours exhibited significantly higher levels of methylation than matched normal mucosa, and THBS4 methylation correlated with the CpG island methylator phenotype. There was a trend towards decreased gene expression in tumours exhibiting high THBS4 methylation, but the correlation was not significant. THBS4 methylation was detectable in normal mucosal biopsies where it correlated with increasing patient age and negatively with the occurrence of adenomas elsewhere in the

  8. Thrombospondin-4 is a putative tumour-suppressor gene in colorectal cancer that exhibits age-related methylation

    Directory of Open Access Journals (Sweden)

    Greco Sonia A

    2010-09-01

    Full Text Available Abstract Background Thrombospondin-4 (THBS4 is a member of the extracellular calcium-binding protein family and is involved in cell adhesion and migration. The aim of this study was to evaluate the potential role of deregulation of THBS4 expression in colorectal carcinogenesis. Of particular interest was the possible silencing of expression by methylation of the CpG island in the gene promoter. Methods Fifty-five sporadic colorectal tumours stratified for the CpG Island Methylator Phenotype (CIMP were studied. Immunohistochemical staining of THBS4 protein was assessed in normal and tumour specimens. Relative levels of THBS4 transcript expression in matched tumours and normal mucosa were also determined by quantitative RT-PCR. Colony forming ability was examined in 8 cell lines made to overexpress THBS4. Aberrant promoter hypermethylation was investigated as a possible mechanism of gene disruption using MethyLight. Methylation was also assessed in the normal colonic tissue of 99 patients, with samples biopsied from four regions along the length of the colon. Results THBS4 expression was significantly lower in tumour tissue than in matched normal tissue. Immunohistochemical examination demonstrated that THBS4 protein was generally absent from normal epithelial cells and tumours, but was occasionally expressed at low levels in the cytoplasm towards the luminal surface in vesicular structures. Forced THBS4 over-expression caused a 50-60% repression of tumour colony growth in all eight cell lines examined compared to control cell lines. Tumours exhibited significantly higher levels of methylation than matched normal mucosa, and THBS4 methylation correlated with the CpG island methylator phenotype. There was a trend towards decreased gene expression in tumours exhibiting high THBS4 methylation, but the correlation was not significant. THBS4 methylation was detectable in normal mucosal biopsies where it correlated with increasing patient age and

  9. Comparison of the Personality Profiles of Inmate Anonymous and Non-Anonymous Male Addicts

    Directory of Open Access Journals (Sweden)

    Nasrolah Erfani

    2013-05-01

    Full Text Available Aim: This study compared the personality profiles of inmate anonymous and non-anonymous male addicts. Method: The participants of study were anonymous and non-anonymous male addicts of the prisons of the Hamadan province in 1391. The population was 3130 addicts, including 627 anonymous and 2503 non-anonymous addicts. The 310 addicts were selected by stratified random sampling the sample size was determined by Cochran formula.The short-form NEO Five Factor personality questionnaire administered among selected sample. Data analyzed by descriptive statistic as frequency and percentage, also, inferential statistic as multivariate analysis of variance was run. Results: The results showed that personality profiles of anonymous and non-anonymous addicts were significantly different. That is, mean score of neuroticism in anonymous addicts was less than non anonymous. Also, mean score of extraversion was higher in anonymous addicts. Conclusion: It can be concluded that the anonymous male addicts are differ with non-anonymous male addicts in personality traits.

  10. An overview of anonymity and anonymous communication

    NARCIS (Netherlands)

    Koot, M.

    2008-01-01

    Privacy is becoming an increasingly important aspect in distributed systems. In anonymous communication, privacy is provided to communicating parties by hiding their identities from each other and/or from others. This paper discusses the problem of anonymous communication and clarifies the notion of

  11. Comments on ``Anonymous Reviews'' An Editor's View of Anonymous Reviews

    Science.gov (United States)

    Goff, John A.

    I have read with great interest the recent Forum commentaries in Eos by Myrl Beck, Charles Robinove, Robert Criss, and Anne Hofmeister regarding anonymous reviews. I heartily support their position that anonymous reviews should be avoided. I have not written an anonymous review in ages (and regret the few that I did), and have always appreciated and respected greatly anyone who signs a critical review of one of my own papers. However, I would like to add some perspective from the editorial standpoint. I have served as JGR associate editor for 3 years (never anonymously!), and as Eos editor for seismology and tectonophysics for 4. Over the years, I have rejected a fair number of papers, most of those based on anonymous reviews (fortunately, none of the above commentators was one of them). The vast majority of anonymous reviews I received were well considered. While I would wish that all reviews were signed, I don't think we can summarily dismiss the fear that many would have of enmity and reprisal over a critical review. Some of these fears are likely justified. On more than one occasion, have I witnessed overly aggressive responses on the part of authors to anonymous reviews that I considered to be entirely fair and constructive in their criticisms. I do think we need to do all we can to discourage anonymous reviews, but it will be difficult to completely remove that choice from the process.

  12. “We are Anonymous.” Anonymity in the Public Sphere – Challenges of Free and Open Communication

    Directory of Open Access Journals (Sweden)

    Saskia Sell

    2013-05-01

    Full Text Available Anonymity, the stealth mode of public communication, challenges different actors who deal with freedom of communication issues in their day to day life – be it professional journalists, information and communication scientists, technicians or political activists. This article aims to deliver theoretical background on the concept of anonymity on the macro-level, as well as to shed light on how different communicators deal with anonymity on the micro-level. Based on the example of the Anonymous movement, communicative actions are put in relation to media technological artifacts and their surrounding media environment with a focus on journalistic practice and public response to the phenomenon. The analysis concludes with the need for a preservation of options for anonymous public communication as a dimension of freedom of communication after carefully considering both the advantages and the potential risks connected to that mode of private-public communication.

  13. The selective adaptation of the alcoholics anonymous program by Gamblers Anonymous.

    Science.gov (United States)

    Browne, B R

    1991-09-01

    This paper is largely based on a year long observation study of Gamblers Anonymous and Alcoholics Anonymous meetings in northern California. The paper argues, contrary to popular assumption, that Gamblers Anonymous is significantly different from Alcoholics Anonymous. Differences, in members' consciousness for example, are discussed. The paper contends that although there is some12 step consciousness in G.A., the dominant consciousness ispage 17 consciousness. The significant differences are attributed to the selective adaptation of the Alcoholics Anonymous program. Several consequences of these differences, such as the central role of a language of the self in A.A. and not in G.A., are highlighted.

  14. Anonymous steps: gender and Gamblers Anonymous

    OpenAIRE

    Rogers, Jim

    2015-01-01

    The biggest source of help for problem gamblers remains gamblers anonymous (GA) in terms of accessibility and availability. GA has traditionally been very much a male preserve. This paper reports on a literature review of Gamblers Anonymous together with data from observations of a contemporary open GA meeting over a one year period. Whilst some studies from North America suggest a changing culture and gender balance within GA programmes observations from the North of England, supported b...

  15. Pattern-Guided k-Anonymity

    Directory of Open Access Journals (Sweden)

    Rolf Niedermeier

    2013-10-01

    Full Text Available We suggest a user-oriented approach to combinatorial data anonymization. A data matrix is called k-anonymous if every row appears at least k times—the goal of the NP-hard k-ANONYMITY problem then is to make a given matrix k-anonymous by suppressing (blanking out as few entries as possible. Building on previous work and coping with corresponding deficiencies, we describe an enhanced k-anonymization problem called PATTERN-GUIDED k-ANONYMITY, where the users specify in which combinations suppressions may occur. In this way, the user of the anonymized data can express the differing importance of various data features. We show that PATTERN-GUIDED k-ANONYMITY is NP-hard. We complement this by a fixed-parameter tractability result based on a “data-driven parameterization” and, based on this, develop an exact integer linear program (ILP-based solution method, as well as a simple, but very effective, greedy heuristic. Experiments on several real-world datasets show that our heuristic easily matches up to the established “Mondrian” algorithm for k-ANONYMITY in terms of the quality of the anonymization and outperforms it in terms of running time.

  16. Anonymization of Court Orders

    DEFF Research Database (Denmark)

    Povlsen, Claus; Jongejan, Bart; Hansen, Dorte Haltrup

    We describe an anonymization tool that was commissioned by and specified together with Schultz, a publishing company specialized in Danish law related publications. Unavailability of training data and the need to guarantee compliance with pre-existing anonymization guidelines forced us to implement...... a tool using manually crafted rules. We used Bracmat, a programming language that is specialized in transforming tree data structures, to meet the requirement to pass the XML structure of the input document unscathed through the whole workflow. The tool attains a reassuringly good recall, makes almost...

  17. Purpose-restricted Anonymous Mobile Communications Using Anonymous Signatures in Online Credential Systems

    DEFF Research Database (Denmark)

    Fathi, Hanane; Shin, SeongHan; Kobara, Kazukuni

    2010-01-01

    To avoid the risk of long-term storage of secrets on a portable device, an online credential system supports the roaming user in retrieving securely at various locations his private key and other material to generate anonymous signatures. The protocol proposed here allows a roaming mobile user...... to access anonymously services such as whistle blowing and net-counselling. Our approach: (1) allows a mobile user, remembering a short password, to anonymously and securely retrieve the credentials necessary for his anonymous communication without assuming a pre-established anonymous channel...

  18. On Backward-Style Anonymity Verification

    Science.gov (United States)

    Kawabe, Yoshinobu; Mano, Ken; Sakurada, Hideki; Tsukada, Yasuyuki

    Many Internet services and protocols should guarantee anonymity; for example, an electronic voting system should guarantee to prevent the disclosure of who voted for which candidate. To prove trace anonymity, which is an extension of the formulation of anonymity by Schneider and Sidiropoulos, this paper presents an inductive method based on backward anonymous simulations. We show that the existence of an image-finite backward anonymous simulation implies trace anonymity. We also demonstrate the anonymity verification of an e-voting protocol (the FOO protocol) with our backward anonymous simulation technique. When proving the trace anonymity, this paper employs a computer-assisted verification tool based on a theorem prover.

  19. Polymorphisms A387P in thrombospondin-4 and N700S in thrombospondin-1 perturb calcium binding sites.

    Science.gov (United States)

    Stenina, Olga I; Ustinov, Valentin; Krukovets, Irene; Marinic, Tina; Topol, Eric J; Plow, Edward F

    2005-11-01

    Recent genetic studies have associated members of the thrombospondin (TSP) gene family with premature cardiovascular disease. The disease-associated polymorphisms lead to single amino acid changes in TSP-4 (A387P) and TSP-1 (N700S). These substitutions reside in adjacent domains of these highly homologous proteins. Secondary structural predictive programs and the homology of the domains harboring these amino acid substitutions to those in other proteins pointed to potential alterations of putative Ca2+ binding sites that reside in close proximity to the polymorphic amino acids. Since Ca2+ binding is critical for the structure and function of TSP family members, direct evidence for differences in Ca2+ binding by the polymorphic forms was sought. Using synthetic peptides and purified recombinant variant fragments bearing the amino acid substitutions, we measured differences in Tb3+ luminescence as an index of Ca2+ binding. The Tb3+ binding constants placed the TSP-1 region affected by N700S polymorphism among other high-affinity Ca2+ binding sites. The affinity of Ca2+ binding was lower for peptides (3.5-fold) and recombinant fragments (10-fold) containing the S700 vs. the N700 form. In TSP-4, the P387 form acquired an additional Ca2+ binding site absent in the A387 form. The results of our study suggest that both substitutions (A387P in TSP-4 and N700S in TSP-1) alter Ca2+ binding properties. Since these substitutions exert the opposite effects on Ca2+ binding, a decrease in TSP-1 and an increase in TSP-4, the two TSP variants are likely to influence cardiovascular functions in distinct but yet pathogenic ways.

  20. Quantum anonymous voting with anonymity check

    International Nuclear Information System (INIS)

    Horoshko, Dmitri; Kilin, Sergei

    2011-01-01

    We propose a new protocol for quantum anonymous voting having serious advantages over the existing protocols: it protects both the voters from a curious tallyman and all the participants from a dishonest voter in unconditional way. The central idea of the protocol is that the ballots are given back to the voters after the voting process, which gives a possibility for two voters to check the anonymity of the vote counting process by preparing a special entangled state of two ballots. Any attempt of cheating from the side of the tallyman results in destroying the entanglement, which can be detected by the voters.

  1. Peptides Derived from Type IV Collagen, CXC Chemokines, and Thrombospondin-1 Domain-Containing Proteins Inhibit Neovascularization and Suppress Tumor Growth in MDA-MB-231 Breast Cancer Xenografts

    Directory of Open Access Journals (Sweden)

    Jacob E. Koskimaki

    2009-12-01

    Full Text Available Angiogenesis or neovascularization, the process of new blood vessel formation from preexisting microvasculature, involves interactions among several cell types including parenchymal, endothelial cells, and immune cells. The formation of new vessels is tightly regulated by a balance between endogenous proangiogenic and antiangiogenic factors to maintain homeostasis in tissue; tumor progression and metastasis in breast cancer have been shown to be angiogenesis-dependent. We previously introduced a systematic methodology to identify putative endogenous antiangiogenic peptides and validated these predictions in vitro in human umbilical vein endothelial cell proliferation and migration assays. These peptides are derived from several protein families including type IV collagen, CXC chemokines, and thrombospondin-1 domain-containing proteins. On the basis of the results from the in vitro screening, we have evaluated the ability of one peptide selected from each family named pentastatin-1, chemokinostatin-1, and properdistatin, respectively, to suppress angiogenesis in an MDA-MB-231 human breast cancer orthotopic xenograft model in severe combined immunodeficient mice. Peptides were administered intraperitoneally once per day. We have demonstrated significant suppression of tumor growth in vivo and subsequent reductions in microvascular density, indicating the potential of these peptides as therapeutic agents for breast cancer.

  2. How to Bootstrap Anonymous Communication

    DEFF Research Database (Denmark)

    Jakobsen, Sune K.; Orlandi, Claudio

    2015-01-01

    formal study in this direction. To solve this problem, we introduce the concept of anonymous steganography: think of a leaker Lea who wants to leak a large document to Joe the journalist. Using anonymous steganography Lea can embed this document in innocent looking communication on some popular website...... anonymous steganography, { A construction showing that anonymous steganography is possible (which uses recent results in circuits obfuscation), { A lower bound on the number of bits which are needed to bootstrap anonymous communication....

  3. How to Bootstrap Anonymous Communication

    DEFF Research Database (Denmark)

    Jakobsen, Sune K.; Orlandi, Claudio

    2015-01-01

    formal study in this direction. To solve this problem, we introduce the concept of anonymous steganography: think of a leaker Lea who wants to leak a large document to Joe the journalist. Using anonymous steganography Lea can embed this document in innocent looking communication on some popular website...... defining anonymous steganography, - A construction showing that anonymous steganography is possible (which uses recent results in circuits obfuscation), - A lower bound on the number of bits which are needed to bootstrap anonymous communication....

  4. Data Retention and Anonymity Services

    Science.gov (United States)

    Berthold, Stefan; Böhme, Rainer; Köpsell, Stefan

    The recently introduced legislation on data retention to aid prosecuting cyber-related crime in Europe also affects the achievable security of systems for anonymous communication on the Internet. We argue that data retention requires a review of existing security evaluations against a new class of realistic adversary models. In particular, we present theoretical results and first empirical evidence for intersection attacks by law enforcement authorities. The reference architecture for our study is the anonymity service AN.ON, from which we also collect empirical data. Our adversary model reflects an interpretation of the current implementation of the EC Directive on Data Retention in Germany.

  5. Self-tallying quantum anonymous voting

    Science.gov (United States)

    Wang, Qingle; Yu, Chaohua; Gao, Fei; Qi, Haoyu; Wen, Qiaoyan

    2016-08-01

    Anonymous voting is a voting method of hiding the link between a vote and a voter, the context of which ranges from governmental elections to decision making in small groups like councils and companies. In this paper, we propose a quantum anonymous voting protocol assisted by two kinds of entangled quantum states. Particularly, we provide a mechanism of opening and permuting the ordered votes of all the voters in an anonymous manner; any party who is interested in the voting results can acquire a permutation copy and then obtains the voting result through a simple calculation. Unlike all previous quantum works on anonymous voting, our quantum anonymous protocol possesses the properties of privacy, self-tallying, nonreusability, verifiability, and fairness at the same time. In addition, we demonstrate that the entanglement of the quantum states used in our protocol makes an attack from an outside eavesdropper and inside dishonest voters impossible. We also generalize our protocol to execute the task of anonymous multiparty computation, such as anonymous broadcast and anonymous ranking.

  6. Calcium-induced conformational changes of Thrombospondin-1 signature domain: implications for vascular disease.

    Science.gov (United States)

    Gupta, Akanksha; Agarwal, Rahul; Singh, Ashutosh; Bhatnagar, Sonika

    2017-06-01

    Thrombospondin1 (TSP1) participates in numerous signaling pathways critical for vascular physiology and disease. The conserved signature domain of thrombospondin 1 (TSP1-Sig1) comprises three epidermal growth factor (EGF), 13 calcium-binding type 3 thrombospondin (T3) repeats, and one lectin-like module arranged in a stalk-wire-globe topology. TSP1 is known to be present in both calcium-replete (Holo-) and calcium-depleted (Apo-) state, each with distinct downstream signaling effects. To prepare a homology model of TSP1-Sig1 and investigate the effect of calcium on its dynamic structure and interactions. A homology model of Holo-TSP1-Sig1 was prepared with TSP2 as template in Swissmodel workspace. The Apo-form of the model was obtained by omitting the bound calcium ions from the homology model. Molecular dynamics (MD) simulation studies (100 ns) were performed on the Holo- and Apo- forms of TSP1 using Gromacs4.6.5. After simulation, Holo-TSP1-Sig1 showed significant reorientation at the interface of the EGF1-2 and EGF2-3 modules. The T3 wire is predicted to show the maximum mobility and deviation from the initial model. In Apo-TSP1-Sig1 model, the T3 repeats unfolded and formed coils with predicted increase in flexibility. Apo-TSP1-Sig1model also predicted the exposure of the binding sites for neutrophil elastase, integrin and fibroblast growth factor 2. We present a structural model and hypothesis for the role of TSP1-Sig1 interactions in the development of vascular disorders. The simulated model of the fully calcium-loaded and calcium-depleted TSP1-Sig1 may enable the development of its interactions as a novel therapeutic target for the treatment of vascular diseases.

  7. Criminal offenses in gamblers anonymous and hospital treated pathological gamblers.

    Science.gov (United States)

    Blaszczynski, A P; McConaghy, N

    1994-06-01

    The purpose of this study was to compare the nature and prevalence of gambling and non-gambling related offenses in samples of pathological gamblers seeking behavioural treatment from a hospital-based program and those attending Gamblers Anonymous. A semi-structured interview schedule obtaining demographic data and details of the nature, frequency, and consequent legal action of criminal offenses committed was administered to 152 consecutive hospital treated pathological gamblers, and 154 Gamblers Anonymous attendees who volunteered to participate in the study. Of the total sample, 59% admitted a gambling-related offense, and 23% to a conviction. There was no difference in the proportion of hospital treated and Gamblers Anonymous subjects who offended. The most common gambling-related offenses were larceny, embezzlement and misappropriation. Gamblers committed a median of ten offenses over an average ten year period of pathological gambling with a median value of $ A 300(1) per offense. The median value for each non-gambling-related offense was $ A 130. Except for the significantly older mean age of Gamblers Anonymous subjects, hospital treated gamblers did not differ from Gamblers Anonymous attenders on relevant demographic features or parameters of gambling behaviour. Findings were interpreted to suggest a possible causal link between pathological gambling and the commission of non-violent property offenses.

  8. Predictors of anonymous cyber aggression: the role of adolescents' beliefs about anonymity, aggression, and the permanency of digital content.

    Science.gov (United States)

    Wright, Michelle F

    2014-07-01

    Little attention has been given to whether adolescents' beliefs about anonymity and their normative beliefs about cyber aggression jointly increase their perpetration of cyber aggression. To this end, the present longitudinal study examined the moderating influence of these variables on the relationships among adolescents' attitudes toward the permanency of digital content, confidence with not getting caught, and anonymous cyber aggression (ACA) assessed 1 year later (Time 2). These associations were examined among 274 7th and 8th graders and through five technologies, including social networking sites (SNS), e-mail, instant messenger (IM), mobile phones, and chatrooms. Findings indicated that increases in Time 2 ACA and attitudes toward the permanency of digital content were more strongly related when adolescents reported greater confidence with not getting caught and higher normative beliefs concerning cyber aggression through SNS and mobile phones. In addition, higher levels of attitudes toward the permanency of digital content, confidence with not getting caught, beliefs about anonymity, and normative beliefs regarding cyber aggression were related to greater Time 2 ACA through e-mail, IM, and chatrooms. All findings are discussed in the context of adolescents' positive attitudes toward ACA, and an appeal for additional research is made to understand more about anonymity in cyberspace.

  9. Astrocyte-secreted thrombospondin-1 modulates synapse and spine defects in the fragile X mouse model.

    Science.gov (United States)

    Cheng, Connie; Lau, Sally K M; Doering, Laurie C

    2016-08-02

    Astrocytes are key participants in various aspects of brain development and function, many of which are executed via secreted proteins. Defects in astrocyte signaling are implicated in neurodevelopmental disorders characterized by abnormal neural circuitry such as Fragile X syndrome (FXS). In animal models of FXS, the loss in expression of the Fragile X mental retardation 1 protein (FMRP) from astrocytes is associated with delayed dendrite maturation and improper synapse formation; however, the effect of astrocyte-derived factors on the development of neurons is not known. Thrombospondin-1 (TSP-1) is an important astrocyte-secreted protein that is involved in the regulation of spine development and synaptogenesis. In this study, we found that cultured astrocytes isolated from an Fmr1 knockout (Fmr1 KO) mouse model of FXS displayed a significant decrease in TSP-1 protein expression compared to the wildtype (WT) astrocytes. Correspondingly, Fmr1 KO hippocampal neurons exhibited morphological deficits in dendritic spines and alterations in excitatory synapse formation following long-term culture. All spine and synaptic abnormalities were prevented in the presence of either astrocyte-conditioned media or a feeder layer derived from FMRP-expressing astrocytes, or following the application of exogenous TSP-1. Importantly, this work demonstrates the integral role of astrocyte-secreted signals in the establishment of neuronal communication and identifies soluble TSP-1 as a potential therapeutic target for Fragile X syndrome.

  10. Research on Anonymization and De-anonymization in the Bitcoin System

    OpenAIRE

    ShenTu, QingChun; Yu, JianPing

    2015-01-01

    The Bitcoin system is an anonymous, decentralized crypto-currency. There are some deanonymizating techniques to cluster Bitcoin addresses and to map them to users' identifications in the two research directions of Analysis of Transaction Chain (ATC) and Analysis of Bitcoin Protocol and Network (ABPN). Nowadays, there are also some anonymization methods such as coin-mixing and transaction remote release (TRR) to cover the relationship between Bitcoin address and the user. This paper studies an...

  11. Suppression of matrix protein synthesis in endothelial cells by herpes simplex virus is not dependent on viral protein synthesis

    International Nuclear Information System (INIS)

    Kefalides, N.A.

    1986-01-01

    The synthesis of matrix proteins by human endothelial cells (EC) in vitro was studied before and at various times after infection with Herpes Simplex virus Type 1 (HSV-1) or 2 (HSV-2). Monolayers of EC were either mock-infected or infected with virus for 1 hr at a multiplicity infection (MOI) of 5 to 20 at 37 0 C. Control and infected cultures were pulse-labeled for 1 or 2 hrs with either [ 14 C]proline or [ 35 S]methionine. Synthesis of labeled matrix proteins was determined by SDS-gel electrophoresis. Suppression of synthesis of fibronectin, Type IV collagen and thrombospondin began as early as 2 hrs and became almost complete by 10 hrs post-infection. The degree of suppression varied with the protein and the virus dose. Suppression of Type IV collagen occurred first followed by that of fibronectin and then thrombospondin. Infection of EC with UV irradiated HSV-1 or HSV-2 resulted in suppression of host-cell protein synthesis as well as viral protein synthesis. Infection with intact virus in the presence of actinomycin-D resulted in suppression of both host-cell and viral protein synthesis. The data indicate that infection of EC with HSV leads to suppression of matrix protein synthesis which does not depend on viral protein synthesis

  12. Thrombospondin-1 is not the major activator of TGF-β1 in thrombopoietin-induced myelofibrosis

    DEFF Research Database (Denmark)

    Evrard, Solène; Bluteau, Olivier; Tulliez, Micheline

    2011-01-01

    Transforming growth factor-β1 (TGF-β1) is the most important cytokine involved in the promotion of myelofibrosis. Mechanisms leading to its local activation in the bone marrow environment remain unclear. As a recent study has highlighted the role of thrombospondin-1 (TSP-1) in platelet-derived TG...

  13. Thrombospondin-1 expression may be implicated in liver atrophic mechanism due to obstructed portal venous flow.

    Science.gov (United States)

    Hayashi, Hiromitsu; Kuroki, Hideyuki; Higashi, Takaaki; Takeyama, Hideaki; Yokoyama, Naomi; Okabe, Hirohisa; Nitta, Hidetoshi; Beppu, Toru; Takamori, Hiroshi; Baba, Hideo

    2017-07-01

    Liver is an amazing organ that can undergo regenerative and atrophic changes inversely, depending on blood flow conditions. Although the regenerative mechanism has been extensively studied, the atrophic mechanism remains to be elucidated. To assess the molecular mechanism of liver atrophy due to reduced portal blood flow, we analyzed the gene expressions between atrophic and hypertrophic livers induced by portal vein embolization in three human liver tissues using microarray analyses. Thrombospondin (TSP)-1 is an extracellular protein and a negative regulator of liver regeneration through its activation of the transforming growth factor-β/Smad signaling pathway. TSP-1 was extracted as the most upregulated gene in atrophic liver compared to hypertrophic liver due to portal flow obstruction in human. Liver atrophic and hypertrophic changes were confirmed by HE and proliferating cell nuclear antigen staining and terminal deoxynucleotidyl transferase-mediated digoxigenin-dUTP nick-end labeling. In an in vivo model with portal ligation, TSP-1 and phosphorylated Smad2 expression were continuously induced at 6 h and thereafter in the portal ligated liver, whereas the induction was transient at 6 h in the portal non-ligated liver. Indeed, while cell proliferation represented by proliferating cell nuclear antigen expression at 48 h was induced in the portal ligated liver, the sinusoidal dilatation and hepatocyte cell death with terminal deoxynucleotidyl transferase-mediated digoxigenin-dUTP nick-end labeling was detectable at 48 h in the portal ligated liver. Obstructed portal flow induces persistent TSP-1 expression and transforming growth factor-β/Smad signal activation in atrophic liver. Thrombospondin-1 may be implicated in the liver atrophic change due to obstructed portal flow as a pro-atrophic factor. © 2016 The Japan Society of Hepatology.

  14. Digital anonymity on the internet : new rules for anonymous electronic transactions? an exploration of the private law implications of digital anonymity

    NARCIS (Netherlands)

    Grijpink, J.H.A.M.; Prins, C.

    2001-01-01

    This article sets out the most important conclusions of the first stage of a study into the dimensions of digital anonymity. It is intended to set out the problem, make people aware of the intricacies of the problem and thus stimulate the debate on useful legal structures for anonymity. The

  15. Anonymous publication of sensitive transactional data

    KAUST Repository

    Ghinita, Gabriel; Kalnis, Panos; Tao, Yufei

    2011-01-01

    Existing research on privacy-preserving data publishing focuses on relational data: in this context, the objective is to enforce privacy-preserving paradigms, such as k-anonymity and ℓ-diversity, while minimizing the information loss incurred in the anonymizing process (i.e., maximize data utility). Existing techniques work well for fixed-schema data, with low dimensionality. Nevertheless, certain applications require privacy-preserving publishing of transactional data (or basket data), which involve hundreds or even thousands of dimensions, rendering existing methods unusable. We propose two categories of novel anonymization methods for sparse high-dimensional data. The first category is based on approximate nearest-neighbor (NN) search in high-dimensional spaces, which is efficiently performed through locality-sensitive hashing (LSH). In the second category, we propose two data transformations that capture the correlation in the underlying data: 1) reduction to a band matrix and 2) Gray encoding-based sorting. These representations facilitate the formation of anonymized groups with low information loss, through an efficient linear-time heuristic. We show experimentally, using real-life data sets, that all our methods clearly outperform existing state of the art. Among the proposed techniques, NN-search yields superior data utility compared to the band matrix transformation, but incurs higher computational overhead. The data transformation based on Gray code sorting performs best in terms of both data utility and execution time. © 2006 IEEE.

  16. Anonymous publication of sensitive transactional data

    KAUST Repository

    Ghinita, Gabriel

    2011-02-01

    Existing research on privacy-preserving data publishing focuses on relational data: in this context, the objective is to enforce privacy-preserving paradigms, such as k-anonymity and ℓ-diversity, while minimizing the information loss incurred in the anonymizing process (i.e., maximize data utility). Existing techniques work well for fixed-schema data, with low dimensionality. Nevertheless, certain applications require privacy-preserving publishing of transactional data (or basket data), which involve hundreds or even thousands of dimensions, rendering existing methods unusable. We propose two categories of novel anonymization methods for sparse high-dimensional data. The first category is based on approximate nearest-neighbor (NN) search in high-dimensional spaces, which is efficiently performed through locality-sensitive hashing (LSH). In the second category, we propose two data transformations that capture the correlation in the underlying data: 1) reduction to a band matrix and 2) Gray encoding-based sorting. These representations facilitate the formation of anonymized groups with low information loss, through an efficient linear-time heuristic. We show experimentally, using real-life data sets, that all our methods clearly outperform existing state of the art. Among the proposed techniques, NN-search yields superior data utility compared to the band matrix transformation, but incurs higher computational overhead. The data transformation based on Gray code sorting performs best in terms of both data utility and execution time. © 2006 IEEE.

  17. Utility-preserving anonymization for health data publishing.

    Science.gov (United States)

    Lee, Hyukki; Kim, Soohyung; Kim, Jong Wook; Chung, Yon Dohn

    2017-07-11

    Publishing raw electronic health records (EHRs) may be considered as a breach of the privacy of individuals because they usually contain sensitive information. A common practice for the privacy-preserving data publishing is to anonymize the data before publishing, and thus satisfy privacy models such as k-anonymity. Among various anonymization techniques, generalization is the most commonly used in medical/health data processing. Generalization inevitably causes information loss, and thus, various methods have been proposed to reduce information loss. However, existing generalization-based data anonymization methods cannot avoid excessive information loss and preserve data utility. We propose a utility-preserving anonymization for privacy preserving data publishing (PPDP). To preserve data utility, the proposed method comprises three parts: (1) utility-preserving model, (2) counterfeit record insertion, (3) catalog of the counterfeit records. We also propose an anonymization algorithm using the proposed method. Our anonymization algorithm applies full-domain generalization algorithm. We evaluate our method in comparison with existence method on two aspects, information loss measured through various quality metrics and error rate of analysis result. With all different types of quality metrics, our proposed method show the lower information loss than the existing method. In the real-world EHRs analysis, analysis results show small portion of error between the anonymized data through the proposed method and original data. We propose a new utility-preserving anonymization method and an anonymization algorithm using the proposed method. Through experiments on various datasets, we show that the utility of EHRs anonymized by the proposed method is significantly better than those anonymized by previous approaches.

  18. Securing the anonymity of content providers in the World Wide Web

    Science.gov (United States)

    Demuth, Thomas; Rieke, Andreas

    1999-04-01

    Nowadays the World Wide Web (WWW) is an established service used by people all over the world. Most of them do not recognize the fact that they reveal plenty of information about themselves or their affiliation and computer equipment to the providers of web pages they connect to. As a result, a lot of services offer users to access web pages unrecognized or without risk of being backtracked, respectively. This kind of anonymity is called user or client anonymity. But on the other hand, an equivalent protection for content providers does not exist, although this feature is desirable for many situations in which the identity of a publisher or content provider shall be hidden. We call this property server anonymity. We will introduce the first system with the primary target to offer anonymity for providers of information in the WWW. Beside this property, it provides also client anonymity. Based on David Chaum's idea of mixes and in relation to the context of the WWW, we explain the term 'server anonymity' motivating the system JANUS which offers both client and server anonymity.

  19. Anonymous Connections and Onion Routing

    National Research Council Canada - National Science Library

    Syverson, Paul F; Goldschlag, David M; Reed, Michael G

    1997-01-01

    .... Unmodified Internet applications can use these anonymous connections by means of proxies. The proxies may also make communication anonymous by removing identifying information from the data stream...

  20. Anonymous Credential Schemes with Encrypted Attributes

    NARCIS (Netherlands)

    Guajardo Merchan, J.; Mennink, B.; Schoenmakers, B.

    2011-01-01

    In anonymous credential schemes, users obtain credentials on certain attributes from an issuer, and later show these credentials to a relying party anonymously and without fully disclosing the attributes. In this paper, we introduce the notion of (anonymous) credential schemes with encrypted

  1. Trust in Anonymity Networks

    Science.gov (United States)

    Sassone, Vladimiro; Hamadou, Sardaouna; Yang, Mu

    Anonymity is a security property of paramount importance, as we move steadily towards a wired, online community. Its import touches upon subjects as different as eGovernance, eBusiness and eLeisure, as well as personal freedom of speech in authoritarian societies. Trust metrics are used in anonymity networks to support and enhance reliability in the absence of verifiable identities, and a variety of security attacks currently focus on degrading a user's trustworthiness in the eyes of the other users. In this paper, we analyse the privacy guarantees of the Crowds anonymity protocol, with and without onion forwarding, for standard and adaptive attacks against the trust level of honest users.

  2. Proteomic profiling identifies markers for inflammation-related tumor-fibroblast interaction.

    Science.gov (United States)

    Drev, Daniel; Bileck, Andrea; Erdem, Zeynep N; Mohr, Thomas; Timelthaler, Gerald; Beer, Andrea; Gerner, Christopher; Marian, Brigitte

    2017-01-01

    Cancer associated fibroblasts are activated in the tumor microenvironment and contribute to tumor progression, angiogenesis, extracellular matrix remodeling, and inflammation. To identify proteins characteristic for fibroblasts in colorectal cancer we used liquid chromatography-tandem mass spectrometry to derive protein abundance from whole-tissue homogenates of human colorectal cancer/normal mucosa pairs. Alterations of protein levels were determined by two-sided t test with greater than threefold difference and an FDR of matrix organization, TGFβ receptor signaling and angiogenesis mainly originating from the stroma. Most prominent were increased abundance of SerpinB5 in the parenchyme and latent transforming growth factor β-binding protein, thrombospondin-B2, and secreted protein acidic-and-cysteine-rich in the stroma. Extracellular matrix remodeling involved collagens type VIII, XII, XIV, and VI as well as lysyl-oxidase-2. In silico analysis of mRNA levels demonstrated altered expression in the tumor and the adjacent normal tissue as compared to mucosa of healthy individuals indicating that inflammatory activation affected the surrounding tissue. Immunohistochemistry of 26 tumor specimen confirmed upregulation of SerpinB5, thrombospondin B2 and secreted protein acidic-and-cysteine-rich. This study demonstrates the feasibility of detecting tumor- and compartment-specific protein-signatures that are functionally meaningful by proteomic profiling of whole-tissue extracts together with mining of RNA expression datasets. The results provide the basis for further exploration of inflammation-related stromal markers in larger patient cohorts and experimental models.

  3. Social distance and anonymity modulate fairness consideration: An ERP study

    Science.gov (United States)

    Yu, Rongjun; Hu, Pan; Zhang, Ping

    2015-01-01

    Previous research indicated that fairness consideration can be influenced by social distance. However, it is not clear whether social distance and anonymity have an interactive impact on fairness evaluation during asset distribution and whether these processes can be documented in brain activity. Using a modified ultimatum game combined with measures of event related potential (ERP), we examined how social distance and anonymity modulate brain response to inequality. At the behavior level, we found that acceptance rate and reaction time can be substantially modified by social distance and anonymity. Feedback-related negativity, an ERP component associated with conflict between cognitive and emotion motives, was more negative in response to unfairness than fairness from strangers; however, it showed an opposite trend for unfair offers provided by friends, suggesting that the influence of social distance on fairness perception is relatively fast. The P300 in response to fair offers was more positive when the proposers made offers when uncertain about partner identity than when certain about partner identity. These results suggest that unfairness is evaluated in a fast conflict detection stage and a slower stage that integrates more complex social contextual factors such as anonymity. PMID:26293456

  4. An Extensive Study on Data Anonymization Algorithms Based on K-Anonymity

    Science.gov (United States)

    Simi, Ms. M. S.; Sankara Nayaki, Mrs. K.; Sudheep Elayidom, M., Dr.

    2017-08-01

    For business and research oriented works engaging Data Analysis and Cloud services needing qualitative data, many organizations release huge microdata. It excludes an individual’s explicit identity marks like name, address and comprises of specific information like DOB, Pin-code, sex, marital status, which can be combined with other public data to recognize a person. This implication attack can be manipulated to acquire any sensitive information from social network platform, thereby putting the privacy of a person in grave danger. To prevent such attacks by modifying microdata, K-anonymization is used. With potentially increasing data, the effective method to anonymize it stands challenging. After series of trails and systematic comparison, in this paper, we propose three best algorithms along with its efficiency and effectiveness. Studies help researchers to identify the relationship between the values of k, degree of anonymization, choosing a quasi-identifier and focus on execution time.

  5. Revocable Anonymous Access to the Internet?

    Science.gov (United States)

    Claessens, Joris; Diaz, Claudia; Goemans, Caroline; Preneel, Bart; Vandewalle, Joos; Dumortier, Jos

    2003-01-01

    Users of telecommunications networks are concerned about privacy, and desire anonymous access, while some organizations are concerned about how this anonymous access might be abused. Proposes a solution for revocable anonymous access to the Internet. Presents some legal background and motivation for such a solution. Indicates some difficulties and…

  6. Anonymous Transactions in Computer Networks

    Science.gov (United States)

    Dolev, Shlomi; Kopeetsky, Marina

    We present schemes for providing anonymous transactions while privacy and anonymity are preserved, providing user anonymous authentication in distributed networks such as the Internet. We first present a practical scheme for anonymous transactions while the transaction resolution is assisted by a Trusted Authority. This practical scheme is extended to a theoretical scheme where a Trusted Authority is not involved in the transaction resolution. Given an authority that generates for each player hard to produce evidence EVID (e. g., problem instance with or without a solution) to each player, the identity of a user U is defined by the ability to prove possession of said evidence. We use Zero-Knowledge proof techniques to repeatedly identify U by providing a proof that U has evidence EVID, without revealing EVID, therefore avoiding identity theft.

  7. Anon-Pass: Practical Anonymous Subscriptions.

    Science.gov (United States)

    Lee, Michael Z; Dunn, Alan M; Katz, Jonathan; Waters, Brent; Witchel, Emmett

    2013-12-31

    We present the design, security proof, and implementation of an anonymous subscription service. Users register for the service by providing some form of identity, which might or might not be linked to a real-world identity such as a credit card, a web login, or a public key. A user logs on to the system by presenting a credential derived from information received at registration. Each credential allows only a single login in any authentication window, or epoch . Logins are anonymous in the sense that the service cannot distinguish which user is logging in any better than random guessing. This implies unlinkability of a user across different logins. We find that a central tension in an anonymous subscription service is the service provider's desire for a long epoch (to reduce server-side computation) versus users' desire for a short epoch (so they can repeatedly "re-anonymize" their sessions). We balance this tension by having short epochs, but adding an efficient operation for clients who do not need unlinkability to cheaply re-authenticate themselves for the next time period. We measure performance of a research prototype of our protocol that allows an independent service to offer anonymous access to existing services. We implement a music service, an Android-based subway-pass application, and a web proxy, and show that adding anonymity adds minimal client latency and only requires 33 KB of server memory per active user.

  8. [Anonymous birth and neonaticide in Tyrol].

    Science.gov (United States)

    Danner, C; Pacher, M; Ambach, E; Brezinka, C

    2005-10-01

    In 2001 the Austrian government provided the legal means that formally enabled "anonymous birth": a woman can now give birth in any hospital in Austria without giving her name or insurance number, the baby is taken into care by social services and placed with adoptive parents. The cost of the hospital stay is covered from public funds. These measures were put into effect after some highly publicized cases of infant abandonment and neonaticide in Austria. In the mostly rural and small-town province of Tyrol province in western Austria (687,000 inhabitants, 7000 births per year) four cases of neonaticide were discovered in the years from 1996 to 2004. One child was abandoned inside a hospital. Since 2001 two women have made use of the "anonymous birth" option. Neither had had any pregnancy controls, both showed up at or near term with contractions. They delivered healthy infants that were then taken into care by local adoption services. Both women were extensively counselled by psychologists, social workers, medical and midwifery staff and both insisted on their original decision to remain anonymous. A few weeks later one of the women found herself at the centre of a criminal investigation for infanticide after anonymous letters were sent to family members insinuating she had done away with the child. Police stopped that investigation when hospital staff confirmed that the woman had had an "anonymous" delivery. Despite the option of legal "anonymous" birth free of charge in modern hospitals there are still cases of infant abandonment and neonaticide in Austria. It is proposed that the women who opt for anonymous birth may not be the women who would otherwise kill their babies. Instead, it appears that the women opted for anonymity to escape the probably well-intentioned but overbearing attention of their families and of social services. It is doubtful that the option of anonymous birth will lead to a complete disappearance of infanticide and infant abandonment in

  9. Effectiveness of Anonymization Methods in Preserving Patients' Privacy: A Systematic Literature Review.

    Science.gov (United States)

    Langarizadeh, Mostafa; Orooji, Azam; Sheikhtaheri, Abbas

    2018-01-01

    An ever growing for application of electronic health records (EHRs) has improved healthcare providers' communications, access to data for secondary use and promoted the quality of services. Patient's privacy has been changed to a great issue today since there are large loads of critical information in EHRs. Therefore, many privacy preservation techniques have been proposed and anonymization is a common one. This study aimed to investigate the effectiveness of anonymization in preserving patients' privacy. The articles published in the 2005-2016 were included. Pubmed, Cochrane, IEEE and ScienceDirect were searched with a variety of related keywords. Finally, 18 articles were included. In the present study, the relevant anonymization issues were investigated in four categories: secondary use of anonymized data, re-identification risk, anonymization effect on information extraction and inadequacy of current methods for different document types. The results revealed that though anonymization cannot reduce the risk of re-identification to zero, if implemented correctly, can manage to help preserve patient's privacy.

  10. Anonymous Boh avatud kunsti maastikul / Raivo Kelomees

    Index Scriptorium Estoniae

    Kelomees, Raivo, 1960-

    2010-01-01

    Anonymous Bohi näitus Tartu Kunstimajas, avatud 30. juulini 2010. Anonymous Boh on koos Non Grataga läbi viinud performance´id Euroopas, Ameerikas ja Aasias. Anonymous Bohi vastused oma näituse ja loominguga seotud küsimustele

  11. INCREASED VASOOCCLUSIVE CRISIS IN “O” BLOOD GROUP SICKLE CELL DISEASE PATIENTS: ASSOCIATION WITH UNDERLYING THROMBOSPONDIN LEVELS.

    Directory of Open Access Journals (Sweden)

    M. Al Huneini

    2017-04-01

    Full Text Available Abstract: Objectives: To explore the incidence of vaso-occlusive crisis (VOC in Blood Group “O” sickle cell disease (SCD patients, and correlate it with the blood group and thrombospondin (TSP levels. Methods: In 89 consecutive SCD patients, blood samples were obtained for vWF antigen, collagen binding activity, blood group typing, C-reactive protein, variant hemoglobin analysis (HPLC, Serum TSP 1 and TSP 2 levels, complete blood counts, liver function tests, LDH and renal function tests during VOC episodes and in steady state conditions. Results: In the steady state SCD patients (n=72, “O” blood group patients (n=37 showed significantly higher median serum TSP 1 and TSP 2 levels than the non “O” blood group patients [n=35] [p <0.05, Mann-Whitney test], with an inverse relation between VWF:Ag, Factor VIII:C and TSP levels. Furthermore, the serum TSP 1 and TSP 2 levels were significantly higher in patients presenting with acute VOC [n=17], and in those with repeated VOC’s (group 1, n=16 especially amongst those patients with blood group “O” [p, <0.05, Mann-Whitney test]. Conclusions: The study shows that there was an inverse relation between TSP and vWF levels, in blood group “O” SCD patients with an upregulation of the TSP levels. Expectedly, during active VOC crisis, the TSP 1 and TSP 2 levels were significantly elevated.    Key Words: VOC; SCD; TSP; vWD; Blood groups

  12. Impact of Anonymity and Identity Deception on Social Media eWOM

    OpenAIRE

    Kapoor , Payal ,; Gunta , Srinivas

    2016-01-01

    Part 4: Information Sharing on Social Media; International audience; Brand-related consumer to consumer communication, eWOM, is taking place in many forms across the social media space. Rules that governed credibility assessment of brand-related communication, WOM, in the Face to Face context may vary on social media, specifically because of anonymity that is afforded on different social media sites. The current study looks closely on the impact of anonymity in typical eWOM behaviour context ...

  13. Anonymous communication networks protecting privacy on the web

    CERN Document Server

    Peng, Kun

    2014-01-01

    In today's interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensure Internet privacy.Addressing the demand for authoritative information on anonymous Internet usage, Anonymous Communication Networks: Protecting Privacy on the Web examines anonymous communication networks as a solution to Internet privacy concerns. It explains how anonymous communication networks make it possible for participants to communicate with

  14. Practical anonymity hiding in plain sight online

    CERN Document Server

    Loshin, Peter

    2013-01-01

    For those with legitimate reason to use the Internet anonymously--diplomats, military and other government agencies, journalists, political activists, IT professionals, law enforcement personnel, political refugees and others--anonymous networking provides an invaluable tool, and many good reasons that anonymity can serve a very important purpose. Anonymous use of the Internet is made difficult by the many websites that know everything about us, by the cookies and ad networks, IP-logging ISPs, even nosy officials may get involved. It is no longer possible to turn off browser cookies to be l

  15. Are anonymous evaluations a better assessment of faculty teaching performance? A comparative analysis of open and anonymous evaluation processes.

    Science.gov (United States)

    Afonso, Nelia M; Cardozo, Lavoisier J; Mascarenhas, Oswald A J; Aranha, Anil N F; Shah, Chirag

    2005-01-01

    We compared teaching performance of medical school faculty using anonymous evaluations and open evaluations (in which the evaluator was not anonymous) and examined barriers to open evaluation. Residents and medical students evaluated faculty using an open evaluation instrument in which their identity was indicated in the evaluation. Following this, they completed anonymous evaluation on the same faculty members. Aggregate outcomes using the two evaluation systems were compared. Outcomes by group of evaluators (residents and students) were analyzed. Trainees were also asked to rate the barriers to the open evaluation process. A statistically significant difference between the open and anonymous evaluations was noted across all items, with faculty receiving lower scores on the anonymous evaluations. The mean score for all the items on the open evaluations was 4.45 +/- 0.65, compared to mean score of 4.07 +/- 0.80 on the anonymous evaluations. There was also a statistically significant difference between open and anonymous evaluations in five clinical teaching domains that were evaluated individually. Residents perceived that the three most common barriers to optimal evaluation were an apprehension of possible encounters with the same attending physician in the future, destruction of working relationships with the attending, and a feeling of frustration with the evaluation system. The evaluation of faculty teaching performance is complex. Most academic medical centers use the open evaluation format. This study supports the case for the use of the anonymous evaluation method as a more accurate reflection of teaching performance.

  16. Anonymous quantum communications using the quantum one-time pad

    International Nuclear Information System (INIS)

    Wang, Qing-Le; Gao, Fei-; Liu, Bin; Song, Ting-Ting; Wen, Qiao-Yan

    2015-01-01

    We present the first quantum secure communication protocol for an anonymous receiver without the assistance of anonymous entanglement. In previous works, if a public sender wants to send quantum messages to a chosen receiver while protecting the identity of the receiver from others, all participants should cooperate first to construct the entanglement between the sender and the anonymous receiver. This is the most important process in anonymous quantum communications. With anonymous entanglement, the sender can communicate quantum messages to the anonymous receiver by applying teleportation protocols. In contrast, our protocol is novel and achieves communication of quantum messages directly from the public sender to the anonymous receiver based on the quantum one-time pad and current achievements. Notably, the anonymity of the receiver, as well as the privacy of the quantum messages, is perfectly protected with the exception of an exponentially small probability in our protocol. (paper)

  17. Anonymous women? Gamblers Anonymous and gender

    OpenAIRE

    Rogers, Jim

    2016-01-01

    One of the rapidly changing elements in gambling environments is the increasing participation of women in many forms of gambling, and the growing proportions of problem gamblers who are female. It is known that women who develop gambling problems differ from men in a range of ways:for example they are more likely to have co-morbidities such as anxiety and depression, and to gamble as an 'escape' from such co-occuring problems. Gamblers Anonymous (GA) has a number of meetings across New Zeala...

  18. Anonymity in P2P Systems

    Science.gov (United States)

    Manzanares-Lopez, Pilar; Muñoz-Gea, Juan Pedro; Malgosa-Sanahuja, Josemaria; Sanchez-Aarnoutse, Juan Carlos

    In the last years, the use of peer-to-peer (P2P) applications to share and exchange knowledge among people around the world has experienced an exponential growth. Therefore, it is understandable that, like in any successful communication mechanism used by a lot of humans being, the anonymity can be a desirable characteristic in this scenario. Anonymity in P2P networks can be obtained by means of different methods, although the most significant ones are broadcast protocols, dining-cryptographer (DC) nets and multiple-hop paths. Each of these methods can be tunable in order to build a real anonymity P2P application. In addition, there is a mathematical tool called entropy that can be used in some scenarios to quantify anonymity in communication networks. In some cases, it can be calculated analytically but in others it is necessary to use simulation to obtain the network entropy.

  19. Thrombospondin-1 plays a profibrotic and pro-inflammatory role during ureteric obstruction.

    Science.gov (United States)

    Bige, Naïke; Shweke, Nasim; Benhassine, Safa; Jouanneau, Chantal; Vandermeersch, Sophie; Dussaule, Jean-Claude; Chatziantoniou, Christos; Ronco, Pierre; Boffa, Jean-Jacques

    2012-06-01

    Thrombospondin-1 (TSP-1) is an endogenous activator of transforming growth factor-β (TGF-β), and an anti-angiogenic factor, which may prevent kidney repair. Here we investigated whether TSP-1 is involved in the development of chronic kidney disease using rats with unilateral ureteral obstruction, a well-known model to study renal fibrosis. Obstruction of 10 days duration induced inflammation, tubular cell atrophy, dilation, apoptosis, and proliferation, leading to interstitial fibrosis. TSP-1 expression was increased in parallel to that of collagen III and TGF-β. Relief of the obstruction at day 10 produced a gradual improvement in renal structure and function, the reappearance of peritubular capillaries, and restoration of renal VEGF content over a 7- to 15-day post-relief period. TSP-1 expression decreased in parallel with that of TGF-β1 and collagen III. Mice in which the TSP-1 gene was knocked out displayed less inflammation and had better preservation of renal tissue and the peritubular capillary network compared to wild-type mice. Additional studies showed that the inflammatory effect of TSP-1 was mediated, at least in part, by monocyte chemoattractant protein-1 and activation of the Th17 pathway. Thus, TSP-1 is an important profibrotic and inflammatory mediator of renal disease. Blockade of its action may be a treatment against the development of chronic kidney disease.

  20. Genetic diversity of three surface protein genes in Plasmodium malariae from three Asian countries.

    Science.gov (United States)

    Srisutham, Suttipat; Saralamba, Naowarat; Sriprawat, Kanlaya; Mayxay, Mayfong; Smithuis, Frank; Nosten, Francois; Pukrittayakamee, Sasithon; Day, Nicholas P J; Dondorp, Arjen M; Imwong, Mallika

    2018-01-11

    Genetic diversity of the three important antigenic proteins, namely thrombospondin-related anonymous protein (TRAP), apical membrane antigen 1 (AMA1), and 6-cysteine protein (P48/45), all of which are found in various developmental stages of Plasmodium parasites is crucial for targeted vaccine development. While studies related to the genetic diversity of these proteins are available for Plasmodium falciparum and Plasmodium vivax, barely enough information exists regarding Plasmodium malariae. The present study aims to demonstrate the genetic variations existing among these three genes in P. malariae by analysing their diversity at nucleotide and protein levels. Three surface protein genes were isolated from 45 samples collected in Thailand (N = 33), Myanmar (N = 8), and Lao PDR (N = 4), using conventional polymerase chain reaction (PCR) assay. Then, the PCR products were sequenced and analysed using BioEdit, MEGA6, and DnaSP programs. The average pairwise nucleotide diversities (π) of P. malariae trap, ama1, and p48/45 were 0.00169, 0.00413, and 0.00029, respectively. The haplotype diversities (Hd) of P. malariae trap, ama1, and p48/45 were 0.919, 0.946, and 0.130, respectively. Most of the nucleotide substitutions were non-synonymous, which indicated that the genetic variations of these genes were maintained by positive diversifying selection, thus, suggesting their role as a potential target of protective immune response. Amino acid substitutions of P. malariae TRAP, AMA1, and P48/45 could be categorized to 17, 20, and 2 unique amino-acid variants, respectively. For further vaccine development, carboxyl terminal of P48/45 would be a good candidate according to conserved amino acid at low genetic diversity (π = 0.2-0.3). High mutational diversity was observed in P. malariae trap and ama1 as compared to p48/45 in P. malariae samples isolated from Thailand, Myanmar, and Lao PDR. Taken together, these results suggest that P48/45 might be a good vaccine

  1. Elevated osteopontin and thrombospondin expression identifies malignant human breast carcinoma but is not indicative of metastatic status

    International Nuclear Information System (INIS)

    Wang-Rodriguez, Jessica; Urquidi, Virginia; Rivard, Amber; Goodison, Steve

    2003-01-01

    Our previous characterization of a human breast tumor metastasis model identified several candidate metastasis genes. The expression of osteopontin (OPN) correlated with the metastatic phenotype, whereas thrombospondin-1 (TSP-1) and tyrosinase-related protein-1 (TYRP-1) correlated with the nonmetastatic phenotype of independent MDA-MB-435 cell lines implanted orthotopically into athymic mice. The aim of the present study was to examine the cellular distribution of these molecules in human breast tissue and to determine whether the relative expression level of these three genes is associated with human breast tumor metastasis. Sixty-eight fresh, frozen specimens including 31 primary infiltrating ductal carcinomas, 22 nodal metastases, 10 fibroadenomas, and five normal breast tissues were evaluated for OPN expression, TSP-1 expression and TYRP-1 expression. Immunohistochemistry was performed to monitor the cellular distribution and to qualitatively assess expression. Quantitative analysis was achieved by enrichment of breast epithelial cells using laser-capture microdissection and subsequent real-time, quantitative PCR. The epithelial components of the breast tissue were the source of OPN and TSP-1 expression, whereas TYRP-1 was present in both the epithelial and stromal components. Both OPN and TSP-1 expression were significantly higher in malignant epithelial sources over normal and benign epithelial sources, but no difference in expression levels was evident between primary tumors with or without metastases, nor between primary and metastatic carcinomas. Elevated expression of OPN and TSP-1 may play a role in the pathogenesis of breast cancer. The multiplex analysis of these molecules may enhance our ability to diagnose and/or prognosticate human breast malignancy

  2. Glucose Stimulation of Transforming Growth Factor-β Bioactivity in Mesangial Cells Is Mediated by Thrombospondin-1

    Science.gov (United States)

    Poczatek, Maria H.; Hugo, Christian; Darley-Usmar, Victor; Murphy-Ullrich, Joanne E.

    2000-01-01

    Glucose is a key factor in the development of diabetic complications, including diabetic nephropathy. The development of diabetic glomerulosclerosis is dependent on the fibrogenic growth factor, transforming growth factor-β (TGF-β). Previously we showed that thrombospondin-1 (TSP-1) activates latent TGF-β both in vitro and in vivo. Activation occurs as the result of specific interactions of latent TGF-β with TSP-1, which potentially alter the conformation of latent TGF-β. As glucose also up-regulates TSP-1 expression, we hypothesized that the increased TGF-β bioactivity observed in rat and human mesangial cells cultured with high glucose concentrations is the result of latent TGF-β activation by autocrine TSP-1. Glucose-induced bioactivity of TGF-β in mesangial cell cultures was reduced to basal levels by peptides from two different sequences that antagonize activation of latent TGF-β by TSP, but not by the plasmin inhibitor, aprotinin. Furthermore, glucose-dependent stimulation of matrix protein synthesis was inhibited by these antagonist peptides. These studies demonstrate that glucose stimulation of TGF-β activity and the resultant matrix protein synthesis are dependent on the action of autocrine TSP-1 to convert latent TGF-β to its biologically active form. These data suggest that antagonists of TSP-dependent TGF-β activation may be the basis of novel therapeutic approaches for ameliorating diabetic renal fibrosis. PMID:11021838

  3. Assessing Anonymous Communication on the Internet: Policy Deliberations.

    Science.gov (United States)

    Kling, Rob; Lee, Yaching; Frankel, Mark S.; Teich, Al

    1999-01-01

    Examines the social character of anonymous online communication and the ways that anonymous communication has played important roles for professionals such as journalists and the police. Explains some of the new technological supports for anonymous communication on the Internet. Discusses some of the nuances behind the controversies and policy…

  4. Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation.

    Science.gov (United States)

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Han, Sangchul; Kim, Moonseong; Paik, Juryon; Won, Dongho

    2015-01-01

    A smart-card-based user authentication scheme for wireless sensor networks (hereafter referred to as a SCA-WSN scheme) is designed to ensure that only users who possess both a smart card and the corresponding password are allowed to gain access to sensor data and their transmissions. Despite many research efforts in recent years, it remains a challenging task to design an efficient SCA-WSN scheme that achieves user anonymity. The majority of published SCA-WSN schemes use only lightweight cryptographic techniques (rather than public-key cryptographic techniques) for the sake of efficiency, and have been demonstrated to suffer from the inability to provide user anonymity. Some schemes employ elliptic curve cryptography for better security but require sensors with strict resource constraints to perform computationally expensive scalar-point multiplications; despite the increased computational requirements, these schemes do not provide user anonymity. In this paper, we present a new SCA-WSN scheme that not only achieves user anonymity but also is efficient in terms of the computation loads for sensors. Our scheme employs elliptic curve cryptography but restricts its use only to anonymous user-to-gateway authentication, thereby allowing sensors to perform only lightweight cryptographic operations. Our scheme also enjoys provable security in a formal model extended from the widely accepted Bellare-Pointcheval-Rogaway (2000) model to capture the user anonymity property and various SCA-WSN specific attacks (e.g., stolen smart card attacks, node capture attacks, privileged insider attacks, and stolen verifier attacks).

  5. Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation.

    Directory of Open Access Journals (Sweden)

    Junghyun Nam

    Full Text Available A smart-card-based user authentication scheme for wireless sensor networks (hereafter referred to as a SCA-WSN scheme is designed to ensure that only users who possess both a smart card and the corresponding password are allowed to gain access to sensor data and their transmissions. Despite many research efforts in recent years, it remains a challenging task to design an efficient SCA-WSN scheme that achieves user anonymity. The majority of published SCA-WSN schemes use only lightweight cryptographic techniques (rather than public-key cryptographic techniques for the sake of efficiency, and have been demonstrated to suffer from the inability to provide user anonymity. Some schemes employ elliptic curve cryptography for better security but require sensors with strict resource constraints to perform computationally expensive scalar-point multiplications; despite the increased computational requirements, these schemes do not provide user anonymity. In this paper, we present a new SCA-WSN scheme that not only achieves user anonymity but also is efficient in terms of the computation loads for sensors. Our scheme employs elliptic curve cryptography but restricts its use only to anonymous user-to-gateway authentication, thereby allowing sensors to perform only lightweight cryptographic operations. Our scheme also enjoys provable security in a formal model extended from the widely accepted Bellare-Pointcheval-Rogaway (2000 model to capture the user anonymity property and various SCA-WSN specific attacks (e.g., stolen smart card attacks, node capture attacks, privileged insider attacks, and stolen verifier attacks.

  6. The molecular mechanism of mediation of adsorbed serum proteins to endothelial cells adhesion and growth on biomaterials.

    Science.gov (United States)

    Yang, Dayun; Lü, Xiaoying; Hong, Ying; Xi, Tingfei; Zhang, Deyuan

    2013-07-01

    To explore molecular mechanism of mediation of adsorbed proteins to cell adhesion and growth on biomaterials, this study examined endothelial cell adhesion, morphology and viability on bare and titanium nitride (TiN) coated nickel titanium (NiTi) alloys and chitosan film firstly, and then identified the type and amount of serum proteins adsorbed on the three surfaces by proteomic technology. Subsequently, the mediation role of the identified proteins to cell adhesion and growth was investigated with bioinformatics analyses, and further confirmed by a series of cellular and molecular biological experiments. Results showed that the type and amount of adsorbed serum proteins associated with cell adhesion and growth was obviously higher on the alloys than on the chitosan film, and these proteins mediated endothelial cell adhesion and growth on the alloys via four ways. First, proteins such as adiponectin in the adsorbed protein layer bound with cell surface receptors to generate signal transduction, which activated cell surface integrins through increasing intracellular calcium level. Another way, thrombospondin 1 in the adsorbed protein layer promoted TGF-β signaling pathway activation and enhanced integrins expression. The third, RGD sequence containing proteins such as fibronectin 1, vitronectin and thrombospondin 1 in the adsorbed protein layer bound with activated integrins to activate focal adhesion pathway, increased focal adhesion formation and actin cytoskeleton organization and mediated cell adhesion and spreading. In addition, the activated focal adhesion pathway promoted the expression of cell growth related genes and resulted in cell proliferation. The fourth route, coagulation factor II (F2) and fibronectin 1 in the adsorbed protein layer bound with cell surface F2 receptor and integrin, activated regulation of actin cytoskeleton pathway and regulated actin cytoskeleton organization. Copyright © 2013 Elsevier Ltd. All rights reserved.

  7. Protecting genomic sequence anonymity with generalization lattices.

    Science.gov (United States)

    Malin, B A

    2005-01-01

    Current genomic privacy technologies assume the identity of genomic sequence data is protected if personal information, such as demographics, are obscured, removed, or encrypted. While demographic features can directly compromise an individual's identity, recent research demonstrates such protections are insufficient because sequence data itself is susceptible to re-identification. To counteract this problem, we introduce an algorithm for anonymizing a collection of person-specific DNA sequences. The technique is termed DNA lattice anonymization (DNALA), and is based upon the formal privacy protection schema of k -anonymity. Under this model, it is impossible to observe or learn features that distinguish one genetic sequence from k-1 other entries in a collection. To maximize information retained in protected sequences, we incorporate a concept generalization lattice to learn the distance between two residues in a single nucleotide region. The lattice provides the most similar generalized concept for two residues (e.g. adenine and guanine are both purines). The method is tested and evaluated with several publicly available human population datasets ranging in size from 30 to 400 sequences. Our findings imply the anonymization schema is feasible for the protection of sequences privacy. The DNALA method is the first computational disclosure control technique for general DNA sequences. Given the computational nature of the method, guarantees of anonymity can be formally proven. There is room for improvement and validation, though this research provides the groundwork from which future researchers can construct genomics anonymization schemas tailored to specific datasharing scenarios.

  8. BIX Certificates: Cryptographic Tokens for Anonymous Transactions Based on Certificates Public Ledger

    Directory of Open Access Journals (Sweden)

    Sead Muftic

    2016-12-01

    Full Text Available With the widespread use of Internet, Web, and mobile technologies, a new category of applications and transactions that requires anonymity is gaining increased interest and importance. Examples of such new applications are innovative payment systems, digital notaries, electronic voting, documents sharing, electronic auctions, medical applications, and many others. In addition to anonymity, these applications and transactions also require standard security services: identification, authentication, and authorization of users and protection of their transactions. Providing those services in combination with anonymity is an especially challenging issue, because all security services require explicit user identification and authentication. To solve this issue and enable applications with security and also anonymity we introduce a new type of cryptographically encapsulated objects called BIX certificates. “BIX” is an abbreviation for “Blockchain Information Exchange.” Their purpose is equivalent to X.509 certificates: to support security services for users and transactions, but also enhanced with anonymity. This paper describes the structure and attributes of BIX certificate objects and all related protocols for their creation, distribution, and use. The BIX Certification Infrastructure (BCI as a distributed public ledger is also briefly described.

  9. Anonymous pastoral care for problems pertaining to sexuality

    NARCIS (Netherlands)

    van Drie, A.; Ganzevoort, R.R.; Spiering, M.

    2014-01-01

    Anonymous pastoral care is one of the options for help in problems pertaining to sexuality. This paper explores the topics they seek help for, the religious aspects involved, and the relation between the normativity of their church tradition on the one hand and sexual and spiritual health criteria

  10. A framework for automatically checking anonymity with μ CRL

    OpenAIRE

    Chothia, T.; Orzan, S.M.; Pang, J.; Torabi Dashti, M.; Montanari, U.; Sannella, D.; Bruni, R.

    2007-01-01

    We present a powerful and flexible method for automatically checking anonymity in a possibilistic general-purpose process algebraic verification toolset. We propose new definitions of a choice anonymity degree and a player anonymity degree, to quantify the precision with which an intruder is able to single out the true originator of a given event or to associate the right event to a given protocol participant. We show how these measures of anonymity can be automatically calculated from a prot...

  11. k-Times Anonymous Authentication

    Science.gov (United States)

    Teranishi, Isamu; Furukawa, Jun; Sako, Kazue

    We propose an authentication scheme in which users can be authenticated anonymously so long as times that they are authenticated is within an allowable number. The proposed scheme has two features: 1) no one, not even an authority, can identify users who have been authenticated within the allowable number, 2) anyone can trace, without help from the authority, dishonest users who have been authenticated beyond the allowable number by using the records of these authentications. Our scheme can be applied to e-voting, e-cash, electronic coupons, and trial browsing of content. In these applications, our scheme, unlike the previous one, conceals users' participation from protocols and guarantees that they will remain anonymous to everyone.

  12. Confidentiality, anonymity and amnesty for midwives in distress seeking online support - Ethical?

    Science.gov (United States)

    Pezaro, Sally; Clyne, Wendy; Gerada, Clare

    2018-06-01

    Midwife health is intrinsically linked to the quality of safe patient care. To ensure safe patient care, there is a need to deliver emotional support to midwives. One option that midwives may turn to may be a confidential online intervention, instead of localised, face-to-face support. Following the Realist And MEta-narrative Evidence Syntheses: Evolving Standards publication standards, this realist synthesis approach explores the ethical considerations in permitting confidentiality, anonymity and amnesty in online interventions to support midwives in work-related psychological distress. An iterative search methodology was used to select nine papers for review. To assimilate information, papers were examined for ideas relating to ethical dimensions of online interventions to support midwives in work-related psychological distress. This review takes a narrative approach. Online interventions can support the development of insight, help seeking and open discussion. Additionally, Internet support groups can become morally persuasive in nature. Anonymity and confidentiality are both effective and therapeutic features of online interventions when used in collaboration with effective online moderation. Yet, ethical dilemmas remain where users cannot be identified. Confidentiality and anonymity remain key components of successful online interventions. However, sanctioning the corollary component of amnesty may provoke moral discomfort for those seeking immediate accountability. For others, amnesty is seen as essential for open disclosure and help seeking. Ultimately, the needs of midwives must be balanced with the requirement to protect the public and the professional reputation of midwifery. In supporting midwives online, the principles of anonymity, confidentiality and amnesty may evoke some resistance on ethical grounds. However, without offering identity protection, it may not be possible to create effective online support services for midwives. The authors of this

  13. (In)visible Ghosts in the Machine and the Powers that Bind: The Relational Securitization of Anonymous

    DEFF Research Database (Denmark)

    Dunn Cavelty, Myriam; Jaeger, Mark Daniel

    2015-01-01

    prerogative to secrecy, and challenging its claim to unrestrained surveillance. At the same time, the state's bases are implicated and reproduced in the way this conflict is constructed. The conflict not only (re)produces and makes visible “the state” as a social entity, but also changes or at least...... designations give rise to the visibility of political entities and agency in the first place. Applying this framework, we can better understand the movement's path from a bunch of anonymous individuals to the collectivity “Anonymous,” posing a threat to certain bases of the state's ontological existence, its...

  14. Proxies for Anonymous Routing

    National Research Council Canada - National Science Library

    Reed, Michael G; Syverson, Paul F; Goldschlag, David M

    1996-01-01

    ...), and file transfers (FTP) have been implemented. Onion routing provides application independent, real-time, and bi-directional anonymous connections that are resistant to both eavesdropping and traffic analysis...

  15. Is it OK to be an Anonymous?

    NARCIS (Netherlands)

    Serracino Inglott, P.

    2013-01-01

    Do the deviant acts carried out by the collective known as Anonymous qualify as vigilante activity, and if so, can they be justified? Addressing this question helps expose the difficulties of morally evaluating technologically enabled deviance. Anonymous is a complex, fluid actor but not as

  16. A role for thrombospondin-1 deficits in astrocyte-mediated spine and synaptic pathology in Down's syndrome.

    Directory of Open Access Journals (Sweden)

    Octavio Garcia

    2010-12-01

    Full Text Available Down's syndrome (DS is the most common genetic cause of mental retardation. Reduced number and aberrant architecture of dendritic spines are common features of DS neuropathology. However, the mechanisms involved in DS spine alterations are not known. In addition to a relevant role in synapse formation and maintenance, astrocytes can regulate spine dynamics by releasing soluble factors or by physical contact with neurons. We have previously shown impaired mitochondrial function in DS astrocytes leading to metabolic alterations in protein processing and secretion. In this study, we investigated whether deficits in astrocyte function contribute to DS spine pathology.Using a human astrocyte/rat hippocampal neuron coculture, we found that DS astrocytes are directly involved in the development of spine malformations and reduced synaptic density. We also show that thrombospondin 1 (TSP-1, an astrocyte-secreted protein, possesses a potent modulatory effect on spine number and morphology, and that both DS brains and DS astrocytes exhibit marked deficits in TSP-1 protein expression. Depletion of TSP-1 from normal astrocytes resulted in dramatic changes in spine morphology, while restoration of TSP-1 levels prevented DS astrocyte-mediated spine and synaptic alterations. Astrocyte cultures derived from TSP-1 KO mice exhibited similar deficits to support spine formation and structure than DS astrocytes.These results indicate that human astrocytes promote spine and synapse formation, identify astrocyte dysfunction as a significant factor of spine and synaptic pathology in the DS brain, and provide a mechanistic rationale for the exploration of TSP-1-based therapies to treat spine and synaptic pathology in DS and other neurological conditions.

  17. The Effects of Perceived Anonymity on Altruistic Punishment

    Directory of Open Access Journals (Sweden)

    Jared Piazza

    2008-07-01

    Full Text Available Previous studies investigating altruistic punishment have confounded the effects of two independent variables: information transmission (or breach of privacy and personal identification (or breach of anonymity. Here we report findings from a brief study in which participants were asked to respond to a social norm violation (i.e., an anonymous actor had behaved selfishly in an economic game by deciding whether to sacrifice their own endowment to punish this person. A third of the participants were told that their economic decisions would be made known to another player but could not be identified (privacy breach condition, whereas another third were informed that their decision as well as their names would be made known (anonymity breach condition. (The decisions of control participants were completely anonymous and private. Participants also justified their economic decisions and reported their emotional experiences. The results were participants punished most in the privacy and anonymity breach conditions and least in the control condition. These findings have implications for existing evolutionary accounts of altruistic punishment.

  18. A Mechanism for Anonymous Credit Card Systems

    Science.gov (United States)

    Tamura, Shinsuke; Yanase, Tatsuro

    This paper proposes a mechanism for anonymous credit card systems, in which each credit card holder can conceal individual transactions from the credit card company, while enabling the credit card company to calculate the total expenditures of transactions of individual card holders during specified periods, and to identify card holders who executed dishonest transactions. Based on three existing mechanisms, i.e. anonymous authentication, blind signature and secure statistical data gathering, together with implicit transaction links proposed here, the proposed mechanism enables development of anonymous credit card systems without assuming any absolutely trustworthy entity like tamper resistant devices or organizations faithful both to the credit card company and card holders.

  19. An Applet-based Anonymous Distributed Computing System.

    Science.gov (United States)

    Finkel, David; Wills, Craig E.; Ciaraldi, Michael J.; Amorin, Kevin; Covati, Adam; Lee, Michael

    2001-01-01

    Defines anonymous distributed computing systems and focuses on the specifics of a Java, applet-based approach for large-scale, anonymous, distributed computing on the Internet. Explains the possibility of a large number of computers participating in a single computation and describes a test of the functionality of the system. (Author/LRW)

  20. Basic components of connective tissues and extracellular matrix: elastin, fibrillin, fibulins, fibrinogen, fibronectin, laminin, tenascins and thrombospondins.

    Science.gov (United States)

    Halper, Jaroslava; Kjaer, Michael

    2014-01-01

    -elastic extracellular matrixes, and interact closely with tropoelastin and integrins. Not only do microfibrils provide structural integrity of specific organ systems, but they also provide a scaffold for elastogenesis in elastic tissues. Fibrillin is important for the assembly of elastin into elastic fibers. Mutations in the fibrillin-1 gene are closely associated with Marfan syndrome. Fibulins are tightly connected with basement membranes, elastic fibers and other components of extracellular matrix and participate in formation of elastic fibers. Tenascins are ECM polymorphic glycoproteins found in many connective tissues in the body. Their expression is regulated by mechanical stress both during development and in adulthood. Tenascins mediate both inflammatory and fibrotic processes to enable effective tissue repair and play roles in pathogenesis of Ehlers-Danlos, heart disease, and regeneration and recovery of musculo-tendinous tissue. One of the roles of thrombospondin 1 is activation of TGFβ. Increased expression of thrombospondin and TGFβ activity was observed in fibrotic skin disorders such as keloids and scleroderma. Cartilage oligomeric matrix protein (COMP) or thrombospondin-5 is primarily present in the cartilage. High levels of COMP are present in fibrotic scars and systemic sclerosis of the skin, and in tendon, especially with physical activity, loading and post-injury. It plays a role in vascular wall remodeling and has been found in atherosclerotic plaques as well.

  1. Anonymous Authentication for Smartcards

    Directory of Open Access Journals (Sweden)

    J. Hajny

    2010-06-01

    Full Text Available The paper presents an innovative solution in the field of RFID (Radio-Frequency IDentification smartcard authentication. Currently the smartcards are used for many purposes - e.g. employee identification, library cards, student cards or even identity credentials. Personal identity is revealed to untrustworthy entities every time we use these cards. Such information could later be used without our knowledge and for harmful reasons like shopping pattern scanning or even movement tracking. We present a communication scheme for keeping one’s identity private in this paper. Although our system provides anonymity, it does not allow users to abuse this feature. The system is based on strong cryptographic primitives that provide features never available before. Besides theoretical design of the anonymous authentication scheme and its analysis we also provide implementation results.

  2. Thrombospondin-1 in a Murine Model of Colorectal Carcinogenesis.

    Directory of Open Access Journals (Sweden)

    Zenaida P Lopez-Dee

    Full Text Available Colorectal Cancer (CRC is one of the late complications observed in patients suffering from inflammatory bowel diseases (IBD. Carcinogenesis is promoted by persistent chronic inflammation occurring in IBD. Understanding the mechanisms involved is essential in order to ameliorate inflammation and prevent CRC. Thrombospondin 1 (TSP-1 is a multidomain glycoprotein with important roles in angiogenesis. The effects of TSP-1 in colonic tumor formation and growth were analyzed in a model of inflammation-induced carcinogenesis. WT and TSP-1 deficient mice (TSP-1-/- of the C57BL/6 strain received a single injection of azoxymethane (AOM and multiple cycles of dextran sodium sulfate (DSS to induce chronic inflammation-related cancers. Proliferation and angiogenesis were histologically analyzed in tumors. The intestinal transcriptome was also analyzed using a gene microarray approach. When the area containing tumors was compared with the entire colonic area of each mouse, the tumor burden was decreased in AOM/DSS-treated TSP-1-/- versus wild type (WT mice. However, these lesions displayed more angiogenesis and proliferation rates when compared with the WT tumors. AOM-DSS treatment of TSP-1-/- mice resulted in significant deregulation of genes involved in transcription, canonical Wnt signaling, transport, defense response, regulation of epithelial cell proliferation and metabolism. Microarray analyses of these tumors showed down-regulation of 18 microRNAs in TSP-1-/- tumors. These results contribute new insights on the controversial role of TSP-1 in cancer and offer a better understanding of the genetics and pathogenesis of CRC.

  3. Security Analysis of Accountable Anonymous Group Communication in Dissent

    Science.gov (United States)

    2013-01-31

    instance, group discussion forums or instant messaging. Misbehaving users may abuse this anonymity to disrupt communication, however, and existing...Abstract Users often wish to communicate anonymously on the Internet using, for instance, group discussion forums or instant messaging. Misbehaving users may...personal reprisal (Stein 2003). Yet anonymity makes it difficult to trace or exclude misbehaving participants (Davenport 2002). Online proto- cols

  4. Thrombospondin-1 production is enhanced by Porphyromonas gingivalis lipopolysaccharide in THP-1 cells.

    Directory of Open Access Journals (Sweden)

    Misa Gokyu

    Full Text Available Periodontitis is a chronic inflammatory disease caused by gram-negative anaerobic bacteria. Monocytes and macrophages stimulated by periodontopathic bacteria induce inflammatory mediators that cause tooth-supporting structure destruction and alveolar bone resorption. In this study, using a DNA microarray, we identified the enhanced gene expression of thrombospondin-1 (TSP-1 in human monocytic cells stimulated by Porphyromonas gingivalis lipopolysaccharide (LPS. TSP-1 is a multifunctional extracellular matrix protein that is upregulated during the inflammatory process. Recent studies have suggested that TSP-1 is associated with rheumatoid arthritis, diabetes mellitus, and osteoclastogenesis. TSP-1 is secreted from neutrophils, monocytes, and macrophages, which mediate immune responses at inflammatory regions. However, TSP-1 expression in periodontitis and the mechanisms underlying TSP-1 expression in human monocytic cells remain unknown. Here using real-time RT-PCR, we demonstrated that TSP-1 mRNA expression level was significantly upregulated in inflamed periodontitis gingival tissues and in P. gingivalis LPS-stimulated human monocytic cell line THP-1 cells. TSP-1 was expressed via Toll-like receptor (TLR 2 and TLR4 pathways. In P. gingivalis LPS stimulation, TSP-1 expression was dependent upon TLR2 through the activation of NF-κB signaling. Furthermore, IL-17F synergistically enhanced P. gingivalis LPS-induced TSP-1 production. These results suggest that modulation of TSP-1 expression by P. gingivalis plays an important role in the progression and chronicity of periodontitis. It may also contribute a new target molecule for periodontal therapy.

  5. Overexpression of thrombospondin-1 reduces growth and vascular index but not perfusion in glioblastoma

    DEFF Research Database (Denmark)

    Kragh, Michael; Quistorff, Bjørn; Tenan, Mirna

    2002-01-01

    Little is known about the effects of antiangiogenic therapy on perfusion of human tumors and the mechanisms by which tumors can adapt to these treatments and recur. Here, we examined the effects of serial passaging of LN-229 human glioma xenografts overexpressing thrombospondin (TSP)-1 on tumor...... vascularity was estimated by noninvasive near infrared spectroscopy measuring blood volume at 800 +/- 10 nm and by histological vessel scores in CD31-immunostained cryosections. The tumor perfusion was assessed by noninvasive laser Doppler flowmetry. Overexpression of TSP-1 significantly inhibited tumor....... Elucidation of the mechanisms that allow this to happen has important consequences for the understanding of tumor recurrence after antiangiogenic therapy....

  6. Expression Pattern of Human ADAMTS-2 (A disintegrin and metalloproteinase with thrombospondin motif, 2) in Different Cell Lines

    OpenAIRE

    ALPER, Meltem; KÖÇKAR, Feray

    2013-01-01

    The ADAMTSs (a disintegrin and metalloproteinase with thrombospondin motifs) are a family of metalloproteases that are found in mammals and invertebrates. This family is known to influence development, angiogenesis, coagulation and progression of arthritis. ADAMTS2 plays an essential role in the processing of the fibrillar collagen precursors into mature collagen molecules by cleaving of the amino terminus of the type I, II, III and V procollagen molecules. Collagens are the most abundant and...

  7. Thrombospondin-1 type 1 repeats in a model of inflammatory bowel disease: transcript profile and therapeutic effects.

    Directory of Open Access Journals (Sweden)

    Zenaida P Lopez-Dee

    Full Text Available Thrombospondin-1 (TSP-1 is a matricellular protein with regulatory functions in inflammation and cancer. The type 1 repeats (TSR domains of TSP-1 have been shown to interact with a wide range of proteins that result in the anti-angiogenic and anti-tumor properties of TSP-1. To ascertain possible functions and evaluate potential therapeutic effects of TSRs in inflammatory bowel disease, we conducted clinical, histological and microarray analyses on a mouse model of induced colitis. We used dextran sulfate sodium (DSS to induce colitis in wild-type (WT mice for 7 days. Simultaneously, mice were injected with either saline or one form of TSP-1 derived recombinant proteins, containing either (1 the three type 1 repeats of the TSP-1 (3TSR, (2 the second type 1 repeat (TSR2, or (3 TSR2 with the RFK sequence (TSR2+RFK. Total RNA isolated from the mice colons were processed and hybridized to mouse arrays. Array data were validated by real-time qPCR and immunohistochemistry. Histological and disease indices reveal that the mice treated with the TSRs show different patterns of leukocytic infiltration and that 3TSR treatment was the most effective in decreasing inflammation in DSS-induced colitis. Transcriptional profiling revealed differentially expressed (DE genes, with the 3TSR-treated mice showing the least deviation from the WT-water controls. In conclusion, this study shows that 3TSR treatment is effective in attenuating the inflammatory response to DSS injury. In addition, the transcriptomics work unveils novel genetic data that suggest beneficial application of the TSR domains in inflammatory bowel disease.

  8. System for Anonymous Data Collection Based on Group Signature Scheme

    Directory of Open Access Journals (Sweden)

    David Troják

    2016-01-01

    Full Text Available This paper deals with an anonymous data collection in the Internet of Things (IoT. the privacy and anonymity of the data source is important for many IoT applications, such as in agriculture, health, and automotive. the proposed data‑collection system provides anonymity for the data sources by applying a cooperation group scheme. the group scheme also provides a low power consumption. the system is built upon the Tor (The Onion Router anonymous network, which is a part of the Internet darknet. the proposed system was designed for the Android devices on the client side and for Java environment on the server side. We evaluated the anonymous data collection in a real‑use scenario that covers selected data acquisition (e.g. signal strength from smartphones triggered by their geographical location change. the results show that the proposed system provides the sufficient data source anonymity, an effective revocation, a low computational cost and a low overhead.

  9. Anonymous Authorship Control for User-Generated Content

    Directory of Open Access Journals (Sweden)

    Suk-Bong LEE

    2007-12-01

    Full Text Available User-Generated Content (UGC is opening up new large market in content services, and more and more people are visiting web sites to share and enjoy UGCs. These trends make many authors to move into online. Authors want to conserve their authorship and expect to publish their UGC anonymously in cases. To meet the requirements, we propose a new authorship control model based on watermarking and metadata. Authors can embed their authorship into their UGC with identities or with anonym. Even though an author publishes his UGC anonymously, he can prove his authorship without unveiling his identity via 5 methods utilizing the proposed authorship model. The proposed model and methods need no TTP and are robust even based on fragile underlying watermarking scheme.

  10. Thrombospondins 1 and 2 are important for afferent synapse formation and function in the inner ear.

    Science.gov (United States)

    Mendus, Diana; Sundaresan, Srividya; Grillet, Nicolas; Wangsawihardja, Felix; Leu, Rose; Müller, Ulrich; Jones, Sherri M; Mustapha, Mirna

    2014-04-01

    Thrombospondins (TSPs) constitute a family of secreted extracellular matrix proteins that have been shown to be involved in the formation of synapses in the central nervous system. In this study, we show that TSP1 and TSP2 are expressed in the cochlea, and offer the first description of their putative roles in afferent synapse development and function in the inner ear. We examined mice with deletions of TSP1, TSP2 and both (TSP1/TSP2) for inner ear development and function. Immunostaining for synaptic markers indicated a significant decrease in the number of formed afferent synapses in the cochleae of TSP2 and TSP1/TSP2 knockout (KO) mice at postnatal day (P)29. In functional studies, TSP2 and TSP1/TSP2 KO mice showed elevated auditory brainstem response (ABR) thresholds as compared with wild-type littermates, starting at P15, with the most severe phenotype being seen for TSP1/TSP2 KO mice. TSP1/TSP2 KO mice also showed reduced wave I amplitudes of ABRs and vestibular evoked potentials, suggesting synaptic dysfunction in both the auditory and vestibular systems. Whereas ABR thresholds in TSP1 KO mice were relatively unaffected at early ages, TSP1/TSP2 KO mice showed the most severe phenotype among all of the genotypes tested, suggesting functional redundancy between the two genes. On the basis of the above results, we propose that TSPs play an important role in afferent synapse development and function of the inner ear. © 2014 Federation of European Neuroscience Societies and John Wiley & Sons Ltd.

  11. Thrombospondin 2-null mice display an altered brain foreign body response to polyvinyl alcohol sponge implants

    International Nuclear Information System (INIS)

    Tian Weiming; Kyriakides, Themis R

    2009-01-01

    Thrombospondin (TSP)-2 is a matricellular protein that participates in the processes of tissue repair and the foreign body response. In addition, TSP2 has been shown to influence synaptogenesis and recovery of the brain following stroke. In the present study we investigated the response following the implantation of polyvinyl alcohol (PVA) sponges in the brain. PVA sponges were implanted into the brain cortex of wild type and TSP2-null mice for a period of 4 and 8 weeks and the response was analyzed by histochemistry and quantitative immunohistochemistry. TSP2 expression was detected in the interstices of the sponge and co-localized with the extracellular matrix and astrocytes. PVA sponge invasion in TSP2-null mice was characterized by dense deposition of extracellular matrix and increased invasion of reactive astrocytes and macrophages/microglia. Furthermore, the angiogenic response was elevated and the detection of mouse serum albumin (MSA) in the brain cortex indicated excessive vessel leakage, suggesting that TSP2 plays a role in the repair/maintenance of the blood brain barrier. Finally, immunostaining demonstrated an increase in the levels of matrix metalloproteinase (MMP)-2 and MMP-9. Taken together, our observations support a role for TSP2 as critical determinant of the brain response to biomaterials.

  12. Vote to link: Recovering from misbehaving anonymous users

    NARCIS (Netherlands)

    Lueks, W.; Everts, M.H.; Hoepman, J.H.

    2016-01-01

    Service providers are often reluctant to support anonymous access, because this makes it hard to deal with misbehaving users. Anonymous blacklisting and reputation systems can help prevent misbehaving users from causing more damage. However, by the time the user is blocked or has lost reputation,

  13. Cyclosporin A Impairs the Secretion and Activity of ADAMTS13 (A Disintegrin and Metalloprotease with Thrombospondin Type 1 Repeat)*

    Science.gov (United States)

    Hershko, Klilah; Simhadri, Vijaya L.; Blaisdell, Adam; Hunt, Ryan C.; Newell, Jordan; Tseng, Sandra C.; Hershko, Alon Y.; Choi, Jae Won; Sauna, Zuben E.; Wu, Andrew; Bram, Richard J.; Komar, Anton A.; Kimchi-Sarfaty, Chava

    2012-01-01

    The protease ADAMTS13 (a disintegrin and metalloprotease with thrombospondin type 1 repeat) cleaves multimers of von Willebrand factor, thus regulating platelet aggregation. ADAMTS13 deficiency leads to the fatal disorder thrombotic thrombocytopenic purpura (TTP). It has been observed that cyclosporin A (CsA) treatment, particularly in transplant patients, may sometimes be linked to the development of TTP. Until now, the reason for such a link was unclear. Here we provide evidence demonstrating that cyclophilin B (CypB) activity plays an important role in the secretion of active ADAMTS13. We found that CsA, an inhibitor of CypB, reduces the secretion of ADAMTS13 and leads to conformational changes in the protein resulting in diminished ADAMTS13 proteolytic activity. A direct, functional interaction between CypB (which possesses peptidyl-prolyl cis-trans isomerase (PPIase) and chaperone functions) and ADAMTS13 is demonstrated using immunoprecipitation and siRNA knockdown of CypB. Finally, CypB knock-out mice were found to have reduced ADAMTS13 levels. Taken together, our findings indicate that cyclophilin-mediated activity is an important factor affecting secretion and activity of ADAMTS13. The large number of proline residues in ADAMTS13 is consistent with the important role of cis-trans isomerization in the proper folding of this protein. These results altogether provide a novel mechanistic explanation for CsA-induced TTP in transplant patients. PMID:23144461

  14. Cyclosporin A impairs the secretion and activity of ADAMTS13 (a disintegrin and metalloprotease with thrombospondin type 1 repeat).

    Science.gov (United States)

    Hershko, Klilah; Simhadri, Vijaya L; Blaisdell, Adam; Hunt, Ryan C; Newell, Jordan; Tseng, Sandra C; Hershko, Alon Y; Choi, Jae Won; Sauna, Zuben E; Wu, Andrew; Bram, Richard J; Komar, Anton A; Kimchi-Sarfaty, Chava

    2012-12-28

    The protease ADAMTS13 (a disintegrin and metalloprotease with thrombospondin type 1 repeat) cleaves multimers of von Willebrand factor, thus regulating platelet aggregation. ADAMTS13 deficiency leads to the fatal disorder thrombotic thrombocytopenic purpura (TTP). It has been observed that cyclosporin A (CsA) treatment, particularly in transplant patients, may sometimes be linked to the development of TTP. Until now, the reason for such a link was unclear. Here we provide evidence demonstrating that cyclophilin B (CypB) activity plays an important role in the secretion of active ADAMTS13. We found that CsA, an inhibitor of CypB, reduces the secretion of ADAMTS13 and leads to conformational changes in the protein resulting in diminished ADAMTS13 proteolytic activity. A direct, functional interaction between CypB (which possesses peptidyl-prolyl cis-trans isomerase (PPIase) and chaperone functions) and ADAMTS13 is demonstrated using immunoprecipitation and siRNA knockdown of CypB. Finally, CypB knock-out mice were found to have reduced ADAMTS13 levels. Taken together, our findings indicate that cyclophilin-mediated activity is an important factor affecting secretion and activity of ADAMTS13. The large number of proline residues in ADAMTS13 is consistent with the important role of cis-trans isomerization in the proper folding of this protein. These results altogether provide a novel mechanistic explanation for CsA-induced TTP in transplant patients.

  15. Anonymous Agencies, Backstreet Businesses and Covert Collectives

    DEFF Research Database (Denmark)

    Krause Hansen, Hans; Schoeneborn, Dennis

    2015-01-01

    Book review of: Anonymous Agencies, Backstreet Businesses and Covert Collectives: rethinking Organizations in the 21st Century, C. R. Scott. Stanford, CA: Stanford University Press, 2013. 272 pp. £45.90. ISBN 9780804781381......Book review of: Anonymous Agencies, Backstreet Businesses and Covert Collectives: rethinking Organizations in the 21st Century, C. R. Scott. Stanford, CA: Stanford University Press, 2013. 272 pp. £45.90. ISBN 9780804781381...

  16. Calcium Supplement Derived from Gallus gallus domesticus Promotes BMP-2/RUNX2/SMAD5 and Suppresses TRAP/RANK Expression through MAPK Signaling Activation

    Directory of Open Access Journals (Sweden)

    Han Seok Yoo

    2017-05-01

    Full Text Available The present study evaluated the effects of a calcium (Ca supplement derived from Gallus gallus domesticus (GD on breaking force, microarchitecture, osteogenic differentiation and osteoclast differentiation factor expression in vivo in Ca-deficient ovariectomized (OVX rats. One percent of Ca supplement significantly improved Ca content and bone strength of the tibia. In micro-computed tomography analysis, 1% Ca supplement attenuated OVX- and low Ca-associated changes in bone mineral density, trabecular thickness, spacing and number. Moreover, 1% Ca-supplemented diet increased the expression of osteoblast differentiation marker genes, such as bone morphogenetic protein-2, Wnt3a, small mothers against decapentaplegic 1/5/8, runt-related transcription factor 2, osteocalcin and collagenase-1, while it decreased the expression of osteoclast differentiation genes, such as thrombospondin-related anonymous protein, cathepsin K and receptor activator of nuclear factor kappa B. Furthermore, 1% Ca-supplemented diet increased the levels of phosphorylated extracellular signal-regulated kinase and c-Jun N-terminal kinase. The increased expression of osteoblast differentiation marker genes and activation of mitogen-activated protein kinase signaling were associated with significant increases in trabecular bone volume, which plays an important role in the overall skeletal strength. Our results demonstrated that 1% Ca supplement inhibited osteoclastogenesis, stimulated osteoblastogenesis and restored bone loss in OVX rats.

  17. Thrombospondin-1 and VEGF in inflammatory bowel disease

    Directory of Open Access Journals (Sweden)

    Canan Alkim

    2012-01-01

    Full Text Available Angiogenesis is an important process in the pathogenesis of chronic inflammation. We aimed to study the angiogeneic balance in inflammatory bowel disease (IBD by evaluating the expression of vascular endothelial growth factor (VEGF and thrombospondin-1 (TSP-1 on colonic epithelial cells, together with the expression of inducible nitric oxide synthase (iNOS.Twenty-one ulcerative colitis (UC, 14 Crohn's disease (CD, 11 colorectal cancer patients, and 11 healthy controls colonic biopsy samples were evaluated immunohistochemically.The expressions of TSP-1, VEGF, and iNOS in UC and CD groups were higher than expression in healthy control group, all with statistical significance. However, in colorectal cancer group, VEGF and iNOS expressions were increased importantly, but TSP-1 expression was not statistically different from healthy control group's expression. Both TSP-1 and VEGF expressions were correlated with iNOS expression distinctly but did not correlate with each other.Both pro-angiogeneic VEGF and antiangiogeneic TSP-1 expressions were found increased in our IBD groups, but in colorectal cancer group, only VEGF expression was increased. TSP-1 increases in IBD patients as a response to inflammatory condition, but this increase was not enough to suppress pathologic angiogenesis and inflammation in IBD.

  18. Property-Based Anonymous Attestation in Trusted Cloud Computing

    Directory of Open Access Journals (Sweden)

    Zhen-Hu Ning

    2014-01-01

    Full Text Available In the remote attestation on Trusted Computer (TC computing mode TCCP, the trusted computer TC has an excessive burden, and anonymity and platform configuration information security of computing nodes cannot be guaranteed. To overcome these defects, based on the research on and analysis of current schemes, we propose an anonymous proof protocol based on property certificate. The platform configuration information is converted by the matrix algorithm into the property certificate, and the remote attestation is implemented by trusted ring signature scheme based on Strong RSA Assumption. By the trusted ring signature scheme based on property certificate, we achieve the anonymity of computing nodes and prevent the leakage of platform configuration information. By simulation, we obtain the computational efficiency of the scheme. We also expand the protocol and obtain the anonymous attestation based on ECC. By scenario comparison, we obtain the trusted ring signature scheme based on RSA, which has advantages with the growth of the ring numbers.

  19. A hidden service model based on HS-HS anonymous network

    Science.gov (United States)

    Meng, Yitong; Zhao, Xing; Fei, Jinlong; Zhu, Yuefei

    2017-10-01

    The Hidden Service provided by Tor anonymous network can effectively protect the anonymity and security of the Hidden server, this article through the analysis of the data packet structure of Tor, three jump transmission mechanism and link establishment protocol and Hidden Service communication process, in view of the Hidden node number too much, link building Service for too long and too redundant link problem. An improved hidden service model HS-HS is proposed that incorporating multiple transmission link and reuse, and at the same time will be important transit point for reuse protection link anonymity, through the ExperimenTor simulation environment test, verify the improved model of HS-HS can be more effective in guarantee anonymity and security, improve the overall efficiency of data transmission, to meet the needs of today's anonymous service.

  20. Really not god: Secularization and pragmatism in Gamblers Anonymous.

    Science.gov (United States)

    Browne, B R

    1994-09-01

    The paper argues that despite maintaining the image of a twelve-step organization, the central theme of the history of Gamblers Anonymous (GA) in the United States is the increasing secularization of the program of the recovery. The paper documents the increasing secularization and pragmatism of Gamblers Anonymous, as reflected in key documents, despite the spiritual vision of its founding member. The author speculates on why Gamblers Anonymous took a secularized development path. Further research is called for.

  1. Anonymity in Peer-assisted CDNs: Inference Attacks and Mitigation

    Directory of Open Access Journals (Sweden)

    Jia Yaoqi

    2016-10-01

    Full Text Available The peer-assisted CDN is a new content distribution paradigm supported by CDNs (e.g., Akamai, which enables clients to cache and distribute web content on behalf of a website. Peer-assisted CDNs bring significant bandwidth savings to website operators and reduce network latency for users. In this work, we show that the current designs of peer-assisted CDNs expose clients to privacy-invasive attacks, enabling one client to infer the set of browsed resources of another client. To alleviate this, we propose an anonymous peer-assisted CDN (APAC, which employs content delivery while providing initiator anonymity (i.e., hiding who sends the resource request and responder anonymity (i.e., hiding who responds to the request for peers. APAC can be a web service, compatible with current browsers and requiring no client-side changes. Our anonymity analysis shows that our APAC design can preserve a higher level of anonymity than state-of-the-art peer-assisted CDNs. In addition, our evaluation demonstrates that APAC can achieve desired performance gains.

  2. Anonymity and Openness in Donor Conception: the New Danish Model

    DEFF Research Database (Denmark)

    Herrmann, Janne Rothmar

    2013-01-01

    model in donor conception which offers women/couples a choice of anonymity or openness in donation.This paper is based on my talk on June 20, 2013 at London School of Economics at the conference “New Families and Genetic Identities: Developments in law, policy and research” organised by the Morgan...... bank is based in Denmark and consequently anonymous sperm is also exported abroad, even into jurisdictions where anonymity is banned illegal. This commentary traces the raison d’être of anonymity in Danish law, accounts for the legal framework for the internet sale of sperm and examines the new Danish...

  3. Anonymous birth law saves babies--optimization, sustainability and public awareness.

    Science.gov (United States)

    Grylli, Chryssa; Brockington, Ian; Fiala, Christian; Huscsava, Mercedes; Waldhoer, Thomas; Klier, Claudia M

    2016-04-01

    The aims of this study are to assess the impact of Austria's anonymous birth law from the time relevant statistical records are available and to evaluate the use of hatches versus anonymous hospital delivery. This study is a complete census of police-reported neonaticides (1975-2012) as well as anonymous births including baby hatches in Austria during 2002-2012. The time trends of neonaticide rates, anonymous births and baby hatches were analysed by means of Poisson and logistic regression model. Predicted and observed rates were derived and compared using a Bayesian Poisson regression model. Predicted numbers of neonaticides for the period of the active awareness campaign, 2002-2004, were more than three times larger than the observed number (p = 0.0067). Of the 365 women who benefitted from this legislation, only 11.5% chose to put their babies in a baby hatch. Since the law was introduced, a significant decreasing tendency of numbers of anonymous births (p = 047) was observed, while there was significant increase of neonaticide rates (p = 0.0001). The implementation of the anonymous delivery law is associated with a decrease in the number of police-reported neonaticides. The subsequent significantly decreasing numbers of anonymous births with an accompanying increase of neonaticides represents additional evidence for the effectiveness of the measure.

  4. De-anonymizing Genomic Databases Using Phenotypic Traits

    Directory of Open Access Journals (Sweden)

    Humbert Mathias

    2015-06-01

    Full Text Available People increasingly have their genomes sequenced and some of them share their genomic data online. They do so for various purposes, including to find relatives and to help advance genomic research. An individual’s genome carries very sensitive, private information such as its owner’s susceptibility to diseases, which could be used for discrimination. Therefore, genomic databases are often anonymized. However, an individual’s genotype is also linked to visible phenotypic traits, such as eye or hair color, which can be used to re-identify users in anonymized public genomic databases, thus raising severe privacy issues. For instance, an adversary can identify a target’s genome using known her phenotypic traits and subsequently infer her susceptibility to Alzheimer’s disease. In this paper, we quantify, based on various phenotypic traits, the extent of this threat in several scenarios by implementing de-anonymization attacks on a genomic database of OpenSNP users sequenced by 23andMe. Our experimental results show that the proportion of correct matches reaches 23% with a supervised approach in a database of 50 participants. Our approach outperforms the baseline by a factor of four, in terms of the proportion of correct matches, in most scenarios. We also evaluate the adversary’s ability to predict individuals’ predisposition to Alzheimer’s disease, and we observe that the inference error can be halved compared to the baseline. We also analyze the effect of the number of known phenotypic traits on the success rate of the attack. As progress is made in genomic research, especially for genotype-phenotype associations, the threat presented in this paper will become more serious.

  5. Dysregulation of CD47 and the ligands thrombospondin 1 and 2 in multiple myeloma

    DEFF Research Database (Denmark)

    Rendtlew Danielsen, Jannie M; Knudsen, Lene Meldgaard; Dahl, Inger Marie

    2007-01-01

    % of patients with monoclonal gammopathy of undetermined significance (MGUS) expressed CD47; median expression level increased 10-fold with progression from MGUS to MM. Elevated TSP1/TSP2 levels occurred in bone marrow cultures from MM patients compared with healthy donors. CD47 and TSP1/TSP2 may have......CD47 and thrombospondin 1 and 2 (TSP1 and TSP2) expression were analysed by real-time reverse transcription polymerase chain reaction in fluorescence-activated cell sorted plasma cells (PCs) from patients at consecutive stages of multiple myeloma (MM) development. 80% of MM patients, but only 39...... a potential role in the pathophysiology of MM, probably in the interaction between MM PCs and the microenvironment....

  6. Mapping lymphatic nodes: Role of thrombospondin

    International Nuclear Information System (INIS)

    Spana, G.S.; Liu, J.; Rao, P.S.; Thakur, M.L.

    2002-01-01

    Aim: Lymphatic (sentinel) node (SN) mapping determines the status of lymphatic basin draining a primary tumor, provides staging information of systemic spread of malignancy, and is vital in the management of breast cancer and melanoma. Thrombospondin (TSP), a matrix bound adhesive glycoprotein, promotes cell proliferation and angiogenesis. TSP receptors are expressed on lymphocytes, and on the cells of breast cancer and melanoma. We hypothesized that Tc-99m-CSVTCR, a small, soluble, and TSP specific peptide, can image SN. Method: CSVTCR was modified at the N terminus with Aba-G(D) AGG (TP1300) and labeled with Tc-99m. Female New Zealand rabbits were anesthetized and 125 μCi TP1300 was given into the plantar/palmer surface of each foot pad in the metacarpal/metatarsal region, followed by dynamic imaging for 2 hrs and quantification of Tc-99m in SN and injection site by ROI. Control rabbits received Tc-99m-O 4 - and TP1300>Tc-99mO- 4 . Tc-99m clearance from injection site was Tc-99m-O 4 >TP1300>>TSC. % ID/g in the axillary SN was greater in than the popliteal SN for all agents. For TP1300, SN to muscle Tc-99m ratios were 552 for axillary and 140 for popliteal nodes. With infiltrating tumor cells higher uptake in SN is expected. Summary: Due to high SN uptake, rapid clearance from injection site delivering low radiation dose at injection site and ease of handling, targeting TSP receptors with Tc-99m-TP1300, a soluble, receptor specific, small biomolecule for efficient imaging of SN is promising

  7. Authentic Attributes with Fine-Grained Anonymity Protection

    Science.gov (United States)

    2000-01-01

    registrations and ecommerce trans- Preprint - 2 Stuart G. Stubblebine, and Paul F. Syverson. Authentic Attributes with Fine-Grained Anonymity Protection...driver’s license and birth certi cate. When the registration process is complete, certi cates could be on a smart card that the customer is carrying. The...proof. At least initially, it might not be electronic, e.g., possession of a passport, of a driver’s license and birth certi cate, etc. Anonymous

  8. Local and global recoding methods for anonymizing set-valued data

    KAUST Repository

    Terrovitis, Manolis

    2010-06-10

    In this paper, we study the problem of protecting privacy in the publication of set-valued data. Consider a collection of supermarket transactions that contains detailed information about items bought together by individuals. Even after removing all personal characteristics of the buyer, which can serve as links to his identity, the publication of such data is still subject to privacy attacks from adversaries who have partial knowledge about the set. Unlike most previous works, we do not distinguish data as sensitive and non-sensitive, but we consider them both as potential quasi-identifiers and potential sensitive data, depending on the knowledge of the adversary. We define a new version of the k-anonymity guarantee, the k m-anonymity, to limit the effects of the data dimensionality, and we propose efficient algorithms to transform the database. Our anonymization model relies on generalization instead of suppression, which is the most common practice in related works on such data. We develop an algorithm that finds the optimal solution, however, at a high cost that makes it inapplicable for large, realistic problems. Then, we propose a greedy heuristic, which performs generalizations in an Apriori, level-wise fashion. The heuristic scales much better and in most of the cases finds a solution close to the optimal. Finally, we investigate the application of techniques that partition the database and perform anonymization locally, aiming at the reduction of the memory consumption and further scalability. A thorough experimental evaluation with real datasets shows that a vertical partitioning approach achieves excellent results in practice. © 2010 Springer-Verlag.

  9. Anonymous sex and HIV risk practices among men using the Internet specifically to find male partners for unprotected sex.

    Science.gov (United States)

    Klein, H

    2012-06-01

    To examine the popularity of anonymous sex practices among men using the Internet to find male partners for unprotected sex, and how anonymous sex relates to involvement in other HIV-related risk behaviours, and to investigate the factors associated with engaging in anonymous sex. Structured telephone interviews were conducted with men who used the Internet specifically to find male partners for unprotected sex. Random sampling from 16 websites was used to obtain a national sample. The data reported in this paper were based on quantitative interviews collected with a cross-sectional study design. Between January 2008 and May 2009, confidential telephone interviews lasting approximately 1-2 h were completed with 332 men. Participants were paid $35 for their participation. Most of the men (67.4%) liked anonymous sex, and slightly more than half (51.2%) had engaged in the behaviour during the month prior to interview. Involvement in anonymous sex was associated with greater involvement in a variety of human immunodeficiency virus (HIV)-related risk practices, such as illegal drug use, number of sex partners, and amount of unprotected sex. Four factors were associated with having vs not having anonymous sex: (1) being HIV positive; (2) answering all of the HIV-related knowledge questions correctly; (3) deriving greater enjoyment from having sex in public places, such as parks, public toilets, or adult book shops; and (4) greater impulsivity. Seven factors were associated with greater vs lesser involvement in anonymous sex among those practising the behaviour: (1) being involved in a relationship with a long-term partner; (2) liking to have sex in public places; (3) using bareback-oriented websites to identify sex partners; (4) greater impulsivity; (5) low level of condom use self-efficacy; (6) greater knowledge about HIV/acquired immunodeficiency syndrome; and either (7a) severe childhood maltreatment or (7b) Caucasian race. Men in this population often sought

  10. What Does Anonymization Mean? DataSHIELD and the Need for Consensus on Anonymization Terminology.

    Science.gov (United States)

    Wallace, Susan E

    2016-06-01

    Anonymization is a recognized process by which identifiers can be removed from identifiable data to protect an individual's confidentiality and is used as a standard practice when sharing data in biomedical research. However, a plethora of terms, such as coding, pseudonymization, unlinked, and deidentified, have been and continue to be used, leading to confusion and uncertainty. This article shows that this is a historic problem and argues that such continuing uncertainty regarding the levels of protection given to data risks damaging initiatives designed to assist researchers conducting cross-national studies and sharing data internationally. DataSHIELD and the creation of a legal template are used as examples of initiatives that rely on anonymization, but where the inconsistency in terminology could hinder progress. More broadly, this article argues that there is a real possibility that there could be possible damage to the public's trust in research and the institutions that carry it out by relying on vague notions of the anonymization process. Research participants whose lack of clear understanding of the research process is compensated for by trusting those carrying out the research may have that trust damaged if the level of protection given to their data does not match their expectations. One step toward ensuring understanding between parties would be consistent use of clearly defined terminology used internationally, so that all those involved are clear on the level of identifiability of any particular set of data and, therefore, how that data can be accessed and shared.

  11. Tasquinimod (ABR-215050, a quinoline-3-carboxamide anti-angiogenic agent, modulates the expression of thrombospondin-1 in human prostate tumors

    Directory of Open Access Journals (Sweden)

    Isaacs John T

    2010-05-01

    Full Text Available Abstract Background The orally active quinoline-3-carboxamide tasquinimod [ABR-215050; CAS number 254964-60-8, which currently is in a phase II-clinical trial in patients against metastatic prostate cancer, exhibits anti-tumor activity via inhibition of tumor angiogenesis in human and rodent tumors. To further explore the mode of action of tasquinimod, in vitro and in vivo experiments with gene microarray analysis were performed using LNCaP prostate tumor cells. The array data were validated by real-time semiquantitative reversed transcriptase polymerase chain reaction (sqRT-PCR and protein expression techniques. Results One of the most significant differentially expressed genes both in vitro and in vivo after exposure to tasquinimod, was thrombospondin-1 (TSP1. The up-regulation of TSP1 mRNA in LNCaP tumor cells both in vitro and in vivo correlated with an increased expression and extra cellular secretion of TSP1 protein. When nude mice bearing CWR-22RH human prostate tumors were treated with oral tasquinimod, there was a profound growth inhibition, associated with an up-regulation of TSP1 and a down- regulation of HIF-1 alpha protein, androgen receptor protein (AR and glucose transporter-1 protein within the tumor tissue. Changes in TSP1 expression were paralleled by an anti-angiogenic response, as documented by decreased or unchanged tumor tissue levels of VEGF (a HIF-1 alpha down stream target in the tumors from tasquinimod treated mice. Conclusions We conclude that tasquinimod-induced up-regulation of TSP1 is part of a mechanism involving down-regulation of HIF1α and VEGF, which in turn leads to reduced angiogenesis via inhibition of the "angiogenic switch", that could explain tasquinimods therapeutic potential.

  12. Is it OK to be an Anonymous?

    Directory of Open Access Journals (Sweden)

    Philip Serracino-Inglott

    2013-12-01

    Full Text Available Do the deviant acts carried out by the collective known as Anonymous qualify as vigilante activity, and if so, can they be justified? Addressing this question helps expose the difficulties of morally evaluating technologically enabled deviance. Anonymous is a complex, fluid actor but not as mysterious as popularly portrayed. Under a definition of vigilantism that includes reprobative punishment rather than violence as a key element, Anonymous are vigilantes. Many of its Ops can be justified in view of the mismatch between formal norm enforcement practice and Internet natives’ experience of it. Anons are more like eco-warriors than terrorists. While their actions are contentious, their force is framed in a vision of common good that is not unreasonable. Engaging with online deviants is shown to be a productive way of identifying the weaknesses in concepts underpinning moral evaluation of Internet-enabled phenomena.

  13. Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks

    Directory of Open Access Journals (Sweden)

    Javier Portela

    2016-11-01

    Full Text Available Social network analysis aims to obtain relational data from social systems to identify leaders, roles, and communities in order to model profiles or predict a specific behavior in users’ network. Preserving anonymity in social networks is a subject of major concern. Anonymity can be compromised by disclosing senders’ or receivers’ identity, message content, or sender-receiver relationships. Under strongly incomplete information, a statistical disclosure attack is used to estimate the network and node characteristics such as centrality and clustering measures, degree distribution, and small-world-ness. A database of email networks in 29 university faculties is used to study the method. A research on the small-world-ness and Power law characteristics of these email networks is also developed, helping to understand the behavior of small email networks.

  14. Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks

    Science.gov (United States)

    Portela, Javier; García Villalba, Luis Javier; Silva Trujillo, Alejandra Guadalupe; Sandoval Orozco, Ana Lucila; Kim, Tai-Hoon

    2016-01-01

    Social network analysis aims to obtain relational data from social systems to identify leaders, roles, and communities in order to model profiles or predict a specific behavior in users’ network. Preserving anonymity in social networks is a subject of major concern. Anonymity can be compromised by disclosing senders’ or receivers’ identity, message content, or sender-receiver relationships. Under strongly incomplete information, a statistical disclosure attack is used to estimate the network and node characteristics such as centrality and clustering measures, degree distribution, and small-world-ness. A database of email networks in 29 university faculties is used to study the method. A research on the small-world-ness and Power law characteristics of these email networks is also developed, helping to understand the behavior of small email networks. PMID:27809275

  15. A reciprocal framework for spatial K-anonymity

    KAUST Repository

    Ghinita, Gabriel; Zhao, Keliang; Papadias, Dimitris; Kalnis, Panos

    2010-01-01

    Spatial K-anonymity (SKA) exploits the concept of K-anonymity in order to protect the identity of users from location-based attacks. The main idea of SKA is to replace the exact location of a user U with an anonymizing spatial region (ASR) that contains at least K-1 other users, so that an attacker can pinpoint U with probability at most 1/K. Simply generating an ASR that includes K users does not guarantee SKA. Previous work defined the reciprocity property as a sufficient condition for SKA. However, the only existing reciprocal method, Hilbert Cloak, relies on a specialized data structure. In contrast, we propose a general framework for implementing reciprocal algorithms using any existing spatial index on the user locations. We discuss ASR construction methods with different tradeoffs on effectiveness (i.e., ASR size) and efficiency (i.e., construction cost). Then, we present case studies of applying our framework on top of two popular spatial indices (namely, R*-trees and Quad-trees). Finally, we consider the case where the attacker knows the query patterns of each user. The experimental results verify that our methods outperform Hilbert Cloak. Moreover, since we employ general-purpose spatial indices, the proposed system is not limited to anonymization, but supports conventional spatial queries as well. © 2009 Elsevier B.V. All rights reserved.

  16. A reciprocal framework for spatial K-anonymity

    KAUST Repository

    Ghinita, Gabriel

    2010-05-01

    Spatial K-anonymity (SKA) exploits the concept of K-anonymity in order to protect the identity of users from location-based attacks. The main idea of SKA is to replace the exact location of a user U with an anonymizing spatial region (ASR) that contains at least K-1 other users, so that an attacker can pinpoint U with probability at most 1/K. Simply generating an ASR that includes K users does not guarantee SKA. Previous work defined the reciprocity property as a sufficient condition for SKA. However, the only existing reciprocal method, Hilbert Cloak, relies on a specialized data structure. In contrast, we propose a general framework for implementing reciprocal algorithms using any existing spatial index on the user locations. We discuss ASR construction methods with different tradeoffs on effectiveness (i.e., ASR size) and efficiency (i.e., construction cost). Then, we present case studies of applying our framework on top of two popular spatial indices (namely, R*-trees and Quad-trees). Finally, we consider the case where the attacker knows the query patterns of each user. The experimental results verify that our methods outperform Hilbert Cloak. Moreover, since we employ general-purpose spatial indices, the proposed system is not limited to anonymization, but supports conventional spatial queries as well. © 2009 Elsevier B.V. All rights reserved.

  17. AIB-OR: improving onion routing circuit construction using anonymous identity-based cryptosystems.

    Science.gov (United States)

    Wang, Changji; Shi, Dongyuan; Xu, Xilei

    2015-01-01

    The rapid growth of Internet applications has made communication anonymity an increasingly important or even indispensable security requirement. Onion routing has been employed as an infrastructure for anonymous communication over a public network, which provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. However, existing onion routing protocols usually exhibit poor performance due to repeated encryption operations. In this paper, we first present an improved anonymous multi-receiver identity-based encryption (AMRIBE) scheme, and an improved identity-based one-way anonymous key agreement (IBOWAKE) protocol. We then propose an efficient onion routing protocol named AIB-OR that provides provable security and strong anonymity. Our main approach is to use our improved AMRIBE scheme and improved IBOWAKE protocol in onion routing circuit construction. Compared with other onion routing protocols, AIB-OR provides high efficiency, scalability, strong anonymity and fault tolerance. Performance measurements from a prototype implementation show that our proposed AIB-OR can achieve high bandwidths and low latencies when deployed over the Internet.

  18. Traveling the Silk Road: A Measurement of a Large Anonymous Online Marketplace

    Science.gov (United States)

    2012-11-28

    Silk Road, an anonymous, international online marketplace that operates as a Tor hidden service and uses Bitcoin as its exchange currency. We gather...analysis of Silk Road, an anonymous, international on- line marketplace that operates as a Tor hidden service and uses Bitcoin as its exchange currency. We...anonymity, Silk Road needs to also preserve payment anonymity. To that effect, Silk Road only supports Bitcoin (BTC, [30]) as a trading currency

  19. A survey of anonymous peer-to-peer file-sharing

    NARCIS (Netherlands)

    Chothia, T.; Chatzikokolakis, K.; Enokido, T.; Yan, L.; Xiao, B.; Kim, D.; Dai, Y.S.; Yang, L.T.

    2005-01-01

    This paper provides a survey of searchable, peer-to-peer file-sharing systems that offer the user some form of anonymity. We start this survey by giving a brief description of the most popular methods of providing anonymous communication. These include the Ants protocol, Onion routing, Multicasting,

  20. Persona: Network Layer Anonymity and Accountability for Next Generation Internet

    Science.gov (United States)

    Mallios, Yannis; Modi, Sudeep; Agarwala, Aditya; Johns, Christina

    Individual privacy has become a major concern, due to the intrusive nature of the services and websites that collect increasing amounts of private information. One of the notions that can lead towards privacy protection is that of anonymity. Unfortunately, anonymity can also be maliciously exploited by attackers to hide their actions and identity. Thus some sort of accountability is also required. The current Internet has failed to provide both properties, as anonymity techniques are difficult to fully deploy and thus are easily attacked, while the Internet provides limited level of accountability. The Next Generation Internet (NGI) provides us with the opportunity to examine how these conflicting properties could be efficiently applied and thus protect users’ privacy while holding malicious users accountable. In this paper we present the design of a scheme, called Persona that can provide anonymity and accountability in the network layer of NGI. More specifically, our design requirements are to combine these two conflicting desires in a stateless manner within routers. Persona allows users to choose different levels of anonymity, while it allows the discovery of malicious nodes.

  1. Academic freedom, public reactions, and anonymity.

    Science.gov (United States)

    Häyry, Matti

    2014-05-01

    Academic freedom can be defined as immunity against adverse reactions from the general public, designed to keep scholars unintimidated and productive even after they have published controversial ideas. Francesca Minerva claims that this notion of strict instrumental academic freedom is supported by Ronald Dworkin, and that anonymity would effectively defend the sphere of immunity implied by it. Against this, I argue that the idea defended by Minerva finds no support in the work by Dworkin referred to; that anonymity would not in most cases effectively protect the kind of immunity sought after; and that in some cases it would not even be desirable to protect scholars from public reactions to their controversial claims. © 2014 John Wiley & Sons Ltd.

  2. Our Anonymous Online Research Participants Are Not Always Anonymous: Is This a Problem?

    Science.gov (United States)

    Dawson, Phillip

    2014-01-01

    When educational research is conducted online, we sometimes promise our participants that they will be anonymous--but do we deliver on this promise? We have been warned since 1996 to be careful when using direct quotes in Internet research, as full-text web search engines make it easy to find chunks of text online. This paper details an empirical…

  3. For the Lulz: Anonymous, Aesthetics and Affect

    Directory of Open Access Journals (Sweden)

    Rodrigo Ferrada Stoehrel

    2014-03-01

    Full Text Available The focus of this paper is on different but connected areas of power – relating to things such as economic globalisation, surveillance, censorship/freedom, ‘terrorism’ and/or specific military activity – visually represented through online media, and intentionally produced to inform a wide spectrum of individuals and interest groups about global and local social injustices. Or, more importantly, produced and distributed with the purpose of providing users with possibilities to engage, bodily and emotionally, in diverse ways: may it be through physical antiwar/anti-wall street protests or hacktivist tactics (e.g. DDoS attacks. We examine a sample of videos, photographs and propaganda posters produced, and digitally distributed (2008-2013, by the fragmented body of activists united globally under the generic name of Anonymous. Analytically, we will draw upon Mouffe’s thoughts on ‘antagonism’ and ‘passion,’ Foucault’s ideas on international citizenship and the (ethical ‘right to intervene’ (beyond governmentality, together with Sontag’s notion of institutional political inertia and the Deleuzian/Spinozian perspective on affect as a capacity for action. The goal is to analyse the ways in which Anonymous systematically inspire (not only the radical and social imaginary but also other direct forms of action that have potential societal effects.

  4. Structure and Anonymity of the Bitcoin Transaction Graph

    Directory of Open Access Journals (Sweden)

    Kay Hamacher

    2013-05-01

    Full Text Available The Bitcoin network of decentralized payment transactions has attracted a lot of attention from both Internet users and researchers in recent years. Bitcoin utilizes a peer-to-peer network to issue anonymous payment transactions between different users. In the currently used Bitcoin clients, the full transaction history is available at each node of the network to prevent double spending without the need for a central authority, forming a valuable source for empirical research on network structure, network dynamics, and the implied anonymity challenges, as well as guidance on the future evolution of complex payment systems. We found dynamical effects of which some increase anonymity while others decrease it. Most importantly, several parameters of the Bitcoin transaction graph seem to have become stationary over the last 12–18 months. We discuss the implications.

  5. Regulator of differentiation 1 (ROD1) binds to the amphipathic C-terminal peptide of thrombospondin-4 and is involved in its mitogenic activity.

    Science.gov (United States)

    Sadvakassova, Gulzhakhan; Dobocan, Monica C; Difalco, Marcos R; Congote, Luis F

    2009-09-01

    The matrix protein thrombospondin-4 has an acidic amphipathic C-terminal peptide (C21) which stimulates erythroid cell proliferation. Here we show that C21 stimulates red cell formation in anemic mice in vivo. In vitro experiments indicated that the peptide-mediated increase of erythroid colony formation in cultures of human CD34+ hematopoietic progenitor cells was possible only under continuous presence of erythropoietin. In the absence of this cytokine, C21 stimulated exclusively myeloid colony formation. Therefore, the peptide is not a specific erythroid differentiation factor. In fact, it is mitogenic in non-erythroid cells, such as skin fibroblasts and kidney epithelial cells. In erythroleukemic TF-1 cells, it actually decreased the production of the erythroid differentiation marker glycophorin A. C21-affinity chromatography revealed regulator of differentiation 1 (ROD1) as a major C21-binding protein. ROD1 is the hematopoietic cell paralog of polypyrimidine tract binding proteins (PTBs), RNA splice regulators which regulate differentiation by repressing tissue-specific exons. ROD1 binding to C21 was strongly inhibited by synthetic RNAs in the order poly A > poly U > poly G = poly C and was weakly inhibited by a synthetic phosphorylated peptide mimicking the C-terminal domain of RNA polymerase II. Cellular overexpression or knockdown experiments of ROD1 suggest a role for this protein in the mitogenic activity of C21. Since the nuclear proteins ROD1 and PTBs regulate differentiation at a posttranscriptional level and there is a fast nuclear uptake of C21, we put forward the idea that the peptide is internalized, goes to the nucleus and maintains cells in a proliferative state by supporting ROD1-mediated inhibition of differentiation.

  6. Alcoholics Anonymous and nursing. Lessons in holism and spiritual care.

    Science.gov (United States)

    McGee, E M

    2000-03-01

    Alcoholic Anonymous (AA) is a worldwide, million-member organization that has assisted countless alcoholics to achieve sobriety through a spiritual program of recovery from alcoholism. Based on spiritual principles known as the "Twelve Steps" and "Twelve Traditions," AA has provided a model for other recovery programs such as Narcotics Anonymous (NA), Gamblers Anonymous (GA), and Sex and Love Addicts Anonymous (SLAA). Recovery in AA appears to involve a process of self-transcendence. In recent years, nursing scholars have increasingly explored the concepts of self-transcendence and spirituality as they apply to nursing theory and practice. This article explores the roots and spiritual dimensions of 12-step recovery programs. It further explores the ways in which theoretical and clinical knowledge about the delivery of spiritual care interventions may be gained from an understanding of AA's spiritual approach to recovery.

  7. Culture or anonymity? Differences in proposer behaviour in Korea and Germany.

    Science.gov (United States)

    Horak, Sven

    2015-10-01

    This study explores the proposer behaviour in an ultimatum game (UG) frame under anonymous and non-anonymous conditions among a Korean and German subject pool (n = 590) in comparison. Whereas the anonymous condition is represented by the standard UG, the non-anonymous condition integrates an aggregate of the Korean cultural context variables university affiliation, regional origin and seniority. The latter, a classic Confucian context variable, is measured by age differentials. The former two are impactful components of so-called Yongo networks, a unique Korean informal institution identical to Chinese Guanxi ties. Yongo networks, yet underrepresented in research, are said to be a central context variable to explain Korean social ties and decision-making behaviour. We observe significant differences between the offer behaviours of Korean and German subjects when exposing selected cultural variables. We argue that the behavioural differences observed are in fact due to culture not anonymity. © 2015 International Union of Psychological Science.

  8. Thrombospondin-1 Partly Mediates the Cartilage Protective Effect of Adipose-Derived Mesenchymal Stem Cells in Osteoarthritis

    Directory of Open Access Journals (Sweden)

    Marie Maumus

    2017-11-01

    Full Text Available ObjectiveAssuming that mesenchymal stem cells (MSCs respond to the osteoarthritic joint environment to exert a chondroprotective effect, we aimed at investigating the molecular response setup by MSCs after priming by osteoarthritic chondrocytes in cocultures.MethodsWe used primary human osteoarthritic chondrocytes and adipose stem cells (ASCs in mono- and cocultures and performed a high-throughput secretome analysis. Among secreted proteins differentially induced in cocultures, we identified thrombospondin-1 (THBS1 as a potential candidate that could be involved in the chondroprotective effect of ASCs.ResultsSecretome analysis revealed significant induction of THBS1 in ASCs/chondrocytes cocultures at mRNA and protein levels. We showed that THBS1 was upregulated at late stages of MSC differentiation toward chondrocytes and that recombinant THBS1 (rTHBS1 exerted a prochondrogenic effect on MSC indicating a role of THBS1 during chondrogenesis. However, compared to control ASCs, siTHBS1-transfected ASCs did not decrease the expression of hypertrophic and inflammatory markers in osteoarthritic chondrocytes, suggesting that THBS1 was not involved in the reversion of osteoarthritic phenotype. Nevertheless, downregulation of THBS1 in ASCs reduced their immunosuppressive activity, which was consistent with the anti-inflammatory role of rTHBS1 on T lymphocytes. THBS1 function was then evaluated in the collagenase-induced OA model by comparing siTHBS1-transfected and control ASCs. The protective effect of ASCs evaluated by histological and histomorphological analysis of cartilage and bone was not seen with siTHBS1-transfected ASCs.ConclusionOur data suggest that THBS1 did not exert a direct protective effect on chondrocytes but might reduce inflammation, subsequently explaining the therapeutic effect of ASCs in OA.

  9. Scalable and Anonymous Group Communication with MTor

    Directory of Open Access Journals (Sweden)

    Lin Dong

    2016-04-01

    Full Text Available This paper presents MTor, a low-latency anonymous group communication system. We construct MTor as an extension to Tor, allowing the construction of multi-source multicast trees on top of the existing Tor infrastructure. MTor does not depend on an external service to broker the group communication, and avoids central points of failure and trust. MTor’s substantial bandwidth savings and graceful scalability enable new classes of anonymous applications that are currently too bandwidth-intensive to be viable through traditional unicast Tor communication-e.g., group file transfer, collaborative editing, streaming video, and real-time audio conferencing.

  10. Suicidal behavior among members of Gamblers Anonymous.

    Science.gov (United States)

    Frank, M L; Lester, D; Wexler, A

    1991-09-01

    A national sample of 500 members of Gamblers Anonymous was surveyed by mail in order to gather information on suicidal history. One hundred sixty two usable surveys were returned representing 32.4% of the original sample. Compulsive gamblers who had a history of suicidal preoccupation began gambling at an earlier age than nonsuicidal gamblers and were more likely to have stolen to support their gambling. They also tended to have addicted relatives and children more than nonsuicidal gamblers did. The data suggest that those gamblers who had been suicidal tend to be more serious gamblers than nonsuicidal respondents.

  11. Gamblers Anonymous as a Recovery Pathway: A Scoping Review

    OpenAIRE

    Schuler, Andr?e; Ferentzy, Peter; Turner, Nigel E.; Skinner, Wayne; McIsaac, Kathryn E.; Ziegler, Carolyn P.; Matheson, Flora I.

    2016-01-01

    Given the preponderance of Gamblers Anonymous (GA), there has been relatively little effort to explore the existing evidence base on its effectiveness as a recovery approach for problem gambling. To remedy this gap in the literature we conducted a scoping review of the literature on mutual aid for individuals experiencing problem gambling published between 2002 and 2015. We searched 13 databases and reviewed reference lists and websites of relevant organizations. We reviewed records for eligi...

  12. Anonymous living liver donation: donor profiles and outcomes.

    Science.gov (United States)

    Reichman, T W; Fox, A; Adcock, L; Wright, L; Abbey, S E; Levy, G; Grant, D R

    2010-09-01

    There are no published series of the assessment process, profiles and outcomes of anonymous, directed or nondirected live liver donation. The outcomes of 29 consecutive potential anonymous liver donors at our center were assessed. We used our standard live liver assessment process, augmented with the following additional acceptance criteria: a logical rationale for donation, a history of social altruism, strong social supports and a willingness to maintain confidentiality of patient information. Seventeen potential donors were rejected and 12 donors were ultimately accepted (six male, six female). All donors were strongly motivated by a desire and sense of responsibility to help others. Four donations were directed toward recipients who undertook media appeals. The donor operations included five left lateral segmentectomies and seven right hepatectomies. The overall donor morbidity was 40% with one patient having a transient Clavien level 3 complication (a pneumothorax). All donors are currently well. None expressed regret about their decision to donate, and all volunteered the opinion that donation had improved their lives. The standard live liver donor assessment process plus our additional requirements appears to provide a robust assessment process for the selection of anonymous live liver donors. Acceptance of anonymous donors enlarges the donor liver pool. © 2010 The Authors Journal compilation © 2010 The American Society of Transplantation and the American Society of Transplant Surgeons.

  13. Using anonymized reflection to teach ethics: a pilot study.

    Science.gov (United States)

    Kyle, Gaye

    2008-01-01

    Anonymized reflection was employed as an innovative way of teaching ethics in order to enhance students' ability in ethical decision making during a Care of the Dying Patient and Family' module. Both qualitative and quantitative data were collected from the first two student cohorts who experienced anonymized reflection ( n = 24). The themes identified were the richness and relevance of scenarios, small-group work and a team approach to teaching. Students indicated that they preferred this style of teaching. This finding was verified by a postal questionnaire conducted four months later. The conclusions drawn from this study suggest that using anonymized reflection is an effective method for teaching ethics to nurses and indicates that learning about ethical issues in this way reduces uncertainties.

  14. Alcoholics anonymous, other 12-step movements and psychotherapy in the US population, 1990.

    Science.gov (United States)

    Room, R; Greenfield, T

    1993-04-01

    Based on the 1990 US National Alcohol Survey, this note provides the first available comprehensive findings on self-reported utilization of a variety of sources of personal support and counselling for alcohol and other problems. Respondents were queried about lifetime attendance and number of times they went to identified sources of help in the prior year. Twelve-step groups included Alcoholics Anonymous, Al-Anon, Adult Children of Alcoholics, and other non-alcohol-oriented groups like Gamblers Anonymous, Narcotics Anonymous, and Overeaters Anonymous; additional questions inquired about support or therapy groups and individual counselling for non-alcohol problems. Of the US adult population, 9% have been to an AA meeting at some time, 3.6% in the prior year, only about one-third of these for problems of their own. About half these percentages, mostly women, have attended Al-Anon. Of the same population, 13.3% indicate ever attending a 12-step meeting (including non-alcohol-oriented groups), 5.3% in the last year. During the prior year a further 2.1% used other support/therapy groups and 5.5% sought individual counselling/therapy for personal problems other than alcohol. In contrast to this high reported utilization, only 4.9% (ever) and 2.3% (12-months) reported going to anyone including AA for a problem (of their own) related to drinking.

  15. Determining the relative importance of the mechanisms of behavior change within Alcoholics Anonymous: a multiple mediator analysis.

    Science.gov (United States)

    Kelly, John F; Hoeppner, Bettina; Stout, Robert L; Pagano, Maria

    2012-02-01

    Evidence indicates that Alcoholics Anonymous (AA) participation reduces relapse risk but less is known about the mechanisms through which AA confers this benefit. Initial studies indicate self-efficacy, negative affect, adaptive social networks and spiritual practices are mediators of this effect, but because these have been tested in isolation, their relative importance remains elusive. This study tested multiple mediators simultaneously to help determine the most influential pathways. Prospective, statistically controlled, naturalistic investigation examined the extent to which these previously identified mechanisms mediated AA attendance effects on alcohol outcomes controlling for baseline outcome values, mediators, treatment, and other confounders. Nine clinical sites within the United States. Adults (n = 1726) suffering from alcohol use disorder (AUD) initially enrolled in a randomized study with two arms: aftercare (n = 774); and out-patient (n = 952) comparing three out-patient treatments (Project MATCH). AA attendance during treatment; mediators at 9 months; and outcomes [percentage of days abstinent (PDA) and drinks per drinking day (DDD)] at 15 months. Among out-patients the effect of AA attendance on alcohol outcomes was explained primarily by adaptive social network changes and increases in social abstinence self-efficacy. Among more impaired aftercare patients, in addition to mediation through adaptive network changes and increases in social self-efficacy, AA lead to better outcomes through increasing spirituality/religiosity and by reducing negative affect. The degree to which mediators explained the relationship between AA and outcomes ranged from 43% to 67%. While Alcoholics Anonymous facilitates recovery by mobilizing several processes simultaneously, it is changes in social factors which appear to be of primary importance. © 2011 The Authors, Addiction © 2011 Society for the Study of Addiction.

  16. Enabling genomic-phenomic association discovery without sacrificing anonymity.

    Directory of Open Access Journals (Sweden)

    Raymond D Heatherly

    Full Text Available Health information technologies facilitate the collection of massive quantities of patient-level data. A growing body of research demonstrates that such information can support novel, large-scale biomedical investigations at a fraction of the cost of traditional prospective studies. While healthcare organizations are being encouraged to share these data in a de-identified form, there is hesitation over concerns that it will allow corresponding patients to be re-identified. Currently proposed technologies to anonymize clinical data may make unrealistic assumptions with respect to the capabilities of a recipient to ascertain a patients identity. We show that more pragmatic assumptions enable the design of anonymization algorithms that permit the dissemination of detailed clinical profiles with provable guarantees of protection. We demonstrate this strategy with a dataset of over one million medical records and show that 192 genotype-phenotype associations can be discovered with fidelity equivalent to non-anonymized clinical data.

  17. Quantitative proteomics reveals altered expression of extracellular matrix related proteins of human primary dermal fibroblasts in response to sulfated hyaluronan and collagen applied as artificial extracellular matrix.

    Science.gov (United States)

    Müller, Stephan A; van der Smissen, Anja; von Feilitzsch, Margarete; Anderegg, Ulf; Kalkhof, Stefan; von Bergen, Martin

    2012-12-01

    Fibroblasts are the main matrix producing cells of the dermis and are also strongly regulated by their matrix environment which can be used to improve and guide skin wound healing processes. Here, we systematically investigated the molecular effects on primary dermal fibroblasts in response to high-sulfated hyaluronan [HA] (hsHA) by quantitative proteomics. The comparison of non- and high-sulfated HA revealed regulation of 84 of more than 1,200 quantified proteins. Based on gene enrichment we found that sulfation of HA alters extracellular matrix remodeling. The collagen degrading enzymes cathepsin K, matrix metalloproteinases-2 and -14 were found to be down-regulated on hsHA. Additionally protein expression of thrombospondin-1, decorin, collagen types I and XII were reduced, whereas the expression of trophoblast glycoprotein and collagen type VI were slightly increased. This study demonstrates that global proteomics provides a valuable tool for revealing proteins involved in molecular effects of growth substrates for further material optimization.

  18. Isthmin 1 Is a Secreted Protein Expressed in Skin, Mucosal Tissues, and NK, NKT, and Th17 Cells

    OpenAIRE

    Valle-Rios, Ricardo; Maravillas-Montero, José L.; Burkhardt, Amanda M.; Martinez, Cynthia; Buhren, Bettina Alexandra; Homey, Bernhard; Gerber, Peter Arne; Robinson, Octavio; Hevezi, Peter; Zlotnik, Albert

    2014-01-01

    Using a comprehensive microarray database of human gene expression, we identified that in mammals, a secreted protein known as isthmin 1 (ISM1) is expressed in skin, mucosal tissues, and selected lymphocyte populations. ISM1 was originally identified in Xenopus brain during development, and it encodes a predicted ∼50-kDa protein containing a signal peptide, a thrombospondin domain, and an adhesion-associated domain. We confirmed the pattern of expression of ISM1 in both human and mouse tissue...

  19. A New Heuristic Anonymization Technique for Privacy Preserved Datasets Publication on Cloud Computing

    Science.gov (United States)

    Aldeen Yousra, S.; Mazleena, Salleh

    2018-05-01

    Recent advancement in Information and Communication Technologies (ICT) demanded much of cloud services to sharing users’ private data. Data from various organizations are the vital information source for analysis and research. Generally, this sensitive or private data information involves medical, census, voter registration, social network, and customer services. Primary concern of cloud service providers in data publishing is to hide the sensitive information of individuals. One of the cloud services that fulfill the confidentiality concerns is Privacy Preserving Data Mining (PPDM). The PPDM service in Cloud Computing (CC) enables data publishing with minimized distortion and absolute privacy. In this method, datasets are anonymized via generalization to accomplish the privacy requirements. However, the well-known privacy preserving data mining technique called K-anonymity suffers from several limitations. To surmount those shortcomings, I propose a new heuristic anonymization framework for preserving the privacy of sensitive datasets when publishing on cloud. The advantages of K-anonymity, L-diversity and (α, k)-anonymity methods for efficient information utilization and privacy protection are emphasized. Experimental results revealed the superiority and outperformance of the developed technique than K-anonymity, L-diversity, and (α, k)-anonymity measure.

  20. Reexamination of the Association between Anonymity and Self-Interested Unethical Behavior in Adults

    Science.gov (United States)

    Nogami, Tatsuya

    2009-01-01

    The well-established notion that the frequency of self-interested unethical behavior increases among anonymous people was reexamined employing a more strict definition of anonymity, voluntary unethical behavior, and adult individuals. Anonymity was defined as nonassociability of the participant's traits with respect to unethical behavior. The…

  1. Three-factor anonymous authentication and key agreement scheme for Telecare Medicine Information Systems.

    Science.gov (United States)

    Arshad, Hamed; Nikooghadam, Morteza

    2014-12-01

    Nowadays, with comprehensive employment of the internet, healthcare delivery services is provided remotely by telecare medicine information systems (TMISs). A secure mechanism for authentication and key agreement is one of the most important security requirements for TMISs. Recently, Tan proposed a user anonymity preserving three-factor authentication scheme for TMIS. The present paper shows that Tan's scheme is vulnerable to replay attacks and Denial-of-Service attacks. In order to overcome these security flaws, a new and efficient three-factor anonymous authentication and key agreement scheme for TMIS is proposed. Security and performance analysis shows superiority of the proposed scheme in comparison with previously proposed schemes that are related to security of TMISs.

  2. Privacy preserving data anonymization of spontaneous ADE reporting system dataset.

    Science.gov (United States)

    Lin, Wen-Yang; Yang, Duen-Chuan; Wang, Jie-Teng

    2016-07-18

    To facilitate long-term safety surveillance of marketing drugs, many spontaneously reporting systems (SRSs) of ADR events have been established world-wide. Since the data collected by SRSs contain sensitive personal health information that should be protected to prevent the identification of individuals, it procures the issue of privacy preserving data publishing (PPDP), that is, how to sanitize (anonymize) raw data before publishing. Although much work has been done on PPDP, very few studies have focused on protecting privacy of SRS data and none of the anonymization methods is favorable for SRS datasets, due to which contain some characteristics such as rare events, multiple individual records, and multi-valued sensitive attributes. We propose a new privacy model called MS(k, θ (*) )-bounding for protecting published spontaneous ADE reporting data from privacy attacks. Our model has the flexibility of varying privacy thresholds, i.e., θ (*) , for different sensitive values and takes the characteristics of SRS data into consideration. We also propose an anonymization algorithm for sanitizing the raw data to meet the requirements specified through the proposed model. Our algorithm adopts a greedy-based clustering strategy to group the records into clusters, conforming to an innovative anonymization metric aiming to minimize the privacy risk as well as maintain the data utility for ADR detection. Empirical study was conducted using FAERS dataset from 2004Q1 to 2011Q4. We compared our model with four prevailing methods, including k-anonymity, (X, Y)-anonymity, Multi-sensitive l-diversity, and (α, k)-anonymity, evaluated via two measures, Danger Ratio (DR) and Information Loss (IL), and considered three different scenarios of threshold setting for θ (*) , including uniform setting, level-wise setting and frequency-based setting. We also conducted experiments to inspect the impact of anonymized data on the strengths of discovered ADR signals. With all three

  3. College Students' Experiences with Anonymous Social Media: Implications for Campus Racial Climate

    Science.gov (United States)

    Armstrong, Amanda; Thomas, Jaymi; Smith, Madeline

    2017-01-01

    The purpose of this exploratory case study was to gather undergraduate students' perceptions of anonymous racist messages found on Yik Yak and to better understand the implications of anonymous platforms on campus racial climate. Given the limited research surrounding students' use of anonymous social media platforms, as well as the predominant…

  4. An outcome study of Gamblers Anonymous.

    Science.gov (United States)

    Stewart, R M; Brown, R I

    1988-02-01

    Retrospective and prospective studies of a total sample of 232 attenders at groups of Gamblers Anonymous suggest that total abstinence from gambling was maintained by 8% of all comers at one year from first attendance and by 7% at two years.

  5. TsAg5, a Taenia solium cysticercus protein with a marginal trypsin-like activity in the diagnosis of human neurocysticercosis.

    Science.gov (United States)

    Rueda, Analiz; Sifuentes, Cecilia; Gilman, Robert H; Gutiérrez, Andrés H; Piña, Ruby; Chile, Nancy; Carrasco, Sebastián; Larson, Sandra; Mayta, Holger; Verástegui, Manuela; Rodriguez, Silvia; Gutiérrez-Correa, Marcel; García, Héctor H; Sheen, Patricia; Zimic, Mirko

    2011-12-01

    Neurocysticercosis is an endemic parasitic disease caused by Taenia solium larva. Although the mechanism of infection is not completely understood, it is likely driven by proteolytic activity that degrades the intestinal wall to facilitate oncosphere penetration and further infection. We analyzed the publicly available T. solium EST/DNA library and identified two contigs comprising a full-length cDNA fragment very similar to Echinococcus granulosus Ag5 protein. The T. solium cDNA sequence included a proteolytic trypsin-like-domain in the C-terminal region, and a thrombospondin type-1 adherence-domain in the N-terminal region. Both the trypsin-like and adherence domains were expressed independently as recombinant proteins in bacterial systems. TsAg5 showed marginal trypsin-like activity and high sequence similarity to Ag5. The purified antigens were tested in a Western immunoblot assay to diagnose human neurocysticercosis. The sensitivity of the trypsin-like-domain was 96.36% in patients infected with extraparenchymal cysts, 75.44% in patients infected with multiple cysts, and 39.62% in patients with a single cyst. Specificity was 76.70%. The thrombospondin type-1 adherence-domain was not specific for neurocysticercosis. Copyright © 2011 Elsevier B.V. All rights reserved.

  6. Secure and Efficient Anonymous Authentication Scheme in Global Mobility Networks

    Directory of Open Access Journals (Sweden)

    Jun-Sub Kim

    2013-01-01

    Full Text Available In 2012, Mun et al. pointed out that Wu et al.’s scheme failed to achieve user anonymity and perfect forward secrecy and disclosed the passwords of legitimate users. And they proposed a new enhancement for anonymous authentication scheme. However, their proposed scheme has vulnerabilities that are susceptible to replay attack and man-in-the-middle attack. It also incurs a high overhead in the database. In this paper, we examine the vulnerabilities in the existing schemes and the computational overhead incurred in the database. We then propose a secure and efficient anonymous authentication scheme for roaming service in global mobility network. Our proposed scheme is secure against various attacks, provides mutual authentication and session key establishment, and incurs less computational overhead in the database than Mun et al.'s scheme.

  7. Anonymous voting for multi-dimensional CV quantum system

    International Nuclear Information System (INIS)

    Shi Rong-Hua; Xiao Yi; Shi Jin-Jing; Guo Ying; Lee, Moon-Ho

    2016-01-01

    We investigate the design of anonymous voting protocols, CV-based binary-valued ballot and CV-based multi-valued ballot with continuous variables (CV) in a multi-dimensional quantum cryptosystem to ensure the security of voting procedure and data privacy. The quantum entangled states are employed in the continuous variable quantum system to carry the voting information and assist information transmission, which takes the advantage of the GHZ-like states in terms of improving the utilization of quantum states by decreasing the number of required quantum states. It provides a potential approach to achieve the efficient quantum anonymous voting with high transmission security, especially in large-scale votes. (paper)

  8. The anonymity paradox in patient engagement: reputation, risk and web-based public feedback.

    Science.gov (United States)

    Speed, Ewen; Davison, Charlie; Gunnell, Caroline

    2016-06-01

    The UK National Health Service (NHS) has long espoused patient and public engagement. Recent years have seen increasing use of internet-based methods of collecting feedback about patient experience and public and staff views about NHS services and priorities. Often hailed as a means of facilitating participative democratic patient engagement, these processes raise a number of complex issues. A key aspect of it is the opportunity for comment to be made anonymously. Our research reveals an anonymity paradox whereby patients clearly demonstrate a perception that anonymity is a prerequisite for effective use of these feedback processes, whereas professionals demonstrate a perception that patient anonymity is a barrier to effective use. The risks of anonymity are constructed very differently by patients and professionals. Patient concerns around anonymity were not motivated by a general concern about a loss of privacy, but more that a positive identification might compromise future care. For professionals, concerns were voiced more around risks of reputational damage for specific practitioners or practices (in that anyone could say anything) and also that this anonymous feedback was available publicly and that it might go against the medical opinion of the professional. These concerns pointed to important differences in perceptions of patient and professional vulnerability. In the qualitative analysis that follows the key finding was that while anonymity makes service users feel less vulnerable, it can have the opposite effect on managers and clinical staff. This raises important implications for the use and utility of internet-based methods of collecting patient feedback. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  9. Security Analysis and Improvement of an Anonymous Authentication Scheme for Roaming Services

    Directory of Open Access Journals (Sweden)

    Youngsook Lee

    2014-01-01

    Full Text Available An anonymous authentication scheme for roaming services in global mobility networks allows a mobile user visiting a foreign network to achieve mutual authentication and session key establishment with the foreign-network operator in an anonymous manner. In this work, we revisit He et al.’s anonymous authentication scheme for roaming services and present previously unpublished security weaknesses in the scheme: (1 it fails to provide user anonymity against any third party as well as the foreign agent, (2 it cannot protect the passwords of mobile users due to its vulnerability to an offline dictionary attack, and (3 it does not achieve session-key security against a man-in-the-middle attack. We also show how the security weaknesses of He et al.’s scheme can be addressed without degrading the efficiency of the scheme.

  10. Bayesian modeling of consumer behavior in the presence of anonymous visits

    Science.gov (United States)

    Novak, Julie Esther

    Tailoring content to consumers has become a hallmark of marketing and digital media, particularly as it has become easier to identify customers across usage or purchase occasions. However, across a wide variety of contexts, companies find that customers do not consistently identify themselves, leaving a substantial fraction of anonymous visits. We develop a Bayesian hierarchical model that allows us to probabilistically assign anonymous sessions to users. These probabilistic assignments take into account a customer's demographic information, frequency of visitation, activities taken when visiting, and times of arrival. We present two studies, one with synthetic and one with real data, where we demonstrate improved performance over two popular practices (nearest-neighbor matching and deleting the anonymous visits) due to increased efficiency and reduced bias driven by the non-ignorability of which types of events are more likely to be anonymous. Using our proposed model, we avoid potential bias in understanding the effect of a firm's marketing on its customers, improve inference about the total number of customers in the dataset, and provide more precise targeted marketing to both previously observed and unobserved customers.

  11. Can anonymous posters on medical forums be reidentified?

    Science.gov (United States)

    Bobicev, Victoria; Sokolova, Marina; El Emam, Khaled; Jafer, Yasser; Dewar, Brian; Jonker, Elizabeth; Matwin, Stan

    2013-10-03

    Participants in medical forums often reveal personal health information about themselves in their online postings. To feel comfortable revealing sensitive personal health information, some participants may hide their identity by posting anonymously. They can do this by using fake identities, nicknames, or pseudonyms that cannot readily be traced back to them. However, individual writing styles have unique features and it may be possible to determine the true identity of an anonymous user through author attribution analysis. Although there has been previous work on the authorship attribution problem, there has been a dearth of research on automated authorship attribution on medical forums. The focus of the paper is to demonstrate that character-based author attribution works better than word-based methods in medical forums. The goal was to build a system that accurately attributes authorship of messages posted on medical forums. The Authorship Attributor system uses text analysis techniques to crawl medical forums and automatically correlate messages written by the same authors. Authorship Attributor processes unstructured texts regardless of the document type, context, and content. The messages were labeled by nicknames of the forum participants. We evaluated the system's performance through its accuracy on 6000 messages gathered from 2 medical forums on an in vitro fertilization (IVF) support website. Given 2 lists of candidate authors (30 and 50 candidates, respectively), we obtained an F score accuracy in detecting authors of 75% to 80% on messages containing 100 to 150 words on average, and 97.9% on longer messages containing at least 300 words. Authorship can be successfully detected in short free-form messages posted on medical forums. This raises a concern about the meaningfulness of anonymous posting on such medical forums. Authorship attribution tools can be used to warn consumers wishing to post anonymously about the likelihood of their identity being

  12. Atheists, agnostics and Alcoholics Anonymous.

    Science.gov (United States)

    Tonigan, J Scott; Miller, W R; Schermer, Carol

    2002-09-01

    In spite of the strong emphasis in AA on spiritual beliefs and practices, findings are mixed about the importance of such beliefs in predicting AA affiliation. This study of the Project MATCH outpatient (N = 952) and aftercare (N = 774) samples tested three hypotheses about the role of client God belief and subsequent AA attendance and benefit, taking into account that some individuals may, in fact, deny the existence of a God. Longitudinal analyses were conducted (N = 1,526) investigating client God beliefs, AA attendance, patterns of AA attendance and alcohol use. Assessments were conducted at intake and in 3-month intervals using the Form 90, Religious Behaviors and Background, and the Alcoholics Anonymous Inventory. 12-Step treatment was significantly more likely to promote pre-post shifts in client God beliefs, and atheist and agnostic clients attended AA significantly less often throughout follow-up relative to clients self-labeled as spiritual and religious. AA attendance, however, was significantly associated with increased abstinence and reductions in drinking intensity regardless of God belief. Finally, no differences in percent days abstinence and drinking intensity were found between atheist and agnostic versus spiritual and religious clients, but clients unsure about their God belief reported significantly higher drinking frequency relative to the other groups. God belief appears to be relatively unimportant in deriving AA-related benefit, but atheist and agnostic clients are less likely to initiate and sustain AA attendance relative to spiritual and religious clients. This apparent reticence to affiliate with AA ought to be clinically recognized when encouraging AA participation.

  13. Anonymity and Electronics: Adapting Preparation for Radiology Resident Examination.

    Science.gov (United States)

    Chapman, Teresa; Reid, Janet R; O'Conner, Erin E

    2017-06-01

    Diagnostic radiology resident assessment has evolved from a traditional oral examination to computerized testing. Teaching faculty struggle to reconcile the differences between traditional teaching methods and residents' new preferences for computerized testing models generated by new examination styles. We aim to summarize the collective experiences of senior residents at three different teaching hospitals who participated in case review sessions using a computer-based, interactive, anonymous teaching tool, rather than the Socratic method. Feedback was collected from radiology residents following participation in a senior resident case review session using Nearpod, which allows residents to anonymously respond to the teaching material. Subjective resident feedback was uniformly enthusiastic. Ninety percent of residents favor a case-based board review incorporating multiple-choice questions, and 94% favor an anonymous response system. Nearpod allows for inclusion of multiple-choice questions while also providing direct feedback to the teaching faculty, helping to direct the instruction and clarify residents' gaps in knowledge before the Core Examination. Copyright © 2017 The Association of University Radiologists. Published by Elsevier Inc. All rights reserved.

  14. Browsing the Internet: good-bye anonymity!

    CERN Multimedia

    Computer Security Team

    2012-01-01

    Do you consider browsing the Internet to be your private business? When visiting random web-sites, how far do you assume you are anonymous? Would it matter to you that Google or Facebook can profile your browsing behaviour in order to better target you with advertisements? Did you notice that you already get targeted ads when you are logged on to Google or Facebook even if you are visiting completely different websites? If matters to you, note that browsing anonymously on the Internet is far from easy.   When you are connected to the Internet, you give away a variety of information: your PC’s IP address, some browser settings like language or screen size, and, probably, your login information. So how private is private? You might argue that your current IP address has been picked from a pool of addresses and therefore regularly changes, so it does not necessarily always pinpoint you. On the other hand, with the dawn of IPv6 there is no need any more for shared IP addresses as the...

  15. Anonymous Web Browsing and Hosting

    OpenAIRE

    MANOJ KUMAR; ANUJ RANI

    2013-01-01

    In today’s high tech environment every organization, individual computer users use internet for accessing web data. To maintain high confidentiality and security of the data secure web solutions are required. In this paper we described dedicated anonymous web browsing solutions which makes our browsing faster and secure. Web application which play important role for transferring our secret information including like email need more and more security concerns. This paper also describes that ho...

  16. HOP: Achieving Efficient Anonymity in MANETs by Combining HIP, OLSR, and Pseudonyms

    Directory of Open Access Journals (Sweden)

    Campos Javier

    2011-01-01

    Full Text Available Offering secure and anonymous communications in mobile ad hoc networking environments is essential to achieve confidence and privacy, thus promoting widespread adoption of this kind of networks. In addition, some minimum performance levels must be achieved for any solution to be practical and become widely adopted. In this paper, we propose and implement HOP, a novel solution based on cryptographic Host Identity Protocol (HIP that offers security and user-level anonymity in MANET environments while maintaining good performance levels. In particular, we introduce enhancements to the authentication process to achieve Host Identity Tag (HIT relationship anonymity, along with source/destination HIT anonymity when combined with multihoming. Afterward we detail how we integrate our improved version of HIP with the OLSR routing protocol to achieve efficient support for pseudonyms. We implemented our proposal in an experimental testbed, and the results obtained show that performance levels achieved are quite good, and that the integration with OLSR is achieved with a low overhead.

  17. Fieldale-Collinsville Middle School: Banishing Anonymity

    Science.gov (United States)

    Principal Leadership, 2010

    2010-01-01

    It is no accident that the staff at Fieldale-Collinsville Middle School adopted a central tenet of "Breaking Ranks in the Middle"--to banish anonymity by creating a personalized learning environment for all of its students. The school was created six years ago when the four middle schools in Henry County, VA, were consolidated into two…

  18. Social Media and Higher Education: The Problem of Anonymous Electronic Threats to the Campus Community

    Science.gov (United States)

    Reynolds, Cristin Lee; Platt, R. Eric; Malone Schaffer, Lenore; Foster, Holly

    2017-01-01

    This case is for use in graduate courses pertaining to student affairs and higher education administration. It presents challenges higher education professionals face concerning anonymous social media, and specifically how threats made through anonymous social media platforms such as Yik Yak affect the entire university community. The anonymity of…

  19. Achieving sink node anonymity in tactical wireless sensor networks using a reactive routing protocol

    Science.gov (United States)

    2017-06-01

    node anonymity, base station anonymity, Wireless Sensor Networks (WSN), Mobile Ad hoc Network (MANET), Lightweight Ad hoc On-Demand – Next Generation ... Generation (LOADng) reactive-routing protocol to achieve anonymity. This modified protocol prevents an attacker from identifying the sink node without...within the constraints of WSN communication protocols, specifically IEEE 802.15.4. We use and modify the Lightweight Ad hoc On-Demand – Next Generation

  20. Is cyberbullying worse than traditional bullying? Examining the differential roles of medium, publicity, and anonymity for the perceived severity of bullying.

    Science.gov (United States)

    Sticca, Fabio; Perren, Sonja

    2013-05-01

    Cyberbullying, a modern form of bullying performed using electronic forms of contact (e.g., SMS, MMS, Facebook, YouTube), has been considered as being worse than traditional bullying in its consequences for the victim. This difference was mainly attributed to some specific aspect that are believed to distinguish cyberbullying from traditional bullying: an increased potential for a large audience, an increased potential for anonymous bullying, lower levels of direct feedback, decreased time and space limits, and lower levels of supervision. The present studies investigated the relative importance of medium (traditional vs. cyber), publicity (public vs. private), and bully's anonymity (anonymous vs. not anonymous) for the perceived severity of hypothetical bullying scenarios among a sample of Swiss seventh- and eight-graders (study 1: 49% female, mean age = 13.7; study 2: 49% female, mean age = 14.2). Participants ranked a set of hypothetical bullying scenarios from the most severe one to the least severe one. The scenarios were experimentally manipulated based on the aspect of medium and publicity (study 1), and medium and anonymity (study 2). Results showed that public scenarios were perceived as worse than private ones, and that anonymous scenarios were perceived as worse than not anonymous ones. Cyber scenarios generally were perceived as worse than traditional ones, although effect sizes were found to be small. These results suggest that the role of medium is secondary to the role of publicity and anonymity when it comes to evaluating bullying severity. Therefore, cyberbullying is not a priori perceived as worse than traditional bullying. Implications of the results for cyberbullying prevention and intervention are discussed.

  1. A large-scale examination of the effectiveness of anonymous marking in reducing group performance differences in higher education assessment.

    Directory of Open Access Journals (Sweden)

    Daniel P Hinton

    Full Text Available The present research aims to more fully explore the issues of performance differences in higher education assessment, particularly in the context of a common measure taken to address them. The rationale for the study is that, while performance differences in written examinations are relatively well researched, few studies have examined the efficacy of anonymous marking in reducing these performance differences, particularly in modern student populations. By examining a large archive (N = 30674 of assessment data spanning a twelve-year period, the relationship between assessment marks and factors such as ethnic group, gender and socio-environmental background was investigated. In particular, analysis focused on the impact that the implementation of anonymous marking for assessment of written examinations and coursework has had on the magnitude of mean score differences between demographic groups of students. While group differences were found to be pervasive in higher education assessment, these differences were observed to be relatively small in practical terms. Further, it appears that the introduction of anonymous marking has had a negligible effect in reducing them. The implications of these results are discussed, focusing on two issues, firstly a defence of examinations as a fair and legitimate form of assessment in Higher Education, and, secondly, a call for the re-examination of the efficacy of anonymous marking in reducing group performance differences.

  2. A large-scale examination of the effectiveness of anonymous marking in reducing group performance differences in higher education assessment.

    Science.gov (United States)

    Hinton, Daniel P; Higson, Helen

    2017-01-01

    The present research aims to more fully explore the issues of performance differences in higher education assessment, particularly in the context of a common measure taken to address them. The rationale for the study is that, while performance differences in written examinations are relatively well researched, few studies have examined the efficacy of anonymous marking in reducing these performance differences, particularly in modern student populations. By examining a large archive (N = 30674) of assessment data spanning a twelve-year period, the relationship between assessment marks and factors such as ethnic group, gender and socio-environmental background was investigated. In particular, analysis focused on the impact that the implementation of anonymous marking for assessment of written examinations and coursework has had on the magnitude of mean score differences between demographic groups of students. While group differences were found to be pervasive in higher education assessment, these differences were observed to be relatively small in practical terms. Further, it appears that the introduction of anonymous marking has had a negligible effect in reducing them. The implications of these results are discussed, focusing on two issues, firstly a defence of examinations as a fair and legitimate form of assessment in Higher Education, and, secondly, a call for the re-examination of the efficacy of anonymous marking in reducing group performance differences.

  3. Hacktivism 1-2-3: how privacy enhancing technologies change the face of anonymous hacktivism

    Directory of Open Access Journals (Sweden)

    Balázs Bodó

    2014-11-01

    Full Text Available This short essay explores how the notion of hacktivism changes due to easily accessible, military grade Privacy Enhancing Technologies (PETs. Privacy Enhancing Technologies, technological tools which provide anonymous communications and protect users from online surveillance enable new forms of online political activism. Through the short summary of the ad-hoc vigilante group Anonymous, this article describes hacktivism 1.0 as electronic civil disobedience conducted by outsiders. Through the analysis of Wikileaks, the anonymous whistleblowing website, it describes how strong PETs enable the development of hacktivism 2.0, where the source of threat is shifted from outsiders to insiders. Insiders have access to documents with which power can be exposed, and who, by using PETs, can anonymously engage in political action. We also describe the emergence of a third generation of hacktivists who use PETs to disengage and create their own autonomous spaces rather than to engage with power through anonymous whistleblowing.

  4. Botnet detection and prevention in anonymous networks

    NARCIS (Netherlands)

    Kuhnert, Katharina; Steinberger, Jessica; Baier, Harald

    Botnets are a major threat to the Internet landscape and have been responsible for large scale distributed attacks on online services. To make take down measures more difficult, Botnet operators started to incorporate anonymous networks into their software to protect their users and their Botnets.

  5. Simplifying Itai-Rodeh leaderelection for anonymous rings

    NARCIS (Netherlands)

    W.J. Fokkink (Wan); J. Pang

    2004-01-01

    textabstractWe present two probabilistic leader election algorithms for anonymous unidirectional rings with FIFO channels, based on an algorithm from Itai and Rodeh. In contrast to the Itai-Rodeh algorithm, our algorithms are finite-state. So they can be analyzed using explicit state space

  6. Between control and hacker activism: the political actions of Anonymous Brasil.

    Science.gov (United States)

    Machado, Murilo Bansi

    2015-12-01

    This paper addresses the political actions of Anonymous, the principal expression of current hacker activism, arguing that hacktivism is a form of political resistance in control societies. To this end, it focuses on studying the Brazilian, hacktivist facet of the collective. In order to stress its political character, it scrutinizes the principal expressions of hacking in the literature. It describes motivations, methods and the ethics of its political actions, based on a comparative analysis of two operations carried out by Brazilian Anonymous adherents in 2012: #OpWeeksPayment and #OpGlobo. And it finishes by identifying four of its main forms of political engagement: promotion of anonymity; "evangelization;" the formation of distributed networks; and the fact that the collective carries out and facilitates several types of political actions.

  7. Thrombospondin1 deficiency reduces obesity-associated inflammation and improves insulin sensitivity in a diet-induced obese mouse model.

    Directory of Open Access Journals (Sweden)

    Yanzhang Li

    Full Text Available Obesity is prevalent worldwide and is associated with insulin resistance. Advanced studies suggest that obesity-associated low-grade chronic inflammation contributes to the development of insulin resistance and other metabolic complications. Thrombospondin 1 (TSP1 is a multifunctional extracellular matrix protein that is up-regulated in inflamed adipose tissue. A recent study suggests a positive correlation of TSP1 with obesity, adipose inflammation, and insulin resistance. However, the direct effect of TSP1 on obesity and insulin resistance is not known. Therefore, we investigated the role of TSP1 in mediating obesity-associated inflammation and insulin resistance by using TSP1 knockout mice.Male TSP1-/- mice and wild type littermate controls were fed a low-fat (LF or a high-fat (HF diet for 16 weeks. Throughout the study, body weight and fat mass increased similarly between the TSP1-/- mice and WT mice under HF feeding conditions, suggesting that TSP1 deficiency does not affect the development of obesity. However, obese TSP1-/- mice had improved glucose tolerance and increased insulin sensitivity compared to the obese wild type mice. Macrophage accumulation and inflammatory cytokine expression in adipose tissue were reduced in obese TSP1-/- mice. Consistent with the local decrease in pro-inflammatory cytokine levels, systemic inflammation was also decreased in the obese TSP1-/- mice. Furthermore, in vitro data demonstrated that TSP1 deficient macrophages had decreased mobility and a reduced inflammatory phenotype.TSP1 deficiency did not affect the development of high-fat diet induced obesity. However, TSP1 deficiency reduced macrophage accumulation in adipose tissue and protected against obesity related inflammation and insulin resistance. Our data demonstrate that TSP1 may play an important role in regulating macrophage function and mediating obesity-induced inflammation and insulin resistance. These data suggest that TSP1 may serve as a

  8. All or Nothing: The False Promise of Anonymity

    Directory of Open Access Journals (Sweden)

    Neil Walker

    2017-05-01

    Full Text Available In early 2016, the International Committee of Medical Journal Editors (ICMJE proposed that responsible sharing of de-identified individual-level data be required for clinical trials published in their affiliated journals. There would be a delay in implementing this policy to allow for the necessary informed consents to work their way through ethical review. Meanwhile, some researchers and policy makers have conflated the notions of de-identification and anonymity. The former is a process that seeks to mitigate disclosure risk though careful application of rules and statistical analysis, while the latter is an absolute state. The consequence of confusing the process and the state is profound. Extensions to the ICMJE proposal based on the presumed anonymity of data include: sharing unconsented data; sharing data without managing access, as Open Data; and proposals to sell data. This essay aims to show that anonymity (the state cannot be guaranteed by de-identification (the process, and so these extensions to the ICMJE proposal should be rejected on governance grounds, if no other. This is not as negative a position as it might seem, as other disciplines have been aware of these limitations and concomitant responsibilities for many years. The essay concludes with an example from social science of managed access strategies that could be adopted by the medical field.

  9. Enhancing physicians' use of Alcoholics Anonymous: Internet-based training.

    Science.gov (United States)

    Sellers, Brealyn; Galanter, Marc; Dermatis, Helen; Nachbar, Martin

    2005-01-01

    Alcoholics Anonymous is not yet fully employed by the medical community as a means to enhance patient outcome. The purpose of this study was to evaluate visitors' use of an Internet course on Alcoholics Anonymous, and to compare how various disciplines learned about, gained access to and participated in the course. Demographic information was collected from 414 visitors to the course. 64% of the 414 respondents received their last educational degree within the last 10 years, and had an interest in the topic of addiction prior to their accessing the site. 294 (71%) of those who accessed the course completed it, and those who accessed it learned about it from various sources other than print advertisement in professional journals. Within the 230 physician respondents, 143 (62%) were psychiatrists, 82 (78%) of whom learned about the Internet course via professional journal. Given the need for further training among physicians in the use of Alcoholics Anonymous, the Internet can be utilized to make information available to a large number of people. Because it allows the user to access information outside the traditional means, the barriers to its use are minimal, and it has the potential to effectively convey useful clinical information.

  10. Interim policy on establishment and operation of internet open, anonymous information servers and services

    OpenAIRE

    Acting Dean of Computer and Information Services

    1995-01-01

    Purpose. To establish interim NPS general policy regarding establishment and operation of Open, Anonymous Information Servers and Services, such as World Wide Web (http), Gopher, Anonymous FTP, etc...

  11. Authority and Hierarchy within Anonymous Internet Relay Chat Networks

    Directory of Open Access Journals (Sweden)

    Stewart Kenton Bertram

    2015-09-01

    Full Text Available 'The protest group Anonymous has emerged as one of the most significant social movements of recent years, announcing their arrival as a globally recognized brand with regular disruptive cyber attacks and the leak of large volumes of sensitive data. Despite the obvious significance of Anonymous, to date, little academic research has been focused on what role hierarchy and internal authority play (if any within the group. Bespoke software was used to structure over 5000 examples of IRC log files, so that a base line descriptive statistical picture could be drawn, as well as a more granular enumeration of the privileges associated with individual users.'

  12. Yahtzee: an anonymized group level matching procedure.

    Directory of Open Access Journals (Sweden)

    Jason J Jones

    Full Text Available Researchers often face the problem of needing to protect the privacy of subjects while also needing to integrate data that contains personal information from diverse data sources. The advent of computational social science and the enormous amount of data about people that is being collected makes protecting the privacy of research subjects ever more important. However, strict privacy procedures can hinder the process of joining diverse sources of data that contain information about specific individual behaviors. In this paper we present a procedure to keep information about specific individuals from being "leaked" or shared in either direction between two sources of data without need of a trusted third party. To achieve this goal, we randomly assign individuals to anonymous groups before combining the anonymized information between the two sources of data. We refer to this method as the Yahtzee procedure, and show that it performs as predicted by theoretical analysis when we apply it to data from Facebook and public voter records.

  13. Yahtzee: an anonymized group level matching procedure.

    Science.gov (United States)

    Jones, Jason J; Bond, Robert M; Fariss, Christopher J; Settle, Jaime E; Kramer, Adam D I; Marlow, Cameron; Fowler, James H

    2013-01-01

    Researchers often face the problem of needing to protect the privacy of subjects while also needing to integrate data that contains personal information from diverse data sources. The advent of computational social science and the enormous amount of data about people that is being collected makes protecting the privacy of research subjects ever more important. However, strict privacy procedures can hinder the process of joining diverse sources of data that contain information about specific individual behaviors. In this paper we present a procedure to keep information about specific individuals from being "leaked" or shared in either direction between two sources of data without need of a trusted third party. To achieve this goal, we randomly assign individuals to anonymous groups before combining the anonymized information between the two sources of data. We refer to this method as the Yahtzee procedure, and show that it performs as predicted by theoretical analysis when we apply it to data from Facebook and public voter records.

  14. The Role of Structural Extracellular Matrix Proteins in Urothelial Bladder Cancer

    Directory of Open Access Journals (Sweden)

    Andrea Brunner

    2007-01-01

    Full Text Available The extracellular matrix (ECM plays a key role in the modulation of cancer cell invasion. In urothelial carcinoma of the bladder (UC the role of ECM proteins has been widely studied. The mechanisms, which are involved in the development of invasion, progression and generalization, are complex, depending on the interaction of ECM proteins with each other as well as with cancer cells. The following review will focus on the pathogenetic role and prognostic value of structural proteins, such as laminins, collagens, fi bronectin (FN, tenascin (Tn-C and thrombospondin 1 (TSP1 in UC. In addition, the role of integrins mediating the interaction of ECM molecules and cancer cells will be addressed, since integrin-mediated FN, Tn-C and TSP1 interactions seem to play an important role during tumor cell invasion and angiogenesis.

  15. Hypothalamic Dysfunction of the Thrombospondin Receptor α2δ-1 Underlies the Overeating and Obesity Triggered by Brain-Derived Neurotrophic Factor Deficiency

    Science.gov (United States)

    Cordeira, Joshua W.; Felsted, Jennifer A.; Teillon, Sarah; Daftary, Shabrine; Panessiti, Micaella; Wirth, Jena; Sena-Esteves, Miguel

    2014-01-01

    Brain-derived neurotrophic factor (BDNF) and its receptor, TrkB, are critical components of the neural circuitry controlling appetite and body weight. Diminished BDNF signaling in mice results in severe hyperphagia and obesity. In humans, BDNF haploinsufficiency and the functional Bdnf Val66Met polymorphism have been linked to elevated food intake and body weight. The mechanisms underlying this dysfunction are poorly defined. We demonstrate a chief role of α2δ-1, a calcium channel subunit and thrombospondin receptor, in triggering overeating in mice with central BDNF depletion. We show reduced α2δ-1 cell-surface expression in the BDNF mutant ventromedial hypothalamus (VMH), an energy balance-regulating center. This deficit contributes to the hyperphagia exhibited by BDNF mutant mice because selective inhibition of α2δ-1 by gabapentin infusion into wild-type VMH significantly increases feeding and body weight gain. Importantly, viral-mediated α2δ-1 rescue in BDNF mutant VMH significantly mitigates their hyperphagia, obesity, and liver steatosis and normalizes deficits in glucose homeostasis. Whole-cell recordings in BDNF mutant VMH neurons revealed normal calcium currents but reduced frequency of EPSCs. These results suggest calcium channel-independent effects of α2δ-1 on feeding and implicate α2δ-1–thrombospondin interactions known to facilitate excitatory synapse assembly. Our findings identify a central mechanism mediating the inhibitory effects of BDNF on feeding. They also demonstrate a novel and critical role for α2δ-1 in appetite control and suggest a mechanism underlying weight gain in humans treated with gabapentinoid drugs. PMID:24403154

  16. Thrombospondins deployed by thrombopoietic cells determine angiogenic switch and extent of revascularization

    Science.gov (United States)

    Kopp, Hans-Georg; Hooper, Andrea T.; Broekman, M. Johan; Avecilla, Scott T.; Petit, Isabelle; Luo, Min; Milde, Till; Ramos, Carlos A.; Zhang, Fan; Kopp, Tabitha; Bornstein, Paul; Jin, David K.; Marcus, Aaron J.; Rafii, Shahin

    2006-01-01

    Thrombopoietic cells may differentially promote or inhibit tissue vascularization by releasing both pro- and antiangiogenic factors. However, the molecular determinants controlling the angiogenic phenotype of thrombopoietic cells remain unknown. Here, we show that expression and release of thrombospondins (TSPs) by megakaryocytes and platelets function as a major antiangiogenic switch. TSPs inhibited thrombopoiesis, diminished bone marrow microvascular reconstruction following myelosuppression, and limited the extent of revascularization in a model of hind limb ischemia. We demonstrate that thrombopoietic recovery following myelosuppression was significantly enhanced in mice deficient in both TSP1 and TSP2 (TSP-DKO mice) in comparison with WT mice. Megakaryocyte and platelet levels in TSP-DKO mice were rapidly restored, thereby accelerating revascularization of myelosuppressed bone marrow and ischemic hind limbs. In addition, thrombopoietic cells derived from TSP-DKO mice were more effective in supporting neoangiogenesis in Matrigel plugs. The proangiogenic activity of TSP-DKO thrombopoietic cells was mediated through activation of MMP-9 and enhanced release of stromal cell–derived factor 1. Thus, TSP-deficient thrombopoietic cells function as proangiogenic agents, accelerating hemangiogenesis within the marrow and revascularization of ischemic hind limbs. As such, interference with the release of cellular stores of TSPs may be clinically effective in augmenting neoangiogenesis. PMID:17143334

  17. A Lightweight Anonymous Authentication Protocol with Perfect Forward Secrecy for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ling Xiong

    2017-11-01

    Full Text Available Due to their frequent use in unattended and hostile deployment environments, the security in wireless sensor networks (WSNs has attracted much interest in the past two decades. However, it remains a challenge to design a lightweight authentication protocol for WSNs because the designers are confronted with a series of desirable security requirements, e.g., user anonymity, perfect forward secrecy, resistance to de-synchronization attack. Recently, the authors presented two authentication schemes that attempt to provide user anonymity and to resist various known attacks. Unfortunately, in this work we shall show that user anonymity of the two schemes is achieved at the price of an impractical search operation—the gateway node may search for every possible value. Besides this defect, they are also prone to smart card loss attacks and have no provision for perfect forward secrecy. As our main contribution, a lightweight anonymous authentication scheme with perfect forward secrecy is designed, and what we believe the most interesting feature is that user anonymity, perfect forward secrecy, and resistance to de-synchronization attack can be achieved at the same time. As far as we know, it is extremely difficult to meet these security features simultaneously only using the lightweight operations, such as symmetric encryption/decryption and hash functions.

  18. A Lightweight Anonymous Authentication Protocol with Perfect Forward Secrecy for Wireless Sensor Networks.

    Science.gov (United States)

    Xiong, Ling; Peng, Daiyuan; Peng, Tu; Liang, Hongbin; Liu, Zhicai

    2017-11-21

    Due to their frequent use in unattended and hostile deployment environments, the security in wireless sensor networks (WSNs) has attracted much interest in the past two decades. However, it remains a challenge to design a lightweight authentication protocol for WSNs because the designers are confronted with a series of desirable security requirements, e.g., user anonymity, perfect forward secrecy, resistance to de-synchronization attack. Recently, the authors presented two authentication schemes that attempt to provide user anonymity and to resist various known attacks. Unfortunately, in this work we shall show that user anonymity of the two schemes is achieved at the price of an impractical search operation-the gateway node may search for every possible value. Besides this defect, they are also prone to smart card loss attacks and have no provision for perfect forward secrecy. As our main contribution, a lightweight anonymous authentication scheme with perfect forward secrecy is designed, and what we believe the most interesting feature is that user anonymity, perfect forward secrecy, and resistance to de-synchronization attack can be achieved at the same time. As far as we know, it is extremely difficult to meet these security features simultaneously only using the lightweight operations, such as symmetric encryption/decryption and hash functions.

  19. "People Are Either Too Fake or Too Real": Opportunities and Challenges in Tie-Based Anonymity

    DEFF Research Database (Denmark)

    Ma, Xiao; Andabili, Nazanin; Barkhuus, Louise

    2017-01-01

    In recent years, several mobile applications allowed individuals to anonymously share information with friends and contacts, without any persistent identity marker. The functions of these “tie-based” anonymity services may be notably different than other social media services. We use semi-structu...... disclosure needs and social probing. Still, challenges for making such applications successful, for example the prevalence of negativity and bullying, are substantial.......In recent years, several mobile applications allowed individuals to anonymously share information with friends and contacts, without any persistent identity marker. The functions of these “tie-based” anonymity services may be notably different than other social media services. We use semi...

  20. Anonymizing patient genomic data for public sharing association studies.

    Science.gov (United States)

    Fernandez-Lozano, Carlos; Lopez-Campos, Guillermo; Seoane, Jose A; Lopez-Alonso, Victoria; Dorado, Julian; Martín-Sanchez, Fernando; Pazos, Alejandro

    2013-01-01

    The development of personalized medicine is tightly linked with the correct exploitation of molecular data, especially those associated with the genome sequence along with these use of genomic data there is an increasing demand to share these data for research purposes. Transition of clinical data to research is based in the anonymization of these data so the patient cannot be identified, the use of genomic data poses a great challenge because its nature of identifying data. In this work we have analyzed current methods for genome anonymization and propose a one way encryption method that may enable the process of genomic data sharing accessing only to certain regions of genomes for research purposes.

  1. The influence of anonymous peers on prosocial behavior.

    Directory of Open Access Journals (Sweden)

    Soowon Park

    Full Text Available Peer influence on students' maladaptive behaviors has been well documented; however, the influence on positive development is less acknowledged.The purpose of this study was to examine anonymous peer influence on college students' prosocial behavior, specifically behavior for the improvement of society (i.e., donating money or participating in social campaigns via an experimental approach. The effects of indirect peer influence (IP and direct peer influence (DP on college students' prosocial behavior were examined.A total of 125 college students participated in an online survey and laboratory experiment. Self-reported helping behavior, social concern goals, and empathy were measured by the online survey. In the laboratory experiments, reading of a prosocial paragraph (IP and confederates' prosocial behavior (DP were manipulated. Participation in a signature campaign and money donation for illness were observed. Furthermore, 19 participants among those who donated were asked about their reasons for participating in such prosocial behavior.Prosocial behavior of anonymous peers (confederates exerts a profound influence on college students' participation in a signature campaign and money donation, whereas the reading of a prosocial paragraph has no effect. Furthermore, no participants reported peer influence as a reason for engaging in prosocial behavior.This finding supports and extends recent research examining the positive impacts of anonymous peers on prosocial behavior. Prosocial behavior is not only a foundational and consistent aspect of personality, as previous studies report, but is also highly malleable and unstable in response to immediate situations.

  2. The influence of anonymous peers on prosocial behavior

    Science.gov (United States)

    Shin, Jongho

    2017-01-01

    Background Peer influence on students’ maladaptive behaviors has been well documented; however, the influence on positive development is less acknowledged. Purpose The purpose of this study was to examine anonymous peer influence on college students’ prosocial behavior, specifically behavior for the improvement of society (i.e., donating money or participating in social campaigns) via an experimental approach. The effects of indirect peer influence (IP) and direct peer influence (DP) on college students’ prosocial behavior were examined. Methods A total of 125 college students participated in an online survey and laboratory experiment. Self-reported helping behavior, social concern goals, and empathy were measured by the online survey. In the laboratory experiments, reading of a prosocial paragraph (IP) and confederates’ prosocial behavior (DP) were manipulated. Participation in a signature campaign and money donation for illness were observed. Furthermore, 19 participants among those who donated were asked about their reasons for participating in such prosocial behavior. Results Prosocial behavior of anonymous peers (confederates) exerts a profound influence on college students’ participation in a signature campaign and money donation, whereas the reading of a prosocial paragraph has no effect. Furthermore, no participants reported peer influence as a reason for engaging in prosocial behavior. Conclusion This finding supports and extends recent research examining the positive impacts of anonymous peers on prosocial behavior. Prosocial behavior is not only a foundational and consistent aspect of personality, as previous studies report, but is also highly malleable and unstable in response to immediate situations. PMID:29016612

  3. Utility-preserving transaction data anonymization with low information loss.

    Science.gov (United States)

    Loukides, Grigorios; Gkoulalas-Divanis, Aris

    2012-08-01

    Transaction data record various information about individuals, including their purchases and diagnoses, and are increasingly published to support large-scale and low-cost studies in domains such as marketing and medicine. However, the dissemination of transaction data may lead to privacy breaches, as it allows an attacker to link an individual's record to their identity. Approaches that anonymize data by eliminating certain values in an individual's record or by replacing them with more general values have been proposed recently, but they often produce data of limited usefulness. This is because these approaches adopt value transformation strategies that do not guarantee data utility in intended applications and objective measures that may lead to excessive data distortion. In this paper, we propose a novel approach for anonymizing data in a way that satisfies data publishers' utility requirements and incurs low information loss. To achieve this, we introduce an accurate information loss measure and an effective anonymization algorithm that explores a large part of the problem space. An extensive experimental study, using click-stream and medical data, demonstrates that our approach permits many times more accurate query answering than the state-of-the-art methods, while it is comparable to them in terms of efficiency.

  4. k-Degree Anonymity Model for Social Network Data Publishing

    Directory of Open Access Journals (Sweden)

    MACWAN, K. R.

    2017-11-01

    Full Text Available Publicly accessible platform for social networking has gained special attraction because of its easy data sharing. Data generated on such social network is analyzed for various activities like marketing, social psychology, etc. This requires preservation of sensitive attributes before it becomes easily accessible. Simply removing the personal identities of the users before publishing data is not enough to maintain the privacy of the individuals. The structure of the social network data itself reveals much information regarding its users and their connections. To resolve this problem, k-degree anonymous method is adopted. It emphasizes on the modification of the graph to provide at least k number of nodes that contain the same degree. However, this approach is not efficient on a huge amount of social data and the modification of the original data fails to maintain data usefulness. In addition to this, the current anonymization approaches focus on a degree sequence-based graph model which leads to major modification of the graph topological properties. In this paper, we have proposed an improved k-degree anonymity model that retain the social network structural properties and also to provide privacy to the individuals. Utility measurement approach for community based graph model is used to verify the performance of the proposed technique.

  5. Montreal Accord on Patient-Reported Outcomes (PROs) use series - Paper 9: anonymization and ethics considerations for capturing and sharing patient reported outcomes.

    Science.gov (United States)

    Arbuckle, Luk; Moher, Ester; Bartlett, Susan J; Ahmed, Sara; El Emam, Khaled

    2017-09-01

    Patient-reported outcomes (PROs) are collected with consent for care; however, using the data for any other purpose requires consent for that additional purpose, or the anonymization of the data. Collecting explicit consent to use this data for secondary purposes, before the patient completes a PRO, can also bias the responses. We consider the ethical and security issues related to the collection of data at the point of care or in the population and the aggregation and integration of PRO data with administrative databases to facilitate decision making and comparative effectiveness research. In this article, we describe risk-based anonymization, taking the context of the data release into account, so that we may consider the degree by which the release is considered anonymized. We also consider the ethical use of anonymized data, the anonymization of free-form text, and the secure linking data sets without sharing any personal information. Many good standards and best practices exist for the sharing of health data and could be used as a baseline in the development of a national PRO initiative. Copyright © 2017 Elsevier Inc. All rights reserved.

  6. To Speak or Not to Speak: Developing Legal Standards for Anonymous Speech on the Internet

    Directory of Open Access Journals (Sweden)

    Tomas A. Lipinski

    2002-01-01

    Full Text Available This paper explores recent developments in the regulation of Internet speech, in specific, injurious or defamatory speech and the impact such speech has on the rights of anonymous speakers to remain anonymous as opposed to having their identity revealed to plaintiffs or other third parties. The paper proceeds in four sections.  First, a brief history of the legal attempts to regulate defamatory Internet speech in the United States is presented. As discussed below this regulation has altered the traditional legal paradigm of responsibility and as a result creates potential problems for the future of anonymous speech on the Internet.  As a result plaintiffs are no longer pursuing litigation against service providers but taking their dispute directly to the anonymous speaker. Second, several cases have arisen in the United States where plaintiffs have requested that the identity of an anonymous Internet speaker be revealed.  These cases are surveyed.  Third, the cases are analyzed in order to determine the factors that courts require to be present before the identity of an anonymous speaker will be revealed.  The release is typically accomplished by the enforcement of a discovery subpoena instigated by the party seeking the identity of the anonymous speaker. The factors courts have used are as follows: jurisdiction, good faith (both internal and external, necessity (basic and sometimes absolute, and at times proprietary interest. Finally, these factors are applied in three scenarios--e-commerce, education, and employment--to guide institutions when adopting policies that regulate when the identity of an anonymous speaker--a customer, a student or an employee--would be released as part of an internal initiative, but would nonetheless be consistent with developing legal standards.

  7. A Novel Mobile Communications Authentication Scheme with Roaming Service and User Anonymity

    Directory of Open Access Journals (Sweden)

    Kai Chain

    2016-11-01

    Full Text Available Many novel, effective, and efficient applications and networking services are being developed for the Social Internet of Things. Recently, Li proposed a more secure and efficient authentication scheme with roaming service and user anonymity for mobile communications. The security analysis and discussion of the agreement phase is sufficiently safe; however, an attacker can intercept the identity of a mobile user’s home agent in the authentication phase. By using this information, the attacker can mount distributed denial-of-service attacks in the roaming phase through replay attacks targeting the network’s foreign agent and mobile user’s home agent by using their corresponding session keys. Li’s method also has some shortcomings regarding anonymity that we aim to address. To overcome these issues, this study proposes an elliptic curve–based wireless roaming anonymous login method for the authentication phase. The problems faced in the roaming phase are resolved, and this approach provides balanced session key computation between senders and receivers. Burrows-Abadi-Needham logic (BAN-logic is used to verify the security of the proposed scheme. The proposed scheme affords good security, efficiency, and integrity and maintains anonymity.

  8. Phylogenomic analysis of vertebrate thrombospondins reveals fish-specific paralogues, ancestral gene relationships and a tetrapod innovation

    Directory of Open Access Journals (Sweden)

    Adams Josephine C

    2006-04-01

    Full Text Available Abstract Background Thrombospondins (TSPs are evolutionarily-conserved, extracellular, calcium-binding glycoproteins with important roles in cell-extracellular matrix interactions, angiogenesis, synaptogenesis and connective tissue organisation. Five TSPs, designated TSP-1 through TSP-5, are encoded in the human genome. All but one have known roles in acquired or inherited human diseases. To further understand the roles of TSPs in human physiology and pathology, it would be advantageous to extend the repertoire of relevant vertebrate models. In general the zebrafish is proving an excellent model organism for vertebrate biology, therefore we set out to evaluate the status of TSPs in zebrafish and two species of pufferfish. Results We identified by bioinformatics that three fish species encode larger numbers of TSPs than vertebrates, yet all these sequences group as homologues of TSP-1 to -4. By phylogenomic analysis of neighboring genes, we uncovered that, in fish, a TSP-4-like sequence is encoded from the gene corresponding to the tetrapod TSP-5 gene. Thus, all TSP genes show conservation of synteny between fish and tetrapods. In the human genome, the TSP-1, TSP-3, TSP-4 and TSP-5 genes lie within paralogous regions that provide insight into the ancestral genomic context of vertebrate TSPs. Conclusion A new model for TSP evolution in vertebrates is presented. The TSP-5 protein sequence has evolved rapidly from a TSP-4-like sequence as an innovation in the tetrapod lineage. TSP biology in fish is complicated by the presence of additional lineage- and species-specific TSP paralogues. These novel results give deeper insight into the evolution of TSPs in vertebrates and open new directions for understanding the physiological and pathological roles of TSP-4 and TSP-5 in humans.

  9. Anonymous Communication Policies for the Internet: Results and Recommendations of the AAAS Conference.

    Science.gov (United States)

    Teich, Al; Frankel, Mark S.; Kling, Rob; Lee, Yaching

    1999-01-01

    Reports the results of a conference on the Internet and anonymous communication organized by the American Association for the Advancement of Science (AAAS). Discusses how anonymous communications can be shaped by the law, education, and public awareness, and highlights the importance of involving all affected interests in policy development.…

  10. Detection of avian malaria (Plasmodium spp.) in native land birds of American Samoa

    Science.gov (United States)

    Jarvi, S.I.; Farias, M.E.M.; Baker, H.; Freifeld, H.B.; Baker, P.E.; Van Gelder, E.; Massey, J.G.; Atkinson, C.T.

    2003-01-01

    This study documents the presence of Plasmodium spp. in landbirds of central Polynesia. Blood samples collected from eight native and introduced species from the island of Tutuila, American Samoa were evaluated for the presence of Plasmodium spp. by nested rDNA PCR, serology and/or microscopy. A total of 111/188 birds (59%) screened by nested PCR were positive. Detection of Plasmodium spp. was verified by nucleotide sequence comparisons of partial 18S ribosomal RNA and TRAP (thrombospondin-related anonymous protein) genes using phylogenetic analyses. All samples screened by immunoblot to detect antibodies that cross-react with Hawaiian isolates of Plasmodium relictum (153) were negative. Lack of cross-reactivity is probably due to antigenic differences between the Hawaiian and Samoan Plasmodium isolates. Similarly, all samples examined by microscopy (214) were negative. The fact that malaria is present, but not detectable by blood smear evaluation is consistent with low peripheral parasitemia characteristic of chronic infections. High prevalence of apparently chronic infections, the relative stability of the native land bird communities, and the presence of mosquito vectors which are considered endemic and capable of transmitting avian Plasmodia, suggest that these parasites are indigenous to Samoa and have a long coevolutionary history with their hosts.

  11. Facebook’s Ugly Sisters: Anonymity and Abuse on Formspring and Ask.fm

    OpenAIRE

    Binns, Amy

    2013-01-01

    New question and answer websites Ask.fm and Formspring have brought highly specific and personal abuse to a new level amongst young people by providing easy anonymity to users within a circle of offline friendship groups culled from Facebook. Relatively unknown due to their unattractiveness to adults, these sites are growing rapidly and have already been associated with at least eight suicides amongst teenagers. \\ud \\ud Media educators at school level encouraging self-awareness of social medi...

  12. Kaempferol targets estrogen-related receptor α and suppresses the angiogenesis of human retinal endothelial cells under high glucose conditions.

    Science.gov (United States)

    Wu, Yan; Zhang, Qinmei; Zhang, Rui

    2017-12-01

    Diabetic retinopathy (DR) is the most common complication of diabetes and a major cause of new-onset blindness in the developed world. The present study aimed to examine the effect of kaempferol on high glucose-induced human retinal endothelial cells (HRECs) in vitro . The expression levels of various mRNAs and proteins were measured by reverse transcription-quantitative polymerase chain reaction (RT-qPCR) and western blotting, respectively. The target of kaempferol was determined using a luciferase reporter assay. In addition, HREC proliferation, migration and cell sprouting were determined using Cell Counting kit-8, wound scratch and tube formation assays, respectively. RT-qPCR and western blotting results showed that treatment with 30 mM glucose for 12, 24 and 48 h increased the expression level of estrogen-related receptor α (ERRα) mRNA and protein. The luciferase reporter assay demonstrated that kaempferol inhibited ERRα activity in HRECs. Compared with 5 mM normal glucose treatment, high (30 mM) glucose significantly promoted the proliferation, migration and tube formation of HRECs, which was antagonized by 10 and 30 µM kaempferol in a dose-dependent manner. Treatment with 30 mM glucose also increased the expression of vascular endothelial growth factor (VEGF) mRNA and protein, and the expression levels of VEGF mRNA and protein were suppressed by kaempferol (10 and 30 µM). Kaempferol (30 µM) treatment also increased the expression levels of thrombospondin 1 (TSP-1) and a disintegrin and metalloproteinase with thrombospondin motifs 1 (ADAMTS-1) mRNA; however, TSP-1 and ADAMTS-1 levels did not differ between high glucose and normal (5 mM) glucose conditions. The results of this study suggest that kaempferol targets ERRα and suppresses the angiogenesis of HRECs under high glucose conditions. Kaempferol may be a potential drug for use in controlling the progression of DR; however, in vivo studies are required to evaluate its efficacy and safety.

  13. (a,k)-Anonymous Scheme for Privacy-Preserving Data Collection in IoT-based Healthcare Services Systems.

    Science.gov (United States)

    Li, Hongtao; Guo, Feng; Zhang, Wenyin; Wang, Jie; Xing, Jinsheng

    2018-02-14

    The widely use of IoT technologies in healthcare services has pushed forward medical intelligence level of services. However, it also brings potential privacy threat to the data collection. In healthcare services system, health and medical data that contains privacy information are often transmitted among networks, and such privacy information should be protected. Therefore, there is a need for privacy-preserving data collection (PPDC) scheme to protect clients (patients) data. We adopt (a,k)-anonymity model as privacy pretection scheme for data collection, and propose a novel anonymity-based PPDC method for healthcare services in this paper. The threat model is analyzed in the client-server-to-user (CS2U) model. On client-side, we utilize (a,k)-anonymity notion to generate anonymous tuples which can resist possible attack, and adopt a bottom-up clustering method to create clusters that satisfy a base privacy level of (a 1 ,k 1 )-anonymity. On server-side, we reduce the communication cost through generalization technology, and compress (a 1 ,k 1 )-anonymous data through an UPGMA-based cluster combination method to make the data meet the deeper level of privacy (a 2 ,k 2 )-anonymity (a 1  ≥ a 2 , k 2  ≥ k 1 ). Theoretical analysis and experimental results prove that our scheme is effective in privacy-preserving and data quality.

  14. AN EFFECTIVE MULTI-CLUSTERING ANONYMIZATION APPROACH USING DISCRETE COMPONENT TASK FOR NON-BINARY HIGH DIMENSIONAL DATA SPACES

    Directory of Open Access Journals (Sweden)

    L.V. Arun Shalin

    2016-01-01

    Full Text Available Clustering is a process of grouping elements together, designed in such a way that the elements assigned to similar data points in a cluster are more comparable to each other than the remaining data points in a cluster. During clustering certain difficulties related when dealing with high dimensional data are ubiquitous and abundant. Works concentrated using anonymization method for high dimensional data spaces failed to address the problem related to dimensionality reduction during the inclusion of non-binary databases. In this work we study methods for dimensionality reduction for non-binary database. By analyzing the behavior of dimensionality reduction for non-binary database, results in performance improvement with the help of tag based feature. An effective multi-clustering anonymization approach called Discrete Component Task Specific Multi-Clustering (DCTSM is presented for dimensionality reduction on non-binary database. To start with we present the analysis of attribute in the non-binary database and cluster projection identifies the sparseness degree of dimensions. Additionally with the quantum distribution on multi-cluster dimension, the solution for relevancy of attribute and redundancy on non-binary data spaces is provided resulting in performance improvement on the basis of tag based feature. Multi-clustering tag based feature reduction extracts individual features and are correspondingly replaced by the equivalent feature clusters (i.e. tag clusters. During training, the DCTSM approach uses multi-clusters instead of individual tag features and then during decoding individual features is replaced by corresponding multi-clusters. To measure the effectiveness of the method, experiments are conducted on existing anonymization method for high dimensional data spaces and compared with the DCTSM approach using Statlog German Credit Data Set. Improved tag feature extraction and minimum error rate compared to conventional anonymization

  15. Security enhanced anonymous multiserver authenticated key agreement scheme using smart cards and biometrics.

    Science.gov (United States)

    Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho

    2014-01-01

    An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme.

  16. Security Enhanced Anonymous Multiserver Authenticated Key Agreement Scheme Using Smart Cards and Biometrics

    Directory of Open Access Journals (Sweden)

    Younsung Choi

    2014-01-01

    Full Text Available An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user’s biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen’s scheme.

  17. Efficient and Anonymous Authentication Scheme for Wireless Body Area Networks.

    Science.gov (United States)

    Wu, Libing; Zhang, Yubo; Li, Li; Shen, Jian

    2016-06-01

    As a significant part of the Internet of Things (IoT), Wireless Body Area Network (WBAN) has attract much attention in this years. In WBANs, sensors placed in or around the human body collect the sensitive data of the body and transmit it through an open wireless channel in which the messages may be intercepted, modified, etc. Recently, Wang et al. presented a new anonymous authentication scheme for WBANs and claimed that their scheme can solve the security problems in the previous schemes. Unfortunately, we demonstrate that their scheme cannot withstand impersonation attack. Either an adversary or a malicious legal client could impersonate another legal client to the application provider. In this paper, we give the detailed weakness analysis of Wang et al.'s scheme at first. Then we present a novel anonymous authentication scheme for WBANs and prove that it's secure under a random oracle model. At last, we demonstrate that our presented anonymous authentication scheme for WBANs is more suitable for practical application than Wang et al.'s scheme due to better security and performance. Compared with Wang et al.'s scheme, the computation cost of our scheme in WBANs has reduced by about 31.58%.

  18. Source Anonymity in WSNs against Global Adversary Utilizing Low Transmission Rates with Delay Constraints

    Directory of Open Access Journals (Sweden)

    Anas Bushnag

    2016-06-01

    Full Text Available Wireless sensor networks (WSN are deployed for many applications such as tracking and monitoring of endangered species, military applications, etc. which require anonymity of the origin, known as Source Location Privacy (SLP. The aim in SLP is to prevent unauthorized observers from tracing the source of a real event by analyzing the traffic in the network. Previous approaches to SLP such as Fortified Anonymous Communication Protocol (FACP employ transmission of real or fake packets in every time slot, which is inefficient. To overcome this shortcoming, we developed three different techniques presented in this paper. Dummy Uniform Distribution (DUD, Dummy Adaptive Distribution (DAD and Controlled Dummy Adaptive Distribution (CAD were developed to overcome the anonymity problem against a global adversary (which has the capability of analyzing and monitoring the entire network. Most of the current techniques try to prevent the adversary from perceiving the location and time of the real event whereas our proposed techniques confuse the adversary about the existence of the real event by introducing low rate fake messages, which subsequently lead to location and time privacy. Simulation results demonstrate that the proposed techniques provide reasonable delivery ratio, delay, and overhead of a real event's packets while keeping a high level of anonymity. Three different analysis models are conducted to verify the performance of our techniques. A visualization of the simulation data is performed to confirm anonymity. Further, neural network models are developed to ensure that the introduced techniques preserve SLP. Finally, a steganography model based on probability is implemented to prove the anonymity of the techniques.

  19. Use of WhatsApp in Higher Education: What's Up with Assessing Peers Anonymously?

    Science.gov (United States)

    Güler, Çetin

    2017-01-01

    The aim of this study is to investigate the use of WhatsApp application in anonymous peer assessment in higher education. The mobile phone application WhatsApp was used as both an anonymous and nonanonymous peer assessment tool in a classroom environment. The participants of the study were the students of two classes (sophomores and juniors), half…

  20. An Enhancing Security Research of Tor Anonymous Communication to Against DDos Attacks

    OpenAIRE

    Feng Tao; Zhao Ming-Tao

    2017-01-01

    Tor (The Second Onion Router) is modified by the first generation onion router and known as the most prevalent anonymous communication system. According to the advantage of low latency, high confidentiality of transmission content, high security of communication channels and et al., Tor is widely used in anonymous Web browsing, instant message and so on. However, the vulnerability and blemish of Tor affect system security. An identity and Signcryption-based concurrent signature scheme was use...

  1. Vulnerability- and Diversity-Aware Anonymization of Personally Identifiable Information for Improving User Privacy and Utility of Publishing Data

    Science.gov (United States)

    Majeed, Abdul; Ullah, Farman; Lee, Sungchang

    2017-01-01

    Personally identifiable information (PII) affects individual privacy because PII combinations may yield unique identifications in published data. User PII such as age, race, gender, and zip code contain private information that may assist an adversary in determining the user to whom such information relates. Each item of user PII reveals identity differently, and some types of PII are highly identity vulnerable. More vulnerable types of PII enable unique identification more easily, and their presence in published data increases privacy risks. Existing privacy models treat all types of PII equally from an identity revelation point of view, and they mainly focus on hiding user PII in a crowd of other users. Ignoring the identity vulnerability of each type of PII during anonymization is not an effective method of protecting user privacy in a fine-grained manner. This paper proposes a new anonymization scheme that considers the identity vulnerability of PII to effectively protect user privacy. Data generalization is performed adaptively based on the identity vulnerability of PII as well as diversity to anonymize data. This adaptive generalization effectively enables anonymous data, which protects user identity and private information disclosures while maximizing the utility of data for performing analyses and building classification models. Additionally, the proposed scheme has low computational overheads. The simulation results show the effectiveness of the scheme and verify the aforementioned claims. PMID:28481298

  2. Vulnerability- and Diversity-Aware Anonymization of Personally Identifiable Information for Improving User Privacy and Utility of Publishing Data

    Directory of Open Access Journals (Sweden)

    Abdul Majeed

    2017-05-01

    Full Text Available Personally identifiable information (PII affects individual privacy because PII combinations may yield unique identifications in published data. User PII such as age, race, gender, and zip code contain private information that may assist an adversary in determining the user to whom such information relates. Each item of user PII reveals identity differently, and some types of PII are highly identity vulnerable. More vulnerable types of PII enable unique identification more easily, and their presence in published data increases privacy risks. Existing privacy models treat all types of PII equally from an identity revelation point of view, and they mainly focus on hiding user PII in a crowd of other users. Ignoring the identity vulnerability of each type of PII during anonymization is not an effective method of protecting user privacy in a fine-grained manner. This paper proposes a new anonymization scheme that considers the identity vulnerability of PII to effectively protect user privacy. Data generalization is performed adaptively based on the identity vulnerability of PII as well as diversity to anonymize data. This adaptive generalization effectively enables anonymous data, which protects user identity and private information disclosures while maximizing the utility of data for performing analyses and building classification models. Additionally, the proposed scheme has low computational overheads. The simulation results show the effectiveness of the scheme and verify the aforementioned claims.

  3. Anonymous electronic trading versus floor trading

    OpenAIRE

    Franke, Günter; Hess, Dieter

    1995-01-01

    This paper compares the attractiveness of floor trading and anonymous electronic trading systems. It is argued that in times of low information intensity the insight into the order book of the electronic trading system provides more valuable information than floor trading, but in times of high information intensity the reverse is true. Thus, the electronic system's market share in trading activity should decline in times of high information intensity. This hypothesis is tested by data on BUND...

  4. Factors associated with attendance in 12-step groups (Alcoholics Anonymous/Narcotics Anonymous) among adults with alcohol problems living with HIV/AIDS.

    Science.gov (United States)

    Orwat, John; Samet, Jeffrey H; Tompkins, Christopher P; Cheng, Debbie M; Dentato, Michael P; Saitz, Richard

    2011-01-15

    Despite the value of 12-step meetings, few studies have examined factors associated with attendance among those living with HIV/AIDS, such as the impact of HIV disease severity and demographics. This study examines predisposing characteristics, enabling resources and need on attendance at Alcoholic Anonymous (AA) and Narcotics Anonymous (NA) meetings among those living with HIV/AIDS and alcohol problems. Secondary analysis of prospective data from the HIV-Longitudinal Interrelationships of Viruses and Ethanol study, a cohort of 400 adults living with HIV/AIDS and alcohol problems. Factors associated with AA/NA attendance were identified using the Anderson model for vulnerable populations. Generalized estimating equation logistic regression models were fit to identify factors associated with self-reported AA/NA attendance. At study entry, subjects were 75% male, 12% met diagnostic criteria for alcohol dependence, 43% had drug dependence and 56% reported attending one or more AA/NA meetings (past 6 months). In the adjusted model, female gender negatively associated with attendance, as were social support systems that use alcohol and/or drugs, while presence of HCV antibody, drug dependence diagnosis, and homelessness associated with higher odds of attendance. Non-substance abuse related barriers to AA/NA group attendance exist for those living with HIV/AIDS, including females and social support systems that use alcohol and/or drugs. Positive associations of homelessness, HCV infection and current drug dependence were identified. These findings provide implications for policy makers and treatment professionals who wish to encourage attendance at 12-step meetings for those living with HIV/AIDS and alcohol or other substance use problems. Copyright © 2010 Elsevier Ireland Ltd. All rights reserved.

  5. Simplifying Itai-Rodeh Leader Election for Anonymous Rings

    NARCIS (Netherlands)

    Fokkink, W.J.; Pang, J.

    2005-01-01

    We present two probabilistic leader election algorithms for anonymous unidirectional rings with FIFO channels, based on an algorithm from Itai and Rodeh [A. Itai and M. Rodeh. Symmetry breaking in distributive networks. In Proc. FOCS'81, pp. 150-158. IEEE Computer Society, 1981]. In contrast to the

  6. Role of Matricellular Proteins in Disorders of the Central Nervous System.

    Science.gov (United States)

    Jayakumar, A R; Apeksha, A; Norenberg, M D

    2017-03-01

    Matricellular proteins (MCPs) are actively expressed non-structural proteins present in the extracellular matrix, which rapidly turnover and possess regulatory roles, as well as mediate cell-cell interactions. MCPs characteristically contain binding sites for other extracellular proteins, cell surface receptors, growth factors, cytokines and proteases, that provide structural support for surrounding cells. MCPs are present in most organs, including brain, and play a major role in cell-cell interactions and tissue repair. Among the MCPs found in brain include thrombospondin-1/2, secreted protein acidic and rich in cysteine family (SPARC), including Hevin/SC1, Tenascin C and CYR61/Connective Tissue Growth Factor/Nov family of proteins, glypicans, galectins, plasminogen activator inhibitor (PAI-1), autotaxin, fibulin and perisostin. This review summarizes the potential role of MCPs in the pathogenesis of major neurological disorders, including Alzheimer's disease, amyotrophic lateral sclerosis, ischemia, trauma, hepatic encephalopathy, Down's syndrome, autism, multiple sclerosis, brain neoplasms, Parkinson's disease and epilepsy. Potential therapeutic opportunities of MCP's for these disorders are also considered in this review.

  7. An Anonymous Access Authentication Scheme Based on Proxy Ring Signature for CPS-WMNs

    Directory of Open Access Journals (Sweden)

    Tianhan Gao

    2017-01-01

    Full Text Available Access security and privacy have become a bottleneck for the popularization of future Cyber-Physical System (CPS networks. Furthermore, users’ need for privacy-preserved access during movement procedure is more urgent. To address the anonymous access authentication issue for CPS Wireless Mesh Network (CPS-WMN, a novel anonymous access authentication scheme based on proxy ring signature is proposed. A hierarchical authentication architecture is presented first. The scheme is then achieved from the aspect of intergroup and intragroup anonymous mutual authentication through proxy ring signature mechanism and certificateless signature mechanism, respectively. We present a formal security proof of the proposed protocol with SVO logic. The simulation and performance analysis demonstrate that the proposed scheme owns higher efficiency and adaptability than the typical one.

  8. Verbal Venting in the Social Web: Effects of Anonymity and Group Norms on Aggressive Language Use in Online Comments

    Directory of Open Access Journals (Sweden)

    Leonie Rösner

    2016-08-01

    Full Text Available Scholars often blame the occurrence of aggressive behavior in online discussions on the anonymity of the Internet; however, even on today’s less anonymous platforms, such as social networking sites, users write plenty of aggressive comments, which can elicit a whole wave of negative remarks. Drawing on the social identity and deindividuation effects (SIDE model, this research conducts a laboratory experiment with a 2 (anonymity vs. no anonymity × 2 (aggressive norm vs. non-aggressive norm between-subjects design in order to disentangle the effects of anonymity, social group norms, and their interactions on aggressive language use in online comments. Results reveal that participants used more aggressive expressions in their comments when peer comments on a blog included aggressive wording (i.e., the social group norm was aggressive. Anonymity had no direct effect; however, we found a tendency that users’ conformity to an aggressive social norm of commenting is stronger in an anonymous environment.

  9. Thrombospondin-1 is a novel negative regulator of liver regeneration after partial hepatectomy through transforming growth factor-beta1 activation in mice.

    Science.gov (United States)

    Hayashi, Hiromitsu; Sakai, Keiko; Baba, Hideo; Sakai, Takao

    2012-05-01

    The matricellular protein, thrombospondin-1 (TSP-1), is prominently expressed during tissue repair. TSP-1 binds to matrix components, proteases, cytokines, and growth factors and activates intracellular signals through its multiple domains. TSP-1 converts latent transforming growth factor-beta1 (TGF-β1) complexes into their biologically active form. TGF-β plays significant roles in cell-cycle regulation, modulation of differentiation, and induction of apoptosis. Although TGF-β1 is a major inhibitor of proliferation in cultured hepatocytes, the functional requirement of TGF-β1 during liver regeneration remains to be defined in vivo. We generated a TSP-1-deficient mouse model of a partial hepatectomy (PH) and explored TSP-1 induction, progression of liver regeneration, and TGF-β-mediated signaling during the repair process after hepatectomy. We show here that TSP-1-mediated TGF-β1 activation plays an important role in suppressing hepatocyte proliferation. TSP-1 expression was induced in endothelial cells (ECs) as an immediate early gene in response to PH. TSP-1 deficiency resulted in significantly reduced TGF-β/Smad signaling and accelerated hepatocyte proliferation through down-regulation of p21 protein expression. TSP-1 induced in ECs by reactive oxygen species (ROS) modulated TGF-β/Smad signaling and proliferation in hepatocytes in vitro, suggesting that the immediately and transiently produced ROS in the regenerating liver were the responsible factor for TSP-1 induction. We have identified TSP-1 as an inhibitory element in regulating liver regeneration by TGF-β1 activation. Our work defines TSP-1 as a novel immediate early gene that could be a potential therapeutic target to accelerate liver regeneration. Copyright © 2011 American Association for the Study of Liver Diseases.

  10. Formal Security-Proved Mobile Anonymous Authentication Protocols with Credit-Based Chargeability and Controllable Privacy

    Directory of Open Access Journals (Sweden)

    Chun-I Fan

    2016-06-01

    Full Text Available Smart mobile phones are widely popularized and advanced mobile communication services are provided increasingly often, such that ubiquitous computing environments will soon be a reality. However, there are many security threats to mobile networks and their impact on security is more serious than that in wireline networks owing to the features of wireless transmissions and the ubiquity property. The secret information which mobile users carry may be stolen by malicious entities. To guarantee the quality of advanced services, security and privacy would be important issues when users roam within various mobile networks. In this manuscript, an anonymous authentication scheme will be proposed to protect the security of the network system and the privacy of users. Not only does the proposed scheme provide mutual authentication between each user and the system, but also each user’s identity is kept secret against anyone else, including the system. Although the system anonymously authenticates the users, it can still generate correct bills to charge these anonymous users via a credit-based solution instead of debit-based ones. Furthermore, our protocols also achieve fair privacy which allows the judge to revoke the anonymity and trace the illegal users when they have misused the anonymity property, for example, if they have committed crimes. Finally, in this paper, we also carry out complete theoretical proofs on each claimed security property.

  11. Plasminogen activator inhibitor-2 polymorphism associates with recurrent coronary event risk in patients with high HDL and C-reactive protein levels.

    Directory of Open Access Journals (Sweden)

    James P Corsetti

    Full Text Available The objective of this work was to investigate whether fibrinolysis plays a role in establishing recurrent coronary event risk in a previously identified group of postinfarction patients. This group of patients was defined as having concurrently high levels of high-density lipoprotein cholesterol (HDL-C and C-reactive protein (CRP and was previously demonstrated to be at high-risk for recurrent coronary events. Potential risk associations of a genetic polymorphism of plasminogen activator inhibitor-2 (PAI-2 were probed as well as potential modulatory effects on such risk of a polymorphism of low-density lipoprotein receptor related protein (LRP-1, a scavenger receptor known to be involved in fibrinolysis in the context of cellular internalization of plasminogen activator/plansminogen activator inhibitor complexes. To this end, Cox multivariable modeling was performed as a function of genetic polymorphisms of PAI-2 (SERPINB, rs6095 and LRP-1 (LRP1, rs1800156 as well as a set of clinical parameters, blood biomarkers, and genetic polymorphisms previously demonstrated to be significantly and independently associated with risk in the study population including cholesteryl ester transfer protein (CETP, rs708272, p22phox (CYBA, rs4673, and thrombospondin-4 (THBS4, rs1866389. Risk association was demonstrated for the reference allele of the PAI-2 polymorphism (hazard ratio 0.41 per allele, 95% CI 0.20-0.84, p=0.014 along with continued significant risk associations for the p22phox and thrombospondin-4 polymorphisms. Additionally, further analysis revealed interaction of the LRP-1 and PAI-2 polymorphisms in generating differential risk that was illustrated using Kaplan-Meier survival analysis. We conclude from the study that fibrinolysis likely plays a role in establishing recurrent coronary risk in postinfarction patients with concurrently high levels of HDL-C and CRP as manifested by differential effects on risk by polymorphisms of several genes linked

  12. An Anonymous Surveying Protocol via Greenberger-Horne-Zeilinger States

    Science.gov (United States)

    Naseri, Mosayeb; Gong, Li-Hua; Houshmand, Monireh; Matin, Laleh Farhang

    2016-10-01

    A new experimentally feasible anonymous survey protocol with authentication using Greenberger-Horne-Zeilinger (GHZ) entangled states is proposed. In this protocol, a chief executive officer (CEO) of a firm or company is trying to find out the effect of a possible action. In order to prepare a fair voting, the CEO would like to make an anonymous survey and is also interested in the total action for the whole company and he doesn't want to have a partial estimate for each department. In our proposal, there are two voters, Alice and Bob, voting on a question with a response of either "yes" or "no" and a tallyman, whose responsibility is to determine whether they have cast the same vote or not. In the proposed protocol the total response of the voters is calculated without revealing the actual votes of the voters.

  13. An Anonymous Credit Card System

    Science.gov (United States)

    Androulaki, Elli; Bellovin, Steven

    Credit cards have many important benefits; however, these same benefits often carry with them many privacy concerns. In particular, the need for users to be able to monitor their own transactions, as well as bank’s need to justify its payment requests from cardholders, entitle the latter to maintain a detailed log of all transactions its credit card customers were involved in. A bank can thus build a profile of each cardholder even without the latter’s consent. In this paper, we present a practical and accountable anonymous credit system based on ecash, with a privacy preserving mechanism for error correction and expense-reporting.

  14. Recipient screening in IVF: First data from women undergoing anonymous oocyte donation in Dublin

    Directory of Open Access Journals (Sweden)

    Salma Umme

    2011-04-01

    Full Text Available Abstract Background Guidelines for safe gamete donation have emphasised donor screening, although none exist specifically for testing oocyte recipients. Pre-treatment assessment of anonymous donor oocyte IVF treatment in Ireland must comply with the European Union Tissues and Cells Directive (Directive 2004/23/EC. To determine the effectiveness of this Directive when applied to anonymous oocyte recipients in IVF, we reviewed data derived from selected screening tests performed in this clinical setting. Methods Data from tests conducted at baseline for all women enrolling as recipients (n = 225 in the anonymous oocyte donor IVF programme at an urban IVF referral centre during a 24-month period were analysed. Patient age at programme entry and clinical pregnancy rate were also tabulated. All recipients had at least one prior negative test for HIV, Hepatitis B/C, chlamydia, gonorrhoea and syphilis performed by her GP or other primary care provider before reproductive endocrinology consultation. Results Mean (±SD age for donor egg IVF recipients was 40.7 ± 4.2 yrs. No baseline positive chlamydia, gonorrhoea or syphilis screening results were identified among recipients for anonymous oocyte donation IVF during the assessment interval. Mean pregnancy rate (per embryo transfer in this group was 50.5%. Conclusion When tests for HIV, Hepatitis B/C, chlamydia, gonorrhoea and syphilis already have been confirmed to be negative before starting the anonymous donor oocyte IVF sequence, additional (repeat testing on the recipient contributes no new clinical information that would influence treatment in this setting. Patient safety does not appear to be enhanced by application of Directive 2004/23/EC to recipients of anonymous donor oocyte IVF treatment. Given the absence of evidence to quantify risk, this practice is difficult to justify when applied to this low-risk population.

  15. Recipient screening in IVF: First data from women undergoing anonymous oocyte donation in Dublin

    LENUS (Irish Health Repository)

    Walsh, Anthony PH

    2011-04-20

    Abstract Background Guidelines for safe gamete donation have emphasised donor screening, although none exist specifically for testing oocyte recipients. Pre-treatment assessment of anonymous donor oocyte IVF treatment in Ireland must comply with the European Union Tissues and Cells Directive (Directive 2004\\/23\\/EC). To determine the effectiveness of this Directive when applied to anonymous oocyte recipients in IVF, we reviewed data derived from selected screening tests performed in this clinical setting. Methods Data from tests conducted at baseline for all women enrolling as recipients (n = 225) in the anonymous oocyte donor IVF programme at an urban IVF referral centre during a 24-month period were analysed. Patient age at programme entry and clinical pregnancy rate were also tabulated. All recipients had at least one prior negative test for HIV, Hepatitis B\\/C, chlamydia, gonorrhoea and syphilis performed by her GP or other primary care provider before reproductive endocrinology consultation. Results Mean (±SD) age for donor egg IVF recipients was 40.7 ± 4.2 yrs. No baseline positive chlamydia, gonorrhoea or syphilis screening results were identified among recipients for anonymous oocyte donation IVF during the assessment interval. Mean pregnancy rate (per embryo transfer) in this group was 50.5%. Conclusion When tests for HIV, Hepatitis B\\/C, chlamydia, gonorrhoea and syphilis already have been confirmed to be negative before starting the anonymous donor oocyte IVF sequence, additional (repeat) testing on the recipient contributes no new clinical information that would influence treatment in this setting. Patient safety does not appear to be enhanced by application of Directive 2004\\/23\\/EC to recipients of anonymous donor oocyte IVF treatment. Given the absence of evidence to quantify risk, this practice is difficult to justify when applied to this low-risk population.

  16. The Role of the Anonymous Voice in Post-Publication Peer Review Versus Traditional Peer Review

    Directory of Open Access Journals (Sweden)

    Jaime A. Teixeira da Silva

    2015-12-01

    Full Text Available Traditional peer review (TPR has several limitations and weaknesses. Post-publication peer review is one practical way to repair the ills of TPR and reinforce it. A literature that is marked by errors is unhealthy and should, if given the opportunity, be corrected or further improved. The anonymous voice is one source of critique and differs from the blind peer review in TPR in which the reviewer remains anonymous to the authors and/or vice versa, but the identity is known to the editor. If unregulated, the anonymous voice can pose a threat to established editorial norms in TPR, to one of the most important criteria of science publishing, i.e., transparency, and to worthwhile discussion. Yet, if the anonymous voice is not heard, then a vast and potentially valuable pool of untapped opinions may be lost, opinions that may provide valuable solutions to improving TPR.

  17. Visibility and anonymity effects on attraction and group cohesiveness

    NARCIS (Netherlands)

    Lea, Martin; Spears, Russell; Watt, Susan E.

    2007-01-01

    This study investigated attraction and group cohesiveness under different visibility and anonymity conditions for social categories that differed in their capacity to be visually cued. Using computer-mediated communication in 36 mixed gender (visually cued category) and nationality (non-visually

  18. Cardinality Estimation Algorithm in Large-Scale Anonymous Wireless Sensor Networks

    KAUST Repository

    Douik, Ahmed

    2017-08-30

    Consider a large-scale anonymous wireless sensor network with unknown cardinality. In such graphs, each node has no information about the network topology and only possesses a unique identifier. This paper introduces a novel distributed algorithm for cardinality estimation and topology discovery, i.e., estimating the number of node and structure of the graph, by querying a small number of nodes and performing statistical inference methods. While the cardinality estimation allows the design of more efficient coding schemes for the network, the topology discovery provides a reliable way for routing packets. The proposed algorithm is shown to produce a cardinality estimate proportional to the best linear unbiased estimator for dense graphs and specific running times. Simulation results attest the theoretical results and reveal that, for a reasonable running time, querying a small group of nodes is sufficient to perform an estimation of 95% of the whole network. Applications of this work include estimating the number of Internet of Things (IoT) sensor devices, online social users, active protein cells, etc.

  19. The Efficacy of Non-Anonymous Measures of Bullying

    Science.gov (United States)

    Chan, John H. F.; Myron, Rowan; Crawshaw, Martin

    2005-01-01

    The Olweus checklist, along with most of the questionnaires commonly used in bullying research, is anonymous. The respondent is not required to put down his/her name. This has been accepted as the "best suited" method of assessing bullying. However, this assumption has not been adequately tested, and there is contrary evidence that this…

  20. Policy-Aware Sender Anonymity in Location-Based Services

    Science.gov (United States)

    Vyas, Avinash

    2011-01-01

    Sender anonymity in Location-based services (LBS) refers to hiding the identity of a mobile device user who sends requests to the LBS provider for services in her proximity (e.g. "find the nearest gas station etc."). The goal is to keep the requester's interest private even from attackers who (via hacking or subpoenas) gain access to the LBS…

  1. Does spousal participation in Gamblers Anonymous benefit compulsive gamblers?

    Science.gov (United States)

    Johnson, E E; Nora, R M

    1992-12-01

    Extent of gambling-free periods was compared for 90 compulsive gamblers, 44 with spouses who participated in Gamblers Anonymous and 46 with spouses who did not. Although the results were in the direction of a beneficial effect of spousal participation, the relationship was statistically nonsignificant.

  2. The Risk of a Halo Bias as a Reason to Keep Students Anonymous during Grading

    Science.gov (United States)

    Malouff, John M.; Emmerton, Ashley J.; Schutte, Nicola S.

    2013-01-01

    Experts have advocated anonymous grading as a means of eliminating actual or perceived evaluator bias in subjective student assessment. The utility of anonymity in assessment rests on whether information derived from student identity can unduly influence evaluation. The halo effect provides a conceptual background for why a bias might occur. In…

  3. More than addiction: Examining the role of anonymity, endless narrative, and socialization in prolonged gaming and instant messaging practices

    Directory of Open Access Journals (Sweden)

    Kishonna Gray

    2015-06-01

    Full Text Available This ethnographic study explores a user’s prolonged engagement within virtual gaming communities. Likening prolonged engagement with addiction, this research provides an alternative perspective into virtual addiction focusing on three interrelated themes: 1 anonymity, 2 endless narrative, and 3 socialization. By employing narrative interviews and virtual observations, the researchers examine two different cultural, racial and age groups’ user experience within console and computer-based multiplayer environments. More specifically, they explore how the three factors (i.e., anonymity; endless narrative; socialization relate to the prolonged and extended use within these virtual communities and highlight the multifaceted uses of traditional chat services, social media, and the convergence of media existing within these chat communities.

  4. Analytic neutrality, anonymity, abstinence, and elective self-disclosure.

    Science.gov (United States)

    Shill, Merton A

    2004-01-01

    Recent contributions to the psychoanalytic literature propose new ways of understanding analytic neutrality, anonymity, abstinence, and self-disclosure. They advocate elective self-disclosure by the analyst as an antidote to the allegedly game-playing quality of transference and resistance analysis. The analytic relationship, they assert, becomes unreal when attempts are made to observe the principles of neutrality and abstinence. Both are seen as ill-conceived because of the irreducible subjectivity and unwarranted authority of the analyst. These relational and interactional views are criticized because (1) they ignore the fact that transference and resistance analysis have from Freud onward been accepted as minimal criteria qualifying a clinical process as psychoanalytic; (2) elective self-disclosure carries metapsychological implications dismissing not only Freud's theory of motivation but motivation as a basic feature of human personality; (3) they do not recognize interpersonal relations as mental events and so do not consider the ego's ability to create intrapsychic representations of object relations; (4) elective self-disclosures within the empathic parameters of the analytic situation are themselves unreal compared to the reality of the patient's experience with other objects. Abstinence and neutrality as ideals facilitate maintenance of an internal holding environment or container for the analyst's countertransference.

  5. ADAM and ADAMTS Family Proteins and Snake Venom Metalloproteinases: A Structural Overview

    Directory of Open Access Journals (Sweden)

    Soichi Takeda

    2016-05-01

    Full Text Available A disintegrin and metalloproteinase (ADAM family proteins constitute a major class of membrane-anchored multidomain proteinases that are responsible for the shedding of cell-surface protein ectodomains, including the latent forms of growth factors, cytokines, receptors and other molecules. Snake venom metalloproteinases (SVMPs are major components in most viper venoms. SVMPs are primarily responsible for hemorrhagic activity and may also interfere with the hemostatic system in envenomed animals. SVMPs are phylogenetically most closely related to ADAMs and, together with ADAMs and related ADAM with thrombospondin motifs (ADAMTS family proteinases, constitute adamalysins/reprolysins or the M12B clan (MEROPS database of metalloproteinases. Although the catalytic domain structure is topologically similar to that of other metalloproteinases such as matrix metalloproteinases, the M12B proteinases have a modular structure with multiple non-catalytic ancillary domains that are not found in other proteinases. Notably, crystallographic studies revealed that, in addition to the conserved metalloproteinase domain, M12B members share a hallmark cysteine-rich domain designated as the “ADAM_CR” domain. Despite their name, ADAMTSs lack disintegrin-like structures and instead comprise two ADAM_CR domains. This review highlights the current state of our knowledge on the three-dimensional structures of M12B proteinases, focusing on their unique domains that may collaboratively participate in directing these proteinases to specific substrates.

  6. Who Goes There? Staying Anonymous on the Internet

    Science.gov (United States)

    Descy, Don E.

    2009-01-01

    Privacy is a thing of the past. Monitoring is everywhere. If one is looking at this online, the author is sure that lots of information has been stored and linked to anyone about that action. Nevertheless, at least people can try to play with "their" minds and surf the web anonymously. In this article, the author discusses ways to try to hide…

  7. Parathyroid hormone-related protein blood test

    Science.gov (United States)

    ... ency/article/003691.htm Parathyroid hormone-related protein blood test To use the sharing features on this page, ... measures the level of a hormone in the blood, called parathyroid hormone-related protein. How the Test is Performed A blood sample is needed . How ...

  8. [Examination of the Young maladaptive schemes in a group of Gamblers Anonymous].

    Science.gov (United States)

    Katona, Zsuzsa; Körmendi, Attila

    2012-01-01

    Literature of gambling addiction has become widespread in last years. Many studies were written about the vulnerability factors helping the development of addiction, theoretical models, comorbid problems and therapy possibilities. Currently there is no integrated theoretical model that could explain sufficiently the development and maintenance of pathological gambling. The treatment issue is also unresolved. Cognitive psychology is a dynamically developing field of psychology and good results are achieved in gambling treatment with applying cognitive techniques. Jeffrey Young's schema-focused therapy is a recent theoretical and therapeutic direction within cognitive psychology which emphasizes the necessity of emotional changes beside rational ones in the interest of efficiency. The purpose of our research is to examine and analyse active maladaptive schemas among gamblers who are members of Gamblers Anonymous self-help group. 23 control persons and 23 gamblers associated with support group of Gamblers Anonymous took part in our research. The severity of gambling behaviour was measured by Gamblers Anonymous Twenty Questions. For exploring maladaptive schemas we used the shorter 114-item version of the Young Schema Questionnaire (YSQ-S3). All the examined gamblers were considered as problem gamblers based on Gamblers Anonymous Twenty Questions. In the control group there where no active schemas while in the group of gamblers several schemas (Emotional deprivation, Self-sacrifice, Recognition seeking, Emotional inhibition, Unrelenting standards, Self-punitiveness, Insufficient self-control) showed activity. Active schemas show similarity in their matter with main establishments of researches about gamblers and support the role of impulsivity, narcissistic traits, self-medicalization and emotional deprivation in the development and maintenance of pathological gambling.

  9. Her-2/neu overexpression is associated with thrombospondin-1-related angiogenesis and thrombospondin-1-unrelated lymphangiogenesis in breast cancer

    Directory of Open Access Journals (Sweden)

    Ming-Chuan Hong

    2013-11-01

    Conclusion: Our in vivo results showed that Her-2/neu affects the biological manifestations of breast cancer by increasing angiogenesis (which is TSP-1-related and lymphangiogenesis, which is TSP-1-unrelated.

  10. On revealing the gene targets of Ebola virus microRNAs involved in the human skin microbiome

    Directory of Open Access Journals (Sweden)

    Pei-Chun Hsu

    2018-01-01

    Full Text Available Ebola virus, a negative-sense single-stranded RNA virus, causes severe viral hemorrhagic fever and has a high mortality rate. Histopathological and immunopathological analyses of Ebola virus have revealed that histopathological changes in skin tissue are associated with various degrees of endothelial cell swelling and necrosis. The interactions of microbes within or on a host are a crucial for the skin immune shield. The discovery of microRNAs (miRNAs in Ebola virus implies that immune escape, endothelial cell rupture, and tissue dissolution during Ebola virus infection are a result of the effects of Ebola virus miRNAs. Keratinocytes obtained from normal skin can attach and spread through expression of the thrombospondin family of proteins, playing a role in initiation of cell-mediated immune responses in the skin. Several miRNAs have been shown to bind the 3′ untranslated region of thrombospondin mRNA, thereby controlling its stability and translational activity. In this study, we discovered short RNA sequences that may act as miRNAs from Propionibacterium acnes using a practical workflow of bioinformatics methods. Subsequently, we deciphered the common target gene. These RNA sequences tended to bind to the same thrombospondin protein, THSD4, emphasizing the potential importance of the synergistic binding of miRNAs from Ebola virus, Propionibacterium acnes, and humans to the target. These results provide important insights into the molecular mechanisms of thrombospondin proteins and miRNAs in Ebola virus infection.

  11. Psychosocial factors related to gambling abstinence and relapse in members of gamblers anonymous.

    Science.gov (United States)

    Oei, Tian P S; Gordon, Leon M

    2008-03-01

    Problem gamblers account for almost one-third of the industry's total revenue with the adverse effects of problem gambling including significant financial loss, legal and occupational difficulties, family problems, psychological distress and suicide. As such, it is important to understand the influential factors in gambling abstinence and relapse, which will assist in the development of relapse prevention methods in therapeutic treatment regimes. This paper reported the role of a set of seven predictors in distinguishing between abstinent and relapsed gamblers among 75 Gambling Anonymous (GA) members (55 males; 20 females; Mean age 45 years) in Southeast Queensland. The measures taken were meeting Attendance and Participation, Social Support, God Belief, Belief in a Higher Power, Working the 12-steps of Recovery, Gambling Urges and Erroneous Cognitions. Discriminant analysis revealed that the variables separating the two groups were significant, suggesting that GA members achieving abstinence could be distinguished from those who relapsed, with Attendance and Participation, and Social Support contributing the greatest influence on member's ability to abstain from gambling. The findings suggested that GA member's involvement in meetings, and support from family and friends had significant impact on their gambling abstinence. In contrast, increased gambling urges and erroneous cognitions increased the chance of relapse.

  12. The role of matricellular proteins in glaucoma.

    LENUS (Irish Health Repository)

    Wallace, Deborah M

    2014-07-01

    Glaucoma is an optic neuropathy affecting approximately 60million people worldwide and is the second most common cause of irreversible blindness. Elevated intraocular pressure (IOP) is the main risk factor for developing glaucoma and is caused by impaired aqueous humor drainage through the trabecular meshwork (TM) and Schlemm\\'s canal (SC). In primary open angle glaucoma (POAG), this elevation in IOP in turn leads to deformation at the optic nerve head (ONH) specifically at the lamina cribrosa (LC) region where there is also a deposition of extracellular matrix (ECM) molecules such as collagen and fibronectin. Matricellular proteins are non-structural secreted glycoproteins that help cells communicate with their surrounding ECM. This family of proteins includes connective tissue growth factor (CTGF), also known as CCN2, thrombospondins (TSPs), secreted protein acidic and rich in cysteine (SPARC), periostin, osteonectin, and Tenascin-C and -X and other ECM proteins. All members appear to play a role in fibrosis and increased ECM deposition. Most are widely expressed in tissues particularly in the TM and ONH and deficiency of TSP1 and SPARC have been shown to lower IOP in mouse models of glaucoma through enhanced outflow facility. The role of these proteins in glaucoma is emerging as some have an association with the pathophysiology of the TM and LC regions and might therefore be potential targets for therapeutic intervention in glaucoma.

  13. PCR diagnostics underestimate the prevalence of avian malaria (Plasmodium relictum) in experimentally-infected passerines

    Science.gov (United States)

    Jarvi, Susan I.; Schultz, Jeffrey J.; Atkinson, Carter T.

    2002-01-01

    Several polymerase chain reaction (PCR)-based methods have recently been developed for diagnosing malarial infections in both birds and reptiles, but a critical evaluation of their sensitivity in experimentally-infected hosts has not been done. This study compares the sensitivity of several PCR-based methods for diagnosing avian malaria (Plasmodium relictum) in captive Hawaiian honeycreepers using microscopy and a recently developed immunoblotting technique. Sequential blood samples were collected over periods of up to 4.4 yr after experimental infection and rechallenge to determine both the duration and detectability of chronic infections. Two new nested PCR approaches for detecting circulating parasites based on P. relictum 18S rRNA genes and the thrombospondin-related anonymous protein (TRAP) gene are described. The blood smear and the PCR tests were less sensitive than serological methods for detecting chronic malarial infections. Individually, none of the diagnostic methods was 100% accurate in detecting subpatent infections, although serological methods were significantly more sensitive (97%) than either nested PCR (61–84%) or microscopy (27%). Circulating parasites in chronically infected birds either disappear completely from circulation or to drop to intensities below detectability by nested PCR. Thus, the use of PCR as a sole means of detection of circulating parasites may significantly underestimate true prevalence.

  14. Taxonomy for and Analysis of Anonymous Communications Networks

    Science.gov (United States)

    2009-03-01

    degradation, preservation and elimination in cyberspace to enhance the security of information assets. This includes discovery/obfuscation of...a means of communication and information dissemination, concerns about Internet privacy and security are escalating. In 1980’s, Chaum began work...variety of different systems including the T9000 Transputer AFIT/DCS/ENG/09-08 - 123 - [Bar95] and a secure ecommerce system [HaC02]. Anonymity

  15. Protein function prediction using neighbor relativity in protein-protein interaction network.

    Science.gov (United States)

    Moosavi, Sobhan; Rahgozar, Masoud; Rahimi, Amir

    2013-04-01

    There is a large gap between the number of discovered proteins and the number of functionally annotated ones. Due to the high cost of determining protein function by wet-lab research, function prediction has become a major task for computational biology and bioinformatics. Some researches utilize the proteins interaction information to predict function for un-annotated proteins. In this paper, we propose a novel approach called "Neighbor Relativity Coefficient" (NRC) based on interaction network topology which estimates the functional similarity between two proteins. NRC is calculated for each pair of proteins based on their graph-based features including distance, common neighbors and the number of paths between them. In order to ascribe function to an un-annotated protein, NRC estimates a weight for each neighbor to transfer its annotation to the unknown protein. Finally, the unknown protein will be annotated by the top score transferred functions. We also investigate the effect of using different coefficients for various types of functions. The proposed method has been evaluated on Saccharomyces cerevisiae and Homo sapiens interaction networks. The performance analysis demonstrates that NRC yields better results in comparison with previous protein function prediction approaches that utilize interaction network. Copyright © 2012 Elsevier Ltd. All rights reserved.

  16. Gamblers anonymous and cognitive-behavioral therapies for pathological gamblers.

    Science.gov (United States)

    Petry, Nancy M

    2005-01-01

    Numerous types of treatments for pathological gambling have been described, but two of the most common are Gamblers Anonymous (GA) and cognitive-behavioral therapy. This paper describes some outcome data associated with the two approaches. It also reviews evidence suggesting that a combined intervention may enhance therapy engagement and reduce relapse rates.

  17. Secure anonymous mutual authentication for star two-tier wireless body area networks.

    Science.gov (United States)

    Ibrahim, Maged Hamada; Kumari, Saru; Das, Ashok Kumar; Wazid, Mohammad; Odelu, Vanga

    2016-10-01

    Mutual authentication is a very important service that must be established between sensor nodes in wireless body area network (WBAN) to ensure the originality and integrity of the patient's data sent by sensors distributed on different parts of the body. However, mutual authentication service is not enough. An adversary can benefit from monitoring the traffic and knowing which sensor is in transmission of patient's data. Observing the traffic (even without disclosing the context) and knowing its origin, it can reveal to the adversary information about the patient's medical conditions. Therefore, anonymity of the communicating sensors is an important service as well. Few works have been conducted in the area of mutual authentication among sensor nodes in WBAN. However, none of them has considered anonymity among body sensor nodes. Up to our knowledge, our protocol is the first attempt to consider this service in a two-tier WBAN. We propose a new secure protocol to realize anonymous mutual authentication and confidential transmission for star two-tier WBAN topology. The proposed protocol uses simple cryptographic primitives. We prove the security of the proposed protocol using the widely-accepted Burrows-Abadi-Needham (BAN) logic, and also through rigorous informal security analysis. In addition, to demonstrate the practicality of our protocol, we evaluate it using NS-2 simulator. BAN logic and informal security analysis prove that our proposed protocol achieves the necessary security requirements and goals of an authentication service. The simulation results show the impact on the various network parameters, such as end-to-end delay and throughput. The nodes in the network require to store few hundred bits. Nodes require to perform very few hash invocations, which are computationally very efficient. The communication cost of the proposed protocol is few hundred bits in one round of communication. Due to the low computation cost, the energy consumed by the nodes is

  18. An Efficient Big Data Anonymization Algorithm Based on Chaos and Perturbation Techniques

    Directory of Open Access Journals (Sweden)

    Can Eyupoglu

    2018-05-01

    Full Text Available The topic of big data has attracted increasing interest in recent years. The emergence of big data leads to new difficulties in terms of protection models used for data privacy, which is of necessity for sharing and processing data. Protecting individuals’ sensitive information while maintaining the usability of the data set published is the most important challenge in privacy preserving. In this regard, data anonymization methods are utilized in order to protect data against identity disclosure and linking attacks. In this study, a novel data anonymization algorithm based on chaos and perturbation has been proposed for privacy and utility preserving in big data. The performance of the proposed algorithm is evaluated in terms of Kullback–Leibler divergence, probabilistic anonymity, classification accuracy, F-measure and execution time. The experimental results have shown that the proposed algorithm is efficient and performs better in terms of Kullback–Leibler divergence, classification accuracy and F-measure compared to most of the existing algorithms using the same data set. Resulting from applying chaos to perturb data, such successful algorithm is promising to be used in privacy preserving data mining and data publishing.

  19. Potential harms, anonymization, and the right to withdraw consent to biobank research.

    Science.gov (United States)

    Eriksson, Stefan; Helgesson, Gert

    2005-09-01

    This paper discusses the potential harms involved in biobank research and how ethical review, informed consent, withdrawals, and anonymization of samples should be handled in the light of these harms. There is less risk involved in biobank research than in human subject research; it should therefore be treated differently. In our view, anonymization should not be an automatically permissible response to requests for withdrawal. Nor should a request for withdrawal necessarily stop research on identifiable samples. Apart from not being particularly appropriate for protecting the interests of individuals, anonymization of samples has a negative impact on research. We suggest that the current view on withdrawal from research, supported by the Declaration of Helsinki and subsequent ethical guidelines, be abandoned in the context of biobank research and be replaced by an approach inspired by the Nuremberg Code. This approach requires those wishing to withdraw their samples from research to present sufficient reason for doing so. Our interpretation of 'sufficient reason' includes all those involving genuine, deeply felt concerns that are not based on misconceptions. Still, this underlines the fact that we all share a responsibility for health research and that no one should take withdrawal from biobank research lightly.

  20. HIV and serum protein electrophoresis patterns in KwaZulu-Natal: a ...

    African Journals Online (AJOL)

    Objective. To describe the effect of HIV serostatus on serum proteins, serum protein electrophoresis (SPEP) patterns and monoclonal bands. Setting. Inkosi Albert Luthuli Central Hospital, Durban. Design. Retrospective, anonymous analysis of routine laboratory results. Results. Monoclonal bands were not increased in ...

  1. Anonymously Productive and Socially Engaged While Learning at Work

    Science.gov (United States)

    Magni, Luca

    2016-01-01

    Many concurrent variables appear to influence people when they interact anonymously, either face-to-face (F2F) or in computer-mediated communications (CMC).This paper presents the results of a small exploratory research, conducted in a medical company in Italy, to investigate how the use of pseudonyms influences CMC behaviours. The study involved…

  2. Efficient Asymmetric Index Encapsulation Scheme for Anonymous Content Centric Networking

    Directory of Open Access Journals (Sweden)

    Rong Ma

    2017-01-01

    Full Text Available Content Centric Networking (CCN is an effective communication paradigm that well matches the features of wireless environments. To be considered a viable candidate in the emerging wireless networks, despite the clear benefits of location-independent security, CCN must at least have parity with existing solutions for confidential and anonymous communication. This paper designs a new cryptographic scheme, called Asymmetric Index Encapsulation (AIE, that enables the router to test whether an encapsulated header matches the token without learning anything else about both of them. We suggest using the AIE as the core protocol of anonymous Content Centric Networking. A construction of AIE which strikes a balance between efficiency and security is given. The scheme is proved to be secure based on the DBDH assumption in the random oracle with tight reduction, while the encapsulated header and the token in our system consist of only three elements.

  3. Towards Predicting Efficient and Anonymous Tor Circuits

    OpenAIRE

    Barton, Armon; Imani, Mohsen; Ming, Jiang; Wright, Matthew

    2018-01-01

    The Tor anonymity system provides online privacy for millions of users, but it is slower than typical web browsing. To improve Tor performance, we propose PredicTor, a path selection technique that uses a Random Forest classifier trained on recent measurements of Tor to predict the performance of a proposed path. If the path is predicted to be fast, then the client builds a circuit using those relays. We implemented PredicTor in the Tor source code and show through live Tor experiments and Sh...

  4. What affects your MS? Responses to an anonymous, Internet-based epidemiological survey.

    Science.gov (United States)

    Simmons, Rex D; Ponsonby, Anne-Louise; van der Mei, Ingrid A F; Sheridan, Peter

    2004-04-01

    Evolving information technology has raised the possibility of new methods of data collection in multiple sclerosis (MS) research. An anonymous, self-report, Internet-based survey was developed, which asked people with MS their opinion on how various extrinsic factors affected their condition. From September 2001 to July 2002, a total of 2529 people completed the questionnaire. The demographic and clinical profiles of the anonymous respondents indicated that most were likely to have MS. Common factors reported as beneficial were cannabis, cold baths, meditation and dietary factors. Common adverse factors reported were high stress, exposure to high temperatures and viral infections. There was an increasing report of high temperatures as being adverse with increasing respondent age (test for trend, P < 0.001). The adverse report of high temperatures correlated significantly with the report of strong sunlight apparently making MS worse (r = 0.35, P < 0.0001). In Australia, high temperatures were more likely to be reported as adverse in warmer, lower latitude regions. The association between strong sunlight as adverse and age or region did not persist after adjustment for high temperatures. Thus, this apparent adverse factor appeared to relate to solar heat, not solar light. People with MS may risk vitamin D deficiency because of sun avoidance due to heat-related fatigue or intolerance. This is of clinical significance not only for bone health but because vitamin D may have beneficial immunomodulatory properties. The present study provides new information from people with MS on factors that may influence symptoms or clinical course. This information will now be used in the design of formal epidemiological cohort studies.

  5. Anonymity-Preserving Public-Key Encryption

    DEFF Research Database (Denmark)

    Kohlweiss, Markulf; Maurer, Ueli; Onete, Cristina

    2013-01-01

    security properties have been proposed. We investigate constructions as well as limitations for preserving receiver anonymity when using public-key encryption (PKE). We use the constructive cryptography approach by Maurer and Renner and interpret cryptographic schemes as constructions of a certain ideal...... literature (IND-CCA, key-privacy, weak robustness). We also show that a desirable stronger variant, preventing the adversary from selective ”trial-deliveries” of messages, is unfortunately unachievable by any PKE scheme, no matter how strong. The constructive approach makes the guarantees achieved...... by applying a cryptographic scheme explicit in the constructed (ideal) resource; this specifies the exact requirements for the applicability of a cryptographic scheme in a given context. It also allows to decide which of the existing security properties of such a cryptographic scheme are adequate...

  6. Altered extracellular matrix remodeling and angiogenesis in sponge granulomas of thrombospondin 2-null mice.

    Science.gov (United States)

    Kyriakides, T R; Zhu, Y H; Yang, Z; Huynh, G; Bornstein, P

    2001-10-01

    The matricellular angiogenesis inhibitor, thrombospondin (TSP) 2, has been shown to be an important modulator of wound healing and the foreign body response. Specifically, TSP2-null mice display improved healing with minimal scarring and form well-vascularized foreign body capsules. In this study we performed subcutaneous implantation of sponges and investigated the resulting angiogenic and fibrogenic responses. Histological and immunohistochemical analysis of sponges, excised at 7, 14, and 21 days after implantation, revealed significant differences between TSP2-null and wild-type mice. Most notably, TSP2-null mice exhibited increased angiogenesis and fibrotic encapsulation of the sponge. However, invasion of dense tissue was compromised, even though its overall density was increased. Furthermore, histomorphometry and biochemical assays demonstrated a significant increase in the extracellular distribution of matrix metalloproteinase (MMP) 2, but no change in the levels of active transforming growth factor-beta(1). The alterations in neovascularization, dense tissue invasion, and MMP2 in TSP2-null mice coincided with the deposition of TSP2 in the extracellular matrix of wild-type animals. These observations support the proposed role of TSP2 as a modulator of angiogenesis and matrix remodeling during tissue repair. In addition, they provide in vivo evidence for a newly proposed function of TSP2 as a modulator of extracellular MMP2 levels.

  7. An Analysis of College Students' Anonymous Questions about Human Sexuality.

    Science.gov (United States)

    Valois, Robert F.; Waring, Kathryn A.

    1991-01-01

    Study analyzed the frequency and type of questions about sexuality submitted anonymously by college students in health education courses over five semesters. The most common categories were sexual arousal/response; general anatomy/physiology; contraception; dating/relationships; pregnancy/fertility; and sexually transmitted diseases. The appendix…

  8. Nursing lives in the blogosphere: A thematic analysis of anonymous online nursing narratives.

    Science.gov (United States)

    Castro, Aimee; Andrews, Gavin

    2018-02-01

    The aim of this study was to explore the work-life narratives of nurses through a thematic analysis of the nursing accounts they post in their publicly accessible, anonymous blogs. Many nurses participate on social media. Blogs have been advocated as a self-reflective tool in nursing practice, yet as far as the authors are aware, no previous studies have explored nurses' individual blogs for their potential to reveal nurses' perceptions of nursing work. The research design was qualitative description. Between May-August 2015, Internet search engines were used to discover lists of nursing blogs recommended by organizations representing nurses' interests. Recommended blogs were purposively sampled. Four anonymous blogs written by nurses from different nursing specialties met the sampling criteria. All 520 of their entries from 2014 were read and copied into NVivo 10, where an inductive coding process was followed. Three major themes arose in these nurses' online discussions of their work lives: they truly care about and value their nursing work, but they are feeling stressed and burnt out and they are using their anonymous blogs to share factors that frustrate them in their nursing work. Three main areas of frustration were revealed: teamwork problems, challenging patients and families, and management issues. Anonymous nursing blogs offer valuable, longitudinal insights into nurses' perceptions of their work lives. Nursing blogs should be further explored for ongoing insights into nurses' experiences of nursing work, as well as nurses' recommendations for addressing issues causing them to feel frustrated in their work environments. © 2017 John Wiley & Sons Ltd.

  9. An Enhancing Security Research of Tor Anonymous Communication to Against DDos Attacks

    Directory of Open Access Journals (Sweden)

    Feng Tao

    2017-01-01

    Full Text Available Tor (The Second Onion Router is modified by the first generation onion router and known as the most prevalent anonymous communication system. According to the advantage of low latency, high confidentiality of transmission content, high security of communication channels and et al., Tor is widely used in anonymous Web browsing, instant message and so on. However, the vulnerability and blemish of Tor affect system security. An identity and Signcryption-based concurrent signature scheme was used to prevent the behaviors of attackers from inserting controlled nodes and conspiring to make DDos attacks. The integrated security of Tor system was enhanced in our scheme. In addition we have proved the scheme.

  10. Practical m-k-Anonymization for Collaborative Data Publishing without Trusted Third Party

    Directory of Open Access Journals (Sweden)

    Jingyu Hua

    2017-01-01

    Full Text Available In collaborative data publishing (CDP, an m-adversary attack refers to a scenario where up to m malicious data providers collude to infer data records contributed by other providers. Existing solutions either rely on a trusted third party (TTP or introduce expensive computation and communication overheads. In this paper, we present a practical distributed k-anonymization scheme, m-k-anonymization, designed to defend against m-adversary attacks without relying on any TTPs. We then prove its security in the semihonest adversary model and demonstrate how an extension of the scheme can also be proven secure in a stronger adversary model. We also evaluate its efficiency using a commonly used dataset.

  11. The long path to pregnancy: early experience with dual anonymous gamete donation in a European in vitro fertilisation referral centre

    Directory of Open Access Journals (Sweden)

    Sills Eric

    2010-08-01

    Full Text Available Abstract Background This investigation describes features of patients undergoing in vitro fertilisation (IVF and embryo transfer (ET where both gametes were obtained from anonymous donors. Methods Gamete unsuitability or loss was confirmed in both members of seven otherwise healthy couples presenting for reproductive endocrinology consultation over a 12-month interval in Ireland. IVF was undertaken with fresh oocytes provided by anonymous donors in Ukraine; frozen sperm (anonymous donor was obtained from a licensed tissue establishment. For recipients, saline-enhanced sonography was used to assess intrauterine contour with endometrial preparation via transdermal estrogen. Results Among commissioning couples, mean±SD female and male age was 41.9 ± 3.7 and 44.6 ± 3.5 yrs, respectively. During this period, female age for non dual anonymous gamete donation IVF patients was 37.9 ± 3 yrs (p Conclusions Mean age of females undergoing dual anonymous donor gamete donation with IVF is significantly higher than the background IVF patient population. Even when neither partner is able to contribute any gametes for IVF, the clinical pregnancy rate per transfer can be satisfactory if both anonymous egg and sperm donation are used concurrently. Our report emphasises the role of pre-treatment counselling in dual anonymous gamete donation, and presents a coordinated screening and treatment approach in IVF where this option may be contemplated.

  12. K-Anonymity Based Privacy Risk Budgeting System for Interactive Record Linkage

    Directory of Open Access Journals (Sweden)

    Hye-Chung Kum

    2017-04-01

    The k-anonymity based privacy risk budgeting system provides a mechanism where we can concretely reason about the tradeoff between the privacy risks due to information disclosed, accuracy gained, and biases reduced during interactive record linkage.

  13. Quality of life changes in an alcoholics anonymous self-help group

    Directory of Open Access Journals (Sweden)

    INDRĖ DIRGĖLIENĖ

    2017-09-01

    Full Text Available The issue of alcohol addiction is one of the most pressing in contemporary society as it causes an effect in the context of poverty, violence and suicidal behaviour. After the restoration of Lithuania‘s Independence a new helping profession such as social worker appeared: they were expected to provide professional help to people in order to help them find inner motivation for positive socialization or re-socialization. The issue of alcohol addiction/dependence was first viewed systemically, with the understanding of the need for systemic help: social, psychological, spiritual and medical. Long-term rehabilitation centres have been created and self-help groups formed: those of Alcoholics Anonymous (AA, Al-anon (self – help groups for friends and families who have relatives suffering from alcohol and ACA (Adult Children of Alcoholics self-help group. The article analyzes the quality of life changes in an Alcoholics Anonymous self-help group. Qualitative survey data are presented in this article. Six life stories of people attending Alcoholics Anonymous (AA self-help groups are provided. The age of the participants ranges from 31 to 58. The main criterion to participate in the research is: people who have or have had problems because of alcohol usage and who are Alcoholics Anonymous self-help group (AA participants that have reached Step 12. This means they are ready to spread the message about recovering from this abuse to people who suffer from it. Deep analysis interview has been used to collect the data. Interview notional blocks are: 1 childhood experiences; 2 addiction to alcohol period and crisis; 3 changes of life quality when attending AA groups. The study data have been provided using content analysis through the deduction method. The theoretical basis is a systematic approach to a person in the course of his life‘ spiritual concepts and stages of recovery (May, 2004; Linn, Linn, 2003; Kubler-Ross, 2008 and the theory of integrated

  14. [Comment on “Anonymous reviews: Self-serving, counterproductive, and unacceptable”] from R.E. Criss and A.M. Hofmeister

    Science.gov (United States)

    Criss, Robert E.; Hofmeister, Anne M.

    We share many of the experiences and most of the sentiments relayed by Myrl Beck in his 1 July contribution to the Eos Forum, as well as those of a similar nature expressed by Alexander McBirney in his March 2003 commentary in GSA Today. We are in fact delighted that senior scientists are speaking up about the unsatisfactory nature of anonymous reviews. However, we believe they understate the problems, partly because the situation is worsening with time. Moreover, the brunt of such problems is disproportionately felt not by emeritus professors but by young scientists, women, and minorities, and this is the crux of the issue.This year, we have, like Beck, received rejections based on comments by two anonymous reviewers and an anonymous associate editor. We have also received rejections from anonymous associate editors based on a single constructive review requesting minor revision, along with an anonymous hostile “review” that could have been written about any manuscript on any topic by any author. More common than these are rejections from identified associate editors based on one or two anonymous reviews, which more often than not err on most of the points made, and in two cases dispute work that resulted in Nobel Prizes. We have examples this year of each type where the senior authors are recent Ph.D.s, whose vulnerabilities underscore the reprehensible nature of this “process.”

  15. Anonymous letters? DNA and fingerprints technologies combined to solve a case.

    Science.gov (United States)

    Barbaro, A; Cormaci, P; Teatino, A; La Marca, A; Barbaro, A

    2004-12-02

    Two brothers, living in two different cities, received two different anonymous letters. We performed latent prints development and DNA research on the letters and also on a glass used by a cousin suspected to be the letters' sender.

  16. Forming Circle Formations of Anonymous Mobile Agents With Order Preservation

    NARCIS (Netherlands)

    Wang, Chen; Xie, Guangming; Cao, Ming

    2013-01-01

    We propose distributed control laws for a group of anonymous mobile agents to form desired circle formations when the agents move in the one-dimensional space of a circle. The agents are modeled by kinematic points. They share the common knowledge of the orientation of the circle, but are oblivious

  17. “The Question Exists, but You Don’t Exist With It”: Strategic Anonymity in the Social Lives of Adolescents

    Directory of Open Access Journals (Sweden)

    Nicole B. Ellison

    2016-10-01

    Full Text Available Anonymous interactions may have important implications for adolescents’ social and psychological development. In this article, we use semi-structured interview data collected from US adolescents aged 13–18 years ( N  = 22 to explore how the specific affordances of an online platform that enables selective anonymity shape adolescents’ practices and perceptions. We contribute to scholarship on the effects of anonymous interaction online by surfacing positive outcomes for young adults who choose to interact in anonymous contexts—specifically, a question-and-answer site popular with teenagers ( Ask.fm —and explicating the ways in which these interactions assist in key developmental tasks during adolescence. We identify five primary themes: (1 perceived authenticity, (2 circumventing social expectations, (3 learning about the self, (4 managing identity and self-presentation, and (5 initiating and developing relationships. Across these themes, we find that users strategically employ anonymity to achieve their social goals. Use of the site was often deeply embedded in offline social structures, such that the platform was used to circumvent rigid norms around socialization (who can talk to whom and information-seeking (who can ask what, enforced in educational institutions and elsewhere. We conclude that the strategic use of selective anonymity has the potential to scaffold social processes through which adolescents work toward critical developmental goals.

  18. RESPECTING THE CONFIDENTIALITY AND ANONYMITY IN QUALITATIVE RESEARCH IN SOCIOLOGY

    Directory of Open Access Journals (Sweden)

    Maria OPREA

    2018-06-01

    Full Text Available Ethics, a philosophical discipline, formulates a set of principles that must be followed, in respect of good and truth, fundamental values of humanity. The world of scientific research, of all kinds, also obeys moral imperatives and principles and is called upon to answer to society not only in relation to the discoveries themselves but, above all, in relation to the possible destructive effects on man or his life environment. The researcher in the sphere of social sciences is more involved in the act of responsibility, the more the topic subject of the study is the individual, the social group, the social environment. He must rigorously follow the principles and requirements of fair, honest, objective studies that do not harm the dignity of the human being. In line with the ethical rigors of scientific research, the article aims to highlight some aspects of respecting the principle of confidentiality and anonymity in qualitative research in the field of sociology, with reference to the study of vulnerable groups in Arad County.

  19. Darknet and bitcoin, the obscure and anonymous side of the internet in healthcare.

    Science.gov (United States)

    Masoni, Marco; Guelfi, Maria Renza; Gensini, Gian Franco

    2016-11-14

    Illegal activities prosecutable by law in the real life can be committed on the internet alike. In the healthcare domain, we refer mainly to selling of illegal and counterfeit drugs, exchange of pedo-pornographic material and marketing of stolen medical records. These illegal activities are made easier by recent developments of the Internet that medical community must be aware of: darknet and bitcoin. The first allows anonymous surfing and the last anonymous financial transactions. After discussing which healthcare areas are affected by these technological developments of the Internet and the deriving consequences, then the Authors express their opinion on what actions can be taken to protect internet community.

  20. Finding God through the Spirituality of the 12 Steps of Alcoholics Anonymous

    Directory of Open Access Journals (Sweden)

    Jeff Sandoz

    2014-09-01

    Full Text Available The 12 Step program of Alcoholics Anonymous has provided relief for individuals recovering from alcoholism for over 75 years. The key to the recovery process is a spiritual experience as the result of practicing the daily discipline of the 12 Steps, a process which evokes a psychic change sufficient to recover from this disease. Although a relatively new spiritual discipline, the 12 Step program is built upon a foundation of much older and more traditional paths to God including devotion, understanding, service and meditation. Recent research provides insights into the 12 Step program. Specifically, the path of recovery is highlighted by the reduction of resentment and the promotion of forgiveness which are key factors of recovery.

  1. Modulation of macrophage activation state protects tissue from necrosis during critical limb ischemia in thrombospondin-1-deficient mice.

    Directory of Open Access Journals (Sweden)

    Nicolas Bréchot

    Full Text Available BACKGROUND: Macrophages, key regulators of healing/regeneration processes, strongly infiltrate ischemic tissues from patients suffering from critical limb ischemia (CLI. However pro-inflammatory markers correlate with disease progression and risk of amputation, suggesting that modulating macrophage activation state might be beneficial. We previously reported that thrombospondin-1 (TSP-1 is highly expressed in ischemic tissues during CLI in humans. TSP-1 is a matricellular protein that displays well-known angiostatic properties in cancer, and regulates inflammation in vivo and macrophages properties in vitro. We therefore sought to investigate its function in a mouse model of CLI. METHODS AND FINDINGS: Using a genetic model of tsp-1(-/- mice subjected to femoral artery excision, we report that tsp-1(-/- mice were clinically and histologically protected from necrosis compared to controls. Tissue protection was associated with increased postischemic angiogenesis and muscle regeneration. We next showed that macrophages present in ischemic tissues exhibited distinct phenotypes in tsp-1(-/- and wt mice. A strong reduction of necrotic myofibers phagocytosis was observed in tsp-1(-/- mice. We next demonstrated that phagocytosis of muscle cell debris is a potent pro-inflammatory signal for macrophages in vitro. Consistently with these findings, macrophages that infiltrated ischemic tissues exhibited a reduced postischemic pro-inflammatory activation state in tsp-1(-/- mice, characterized by a reduced Ly-6C expression and a less pro-inflammatory cytokine expression profile. Finally, we showed that monocyte depletion reversed clinical and histological protection from necrosis observed in tsp-1(-/- mice, thereby demonstrating that macrophages mediated tissue protection in these mice. CONCLUSION: This study defines targeting postischemic macrophage activation state as a new potential therapeutic approach to protect tissues from necrosis and promote tissue

  2. Anonymity communication VPN and Tor: a comparative study

    Science.gov (United States)

    Ramadhani, E.

    2018-03-01

    VPN and Tor is a technology based on anonymity communication. These two technologies have their advantage and disadvantage. The objective of this paper is to find the difference between VPN and Tor technologies by comparing their security of communication on the public network based on the CIA triad concept. The comparative study in this paper is based on the survey method. At last, the result of this paper is a recommendation on when to use a VPN and Tor to secure communication

  3. Protein O-fucosylation in Plasmodium falciparum ensures efficient infection of mosquito and vertebrate hosts.

    Science.gov (United States)

    Lopaticki, Sash; Yang, Annie S P; John, Alan; Scott, Nichollas E; Lingford, James P; O'Neill, Matthew T; Erickson, Sara M; McKenzie, Nicole C; Jennison, Charlie; Whitehead, Lachlan W; Douglas, Donna N; Kneteman, Norman M; Goddard-Borger, Ethan D; Boddey, Justin A

    2017-09-15

    O-glycosylation of the Plasmodium sporozoite surface proteins CSP and TRAP was recently identified, but the role of this modification in the parasite life cycle and its relevance to vaccine design remain unclear. Here, we identify the Plasmodium protein O-fucosyltransferase (POFUT2) responsible for O-glycosylating CSP and TRAP. Genetic disruption of POFUT2 in Plasmodium falciparum results in ookinetes that are attenuated for colonizing the mosquito midgut, an essential step in malaria transmission. Some POFUT2-deficient parasites mature into salivary gland sporozoites although they are impaired for gliding motility, cell traversal, hepatocyte invasion, and production of exoerythrocytic forms in humanized chimeric liver mice. These defects can be attributed to destabilization and incorrect trafficking of proteins bearing thrombospondin repeats (TSRs). Therefore, POFUT2 plays a similar role in malaria parasites to that in metazoans: it ensures the trafficking of Plasmodium TSR proteins as part of a non-canonical glycosylation-dependent endoplasmic reticulum protein quality control mechanism.The role of O-glycosylation in the malaria life cycle is largely unknown. Here, the authors identify a Plasmodium protein O-fucosyltransferase and show that it is important for normal trafficking of a subset of surface proteins, particularly CSP and TRAP, and efficient infection of mosquito and vertebrate hosts.

  4. A Source Anonymity-Based Lightweight Secure AODV Protocol for Fog-Based MANET.

    Science.gov (United States)

    Fang, Weidong; Zhang, Wuxiong; Xiao, Jinchao; Yang, Yang; Chen, Wei

    2017-06-17

    Fog-based MANET (Mobile Ad hoc networks) is a novel paradigm of a mobile ad hoc network with the advantages of both mobility and fog computing. Meanwhile, as traditional routing protocol, ad hoc on-demand distance vector (AODV) routing protocol has been applied widely in fog-based MANET. Currently, how to improve the transmission performance and enhance security are the two major aspects in AODV's research field. However, the researches on joint energy efficiency and security seem to be seldom considered. In this paper, we propose a source anonymity-based lightweight secure AODV (SAL-SAODV) routing protocol to meet the above requirements. In SAL-SAODV protocol, source anonymous and secure transmitting schemes are proposed and applied. The scheme involves the following three parts: the source anonymity algorithm is employed to achieve the source node, without being tracked and located; the improved secure scheme based on the polynomial of CRC-4 is applied to substitute the RSA digital signature of SAODV and guarantee the data integrity, in addition to reducing the computation and energy consumption; the random delayed transmitting scheme (RDTM) is implemented to separate the check code and transmitted data, and achieve tamper-proof results. The simulation results show that the comprehensive performance of the proposed SAL-SAODV is a trade-off of the transmission performance, energy efficiency, and security, and better than AODV and SAODV.

  5. Applying LU Decomposition of Matrices to Design Anonymity Bilateral Remote User Authentication Scheme

    Directory of Open Access Journals (Sweden)

    Xiong Li

    2013-01-01

    Full Text Available We apply LU decomposition of matrices to present an anonymous bilateral authentication scheme. This paper aims at improving security and providing more excellent performances for remote user authentication scheme. The proposed scheme can provide bilateral authentication and session key agreement, can quickly check the validity of the input password, and can really protect the user anonymity. The security of the proposed scheme is based on the discrete logarithm problem (DLP, Diffie-Hellman problem (DHP, and the one-way hash function. It can resist various attacks such as insider attack, impersonation attack, server spoofing attack, and stolen smart card attack. Moreover, the presented scheme is computationally efficient for real-life implementation.

  6. Androgenic dependence of exophytic tumor growth in a transgenic mouse model of bladder cancer: a role for thrombospondin-1

    Directory of Open Access Journals (Sweden)

    Yao Jorge L

    2008-04-01

    Full Text Available Abstract Background Steroid hormones influence mitogenic signaling pathways, apoptosis, and cell cycle checkpoints, and it has long been known that incidence of bladder cancer (BC in men is several times greater than in women, a difference that cannot be attributed to environmental or lifestyle factors alone. Castration reduces incidence of chemically-induced BC in rodents. It is unclear if this effect is due to hormonal influences on activation/deactivation of carcinogens or a direct effect on urothelial cell proliferation or other malignant processes. We examined the effect of castration on BC growth in UPII-SV40T transgenic mice, which express SV40 T antigen specifically in urothelium and reliably develop BC. Furthermore, because BC growth in UPII-SV40T mice is exophytic, we speculated BC growth was dependent on angiogenesis and angiogenesis was, in turn, androgen responsive. Methods Flat panel detector-based cone beam computed tomography (FPDCT was used to longitudinally measure exophytic BC growth in UPII-SV40T male mice sham-operated, castrated, or castrated and supplemented with dihydrotestosterone (DHT. Human normal bladder and BC biopsies and mouse bladder were examined quantitatively for thrombospondin-1 (TSP1 protein expression. Results Mice castrated at 24 weeks of age had decreased BC volumes at 32 weeks compared to intact mice (p = 0.0071 and castrated mice administered DHT (p = 0.0233; one-way ANOVA, JMP 6.0.3, SAS Institute, Inc.. Bladder cancer cell lines responded to DHT treatment with increased proliferation, regardless of androgen receptor expression levels. TSP1, an anti-angiogenic factor whose expression is inhibited by androgens, had decreased expression in bladders of UPII-SV40T mice compared to wild-type. Castration increased TSP1 levels in UPII-SV40T mice compared to intact mice. TSP1 protein expression was higher in 8 of 10 human bladder biopsies of normal versus malignant tissue from the same patients. Conclusion

  7. Quercetin inhibits angiogenesis through thrombospondin-1 upregulation to antagonize human prostate cancer PC-3 cell growth in vitro and in vivo.

    Science.gov (United States)

    Yang, Feiya; Jiang, Xian; Song, Liming; Wang, Huiping; Mei, Zhu; Xu, Zhiqing; Xing, Nianzeng

    2016-03-01

    The rapid growth, morbidity and mortality of prostate cancer, and the lack of effective treatment have attracted great interests of researchers to find novel cancer therapies aiming to inhibit angiogenesis and tumor growth. Quercetin is a flavonoid compound that widely exists in the nature. Our previous study preliminarily demonstrated that quercetin effectively inhibited human prostate cancer cell xenograft tumor growth by inhibiting angiogenesis. Thrombospondin-1 (TSP-1) is the first reported endogenous anti-angiogenic factor that can inhibit angiogenesis and tumorigenesis. However, the relationship between quercetin inhibiting angiogenesis and TSP-1 upregulation in prostate cancer has not been determined. Thus, we explored the important role of TSP-1 upregulation in reducing angiogenesis and anti-prostate cancer effect of quercetin both in vitro and in vivo for the first time. After the selected doses were used for a certain time, quercetin i) significantly inhibited PC-3 and human umbilical vein endothelial cells (HUVECs) proliferation, migration and invasion in a dose-dependent manner; ⅱ) effectively inhibited prostate cancer PC-3 cell xenograft tumor growth by 37.5% with 75 mg/kg as compared to vehicle control group, more effective than 25 (22.85%) and 50 mg/kg (29.6%); ⅲ) was well tolerated by BALB/c mice and no obvious toxic reactions were observed; ⅳ) greatly reduced angiogenesis and led to higher TSP-1 protein and mRNA expression both in vitro and in vivo in a dose-dependent manner. Therefore, quercetin could increase TSP-1 expression to inhibit angiogenesis resulting in antagonizing prostate cancer PC-3 cell and xenograft tumor growth. The present study can lay a good basis for the subsequent concrete mechanism study and raise the possibility of applying quercetin to clinical for human prostate cancer in the near future.

  8. Anonymity and informed consent in artificial procreation: a report from Denmark

    DEFF Research Database (Denmark)

    Lebech, Anne Mette

    1997-01-01

    a problem concerning its application when dealing with people having a serious mental, social or even physical disability. Within the field of artificial procreation there are even more problems. Informed written consent is often demanded from anonymous donors of gametes in order to ensure their consent...

  9. THE WIKILEAKS´S CASE AND ANONYMITY: EFFECTS ON THE INFORMATION FREEDOM

    Directory of Open Access Journals (Sweden)

    Marlus Heriberto Arns de Oliveira

    2015-10-01

    Full Text Available The Constitution of the Federative Republic of Brazil, enacted in 1988 during the democratization process of the country after the end of an authoritarian regime preceded by several others that show a non-democratic tradition in the Brazilian Republic, remained still remnants an authoritarian Patronizing and Paternalist state, the example of the final part of the Article 5, item IV, which claims to be the free expression of thought, but forbids anonymity, prohibition which deserves to be rethought, especially on the internet, where the navigation data of people deserve protection, as well as their rights to remain anonymous, a fact which entails the need for reflection on the scope and how best to interpret the constitutional provision cited, a debate that, in the proposed article will deal think the ideas of paternalism, authoritarianism and freedom, whose focus will be about within the Internet, social networks and the Knowledge Society.

  10. Towards an anonymous access control and accountability scheme for cloud computing

    DEFF Research Database (Denmark)

    Jensen, Meiko; Schäge, Sven; Schwenk, Jörg

    2010-01-01

    An important aspect of trust in cloud computing consists in preventing the cloud provider from misusing the user's data. In this work-in-progress paper, we propose the approach of data anonymization to solve this problem. As this directly leads to problems of cloud usage accounting, we also propose...

  11. Finding erotic oases: locating the sites of men's same-sex anonymous sexual encounters.

    Science.gov (United States)

    Tewksbury, Richard

    2008-01-01

    Because anonymous sexual relations between two men are widely considered deviant many men seeking such activities look to erotic oases-natural environments appropriated for covert, often furtive sexual purposes. Previous research on erotic oases has focused on characteristics of involved men and processes of locating, negotiating with, and consummating sexual relations with others. This study draws on one major Web site listing of "cruising places" in the United States to identify common locations for erotic oases. Results show that the most common locations identified as erotic oases by users are public parks, adult bookstores, health clubs, and college campuses. Locations most likely to be listed as believed to be under law enforcement surveillance are outdoor, high traffic locations. Based on these results existing research has only begun to examine the most common locations for this highly stigmatized, deviant behavior and subculture.

  12. Annotating activation/inhibition relationships to protein-protein interactions using gene ontology relations.

    Science.gov (United States)

    Yim, Soorin; Yu, Hasun; Jang, Dongjin; Lee, Doheon

    2018-04-11

    Signaling pathways can be reconstructed by identifying 'effect types' (i.e. activation/inhibition) of protein-protein interactions (PPIs). Effect types are composed of 'directions' (i.e. upstream/downstream) and 'signs' (i.e. positive/negative), thereby requiring directions as well as signs of PPIs to predict signaling events from PPI networks. Here, we propose a computational method for systemically annotating effect types to PPIs using relations between functional information of proteins. We used regulates, positively regulates, and negatively regulates relations in Gene Ontology (GO) to predict directions and signs of PPIs. These relations indicate both directions and signs between GO terms so that we can project directions and signs between relevant GO terms to PPIs. Independent test results showed that our method is effective for predicting both directions and signs of PPIs. Moreover, our method outperformed a previous GO-based method that did not consider the relations between GO terms. We annotated effect types to human PPIs and validated several highly confident effect types against literature. The annotated human PPIs are available in Additional file 2 to aid signaling pathway reconstruction and network biology research. We annotated effect types to PPIs by using regulates, positively regulates, and negatively regulates relations in GO. We demonstrated that those relations are effective for predicting not only signs, but also directions of PPIs. The usefulness of those relations suggests their potential applications to other types of interactions such as protein-DNA interactions.

  13. Haptoglobin-related protein is a high-affinity hemoglobin-binding plasma protein

    DEFF Research Database (Denmark)

    Nielsen, Marianne Jensby; Petersen, Steen Vang; Jacobsen, Christian

    2006-01-01

    Haptoglobin-related protein (Hpr) is a primate-specific plasma protein associated with apolipoprotein L-I (apoL-I)-containing high-density lipoprotein (HDL) particles shown to be a part of the innate immune defense. Despite the assumption hitherto that Hpr does not bind to hemoglobin, the present...

  14. The long path to pregnancy: early experience with dual anonymous gamete donation in a European in vitro fertilisation referral centre

    LENUS (Irish Health Repository)

    Sills, Eric Scott

    2010-08-11

    Abstract Background This investigation describes features of patients undergoing in vitro fertilisation (IVF) and embryo transfer (ET) where both gametes were obtained from anonymous donors. Methods Gamete unsuitability or loss was confirmed in both members of seven otherwise healthy couples presenting for reproductive endocrinology consultation over a 12-month interval in Ireland. IVF was undertaken with fresh oocytes provided by anonymous donors in Ukraine; frozen sperm (anonymous donor) was obtained from a licensed tissue establishment. For recipients, saline-enhanced sonography was used to assess intrauterine contour with endometrial preparation via transdermal estrogen. Results Among commissioning couples, mean±SD female and male age was 41.9 ± 3.7 and 44.6 ± 3.5 yrs, respectively. During this period, female age for non dual anonymous gamete donation IVF patients was 37.9 ± 3 yrs (p < 0.001). Infertility duration was ≥3 yrs for couples enrolling in dual gamete donation, and each had ≥2 prior failed fertility treatments using native oocytes. All seven recipient couples proceeded to embryo transfer, although one patient had two transfers. Clinical pregnancy was achieved for 5\\/7 (71.4%) patients. Non-transferred cryopreserved embryos were available for all seven couples. Conclusions Mean age of females undergoing dual anonymous donor gamete donation with IVF is significantly higher than the background IVF patient population. Even when neither partner is able to contribute any gametes for IVF, the clinical pregnancy rate per transfer can be satisfactory if both anonymous egg and sperm donation are used concurrently. Our report emphasises the role of pre-treatment counselling in dual anonymous gamete donation, and presents a coordinated screening and treatment approach in IVF where this option may be contemplated.

  15. Relative quantification of protein-protein interactions using a dual luciferase reporter pull-down assay system.

    Directory of Open Access Journals (Sweden)

    Shuaizheng Jia

    Full Text Available The identification and quantitative analysis of protein-protein interactions are essential to the functional characterization of proteins in the post-proteomics era. The methods currently available are generally time-consuming, technically complicated, insensitive and/or semi-quantitative. The lack of simple, sensitive approaches to precisely quantify protein-protein interactions still prevents our understanding of the functions of many proteins. Here, we develop a novel dual luciferase reporter pull-down assay by combining a biotinylated Firefly luciferase pull-down assay with a dual luciferase reporter assay. The biotinylated Firefly luciferase-tagged protein enables rapid and efficient isolation of a putative Renilla luciferase-tagged binding protein from a relatively small amount of sample. Both of these proteins can be quantitatively detected using the dual luciferase reporter assay system. Protein-protein interactions, including Fos-Jun located in the nucleus; MAVS-TRAF3 in cytoplasm; inducible IRF3 dimerization; viral protein-regulated interactions, such as MAVS-MAVS and MAVS-TRAF3; IRF3 dimerization; and protein interaction domain mapping, are studied using this novel assay system. Herein, we demonstrate that this dual luciferase reporter pull-down assay enables the quantification of the relative amounts of interacting proteins that bind to streptavidin-coupled beads for protein purification. This study provides a simple, rapid, sensitive, and efficient approach to identify and quantify relative protein-protein interactions. Importantly, the dual luciferase reporter pull-down method will facilitate the functional determination of proteins.

  16. A Remote User Authentication Scheme with Anonymity for Mobile Devices

    Directory of Open Access Journals (Sweden)

    Soobok Shin

    2012-04-01

    Full Text Available With the rapid growth of information technologies, mobile devices have been utilized in a variety of services such as e-commerce. When a remote server provides such e-commerce services to a user, it must verify the legitimacy of the user over an insecure communication channel. Therefore, remote user authentication has been widely deployed to verify the legitimacy of remote user login requests using mobile devices like smart cards. In this paper we propose a smart card-based authentication scheme that provides both user anonymity and mutual authentication between a remote server and a user. The proposed authentication scheme is a simple and efficient system applicable to the limited resource and low computing performance of the smart card. The proposed scheme provides not only resilience to potential attacks in the smart card-based authentication scheme, but also secure authentication functions. A smart card performs a simple one-way hash function, the operations of exclusive-or and concatenation in the authentication phase of the proposed scheme. The proposed scheme also provides user anonymity using a dynamic identity and key agreement, and secure password change.

  17. Anonymity versus privacy in the dictator game: revealing donor decisions to recipients does not substantially impact donor behavior.

    Directory of Open Access Journals (Sweden)

    Jeffrey Winking

    Full Text Available Anonymity is often offered in economic experiments in order to eliminate observer effects and induce behavior that would be exhibited under private circumstances. However, anonymity differs from privacy in that interactants are only unaware of each others' identities, while having full knowledge of each others' actions. Such situations are rare outside the laboratory and anonymity might not meet the requirements of some participants to psychologically engage as if their actions were private. In order to explore the impact of a lack of privacy on prosocial behaviors, I expand on a study reported in Dana et al. (2006 in which recipients were left unaware of the Dictator Game and given donations as "bonuses" to their show-up fees for other tasks. In the current study, I explore whether differences between a private Dictator Game (sensu Dana et al. (2006 and a standard anonymous one are due to a desire by dictators to avoid shame or to pursue prestige. Participants of a Dictator Game were randomly assigned to one of four categories-one in which the recipient knew of (1 any donation by an anonymous donor (including zero donations, (2 nothing at all, (3 only zero donations, and (4 and only non-zero donations. The results suggest that a lack of privacy increases the shame that selfish-acting participants experience, but that removing such a cost has only minimal effects on actual behavior.

  18. Sustained beta-cell dysfunction but normalized islet mass in aged thrombospondin-1 deficient mice.

    Directory of Open Access Journals (Sweden)

    Carl Johan Drott

    Full Text Available Pancreatic islet endothelial cells have in recent years been shown to support beta-cell mass and function by paracrine interactions. Recently, we identified an islets endothelial-specific glycoprotein, thrombospondin-1 (TSP-1, that showed to be of importance for islet angiogenesis and beta-cell function in young mice. The present study aimed to investigate long-term consequences for islet morphology and beta-cell function of TSP-1 deficiency. Islet and beta-cell mass were observed increased at 10-12 weeks of age in TSP-1 deficient mice, but were normalized before 16 weeks of age when compared to wild-type controls. Islet vascularity was normal in 10-12 and 16-week-old TSP-1 deficient animals, whereas islets of one-year-old animals lacking TSP-1 were hypervascular. Beta-cell dysfunction in TSP-1 deficient animals was present at similar magnitudes between 10-12 and 52 weeks of age, as evaluated by glucose tolerance tests. The insulin secretion capacity in vivo of islets in one-year-old TSP-1 deficient animals was only ∼15% of that in wild-type animals. Using a transplantation model, we reconstituted TSP-1 in adult TSP-deficient islets. In contrast to neonatal TSP-1 deficient islets that we previously reported to regain function after TSP-1 reconstitution, adult islets failed to recover. We conclude that TSP-1 deficiency in islets causes changing vascular and endocrine morphological alterations postnatally, but is coupled to a chronic beta-cell dysfunction. The beta-cell dysfunction induced by TSP-1 deficiency is irreversible if not substituted early in life.

  19. Actin, actin-binding proteins, and actin-related proteins in the nucleus.

    Science.gov (United States)

    Kristó, Ildikó; Bajusz, Izabella; Bajusz, Csaba; Borkúti, Péter; Vilmos, Péter

    2016-04-01

    Extensive research in the past decade has significantly broadened our view about the role actin plays in the life of the cell and added novel aspects to actin research. One of these new aspects is the discovery of the existence of nuclear actin which became evident only recently. Nuclear activities including transcriptional activation in the case of all three RNA polymerases, editing and nuclear export of mRNAs, and chromatin remodeling all depend on actin. It also became clear that there is a fine-tuned equilibrium between cytoplasmic and nuclear actin pools and that this balance is ensured by an export-import system dedicated to actin. After over half a century of research on conventional actin and its organizing partners in the cytoplasm, it was also an unexpected finding that the nucleus contains more than 30 actin-binding proteins and new classes of actin-related proteins which are not able to form filaments but had evolved nuclear-specific functions. The actin-binding and actin-related proteins in the nucleus have been linked to RNA transcription and processing, nuclear transport, and chromatin remodeling. In this paper, we attempt to provide an overview of the wide range of information that is now available about actin, actin-binding, and actin-related proteins in the nucleus.

  20. Anonymity as an Instructional Scaffold in Peer Assessment: Its Effects on Peer Feedback Quality and Evolution in Students' Perceptions about Peer Assessment Skills

    Science.gov (United States)

    Rotsaert, Tijs; Panadero, Ernesto; Schellens, Tammy

    2018-01-01

    Although previous research has indicated that providing anonymity is an effective way to create a safe peer assessment setting, continuously ensuring anonymity prevents students from experiencing genuine two-way interactive feedback dialogues. The present study investigated how installing a transitional approach from an anonymous to a…

  1. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks.

    Science.gov (United States)

    Jung, Jaewook; Kim, Jiye; Choi, Younsung; Won, Dongho

    2016-08-16

    In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.'s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.'s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes.

  2. ZebraLancer: Private and Anonymous Crowdsourcing System atop Open Blockchain

    OpenAIRE

    Lu, Yuan; Tang, Qiang; Wang, Guiling

    2018-01-01

    We design and implement the first private and anonymous decentralized crowdsourcing system ZebraLancer. It realizes the fair exchange (i.e. security against malicious workers and dishonest requesters) without using any third-party arbiter. More importantly, it overcomes two fundamental challenges of decentralization, i.e. data leakage and identity breach. First, our outsource-then-prove methodology resolves the critical tension between blockchain transparency and data confidentiality without ...

  3. Secondary Analysis of Audio Data. Technical Procedures for Virtual Anonymization and Pseudonymization

    Directory of Open Access Journals (Sweden)

    Henning Pätzold

    2005-01-01

    Full Text Available Qualitative material presented as audio data requires a greater degree of protecting of anonymity than for example textual data. Apart from the verbal content, it carries paraverbal aspects including voice characteristics, thus making it easier to identify the speaker. This complicates secondary analysis or reanalysis conducted by researchers who were not involved in the data collection. Difficulties increase if the chances are high that the researcher and the interviewee come in contact for example through a meeting. This paper describes the technical procedures that are used to modify the sound of the audio source in a way that it reduces the possibility of recognition (i.e. similar to that of a carefully written transcript. A discussion of the technical possibilities of this procedure along with an exploration of the boundaries of anonymization is presented. URN: urn:nbn:de:0114-fqs0501249

  4. The Pattern of Drug Abuse in Anonymous Adidcts

    Directory of Open Access Journals (Sweden)

    Seyede Maryam Vahdat-Shariat-Panahi

    2010-04-01

    Full Text Available Objective: Having the information about pattern of substance abuse in the community and its epidemiological features is one of the most important protocols for evaluation, follow–up and control of the use of these substances. The aim of this study was to evaluate the patterns of substances abuse among narcotic anonymous (N. A. addicted patients. Materials & Methods: In this descriptive and analytical study, three hundred patients from narcotic abusers anonymous (N. A. association who were referred to a treatment center in Tehran were participated consecutively. The information about demographic characteristics, socioeconomic status, type of drug and the patterns of substance abuse of all cases were collected by researcher made questionnaire. Data were analyzed by Chi–Square test. Results: 80% of the patients were male. Almost 65. 2% of cases aged less than 40 years. More than two–third of cases had free jobs and 21. 2% of them were unemployed. Also, 32% of patients had college degrees. The most common types of abused substance were opium (88%, cigarette (76.7%, and alcohol (63% and 34% of them used substances intravenously. The use of alcohol (P=0.033, cannabis (P<0.001, cocaine (P=0.009 and ecstasy (P<0.001 was more prevalent significantly in the cases less than 40 years old than the elderly. Conclusion: It seems that the trend of substance abuse has been changed to younger population. The pattern of drug abuse in young adults is more toward psychosis drugs such as cocaine and ecstasy.

  5. Your choice MATor(s) : large-scale quantitative anonymity assessment of Tor path selection algorithms against structural attacks

    OpenAIRE

    Backes, Michael; Meiser, Sebastian; Slowik, Marcin

    2015-01-01

    In this paper, we present a rigorous methodology for quantifying the anonymity provided by Tor against a variety of structural attacks, i.e., adversaries that compromise Tor nodes and thereby perform eavesdropping attacks to deanonymize Tor users. First, we provide an algorithmic approach for computing the anonymity impact of such structural attacks against Tor. The algorithm is parametric in the considered path selection algorithm and is, hence, capable of reasoning about variants of Tor and...

  6. A Framework For Enhancing Privacy In Location Based Services Using K-Anonymity Model

    Directory of Open Access Journals (Sweden)

    Jane Mugi

    2015-08-01

    Full Text Available Abstract This paper presents a framework for enhancing privacy in Location Based Services using K-anonymity model. Users of location based services have to reveal their location information in order to use these services however this has threatened the user privacy. K-anonymity approach has been studied extensively in various forms. However it is only effective when the user location is fixed. When a user moves and continuously sends their location information the location service provider can approximate user trajectory which poses a threat to the trajectory privacy of the user. This framework will ensure that user privacy is enhanced for both snapshot and continuous queries. The efficiency and effectiveness of the proposed framework was evaluated the results indicate that the proposed framework has high success rate and good run time performance.

  7. Medical Relabeling in Gamblers Anonymous: The Construction of an Ideal Member.

    Science.gov (United States)

    Turner, David N.; Saunders, Danny

    1990-01-01

    Observed 2 Gamblers Anonymous (GA) groups in South Wales over a 12-month period. Determined 2 broad consequences arose from encountering fellow sufferers: acceptance of diagnosis and commitment to recovery and to will of GA, or rejection of the diagnosis with the knowledge that they are returning to the outside world with a reconstituted…

  8. Quem controla a política de ninguém? Anonymous Brasil e o ativismo hacker nas redes de comunicação (Who control the politics of no one? Anonymous Brazil and hacktivism in communication networks Doi: 10.5212/Emancipacao.v.15i2.0008

    Directory of Open Access Journals (Sweden)

    Bárbara Maria Farias Mota

    2016-08-01

    Full Text Available Resumo: Esse artigo analisa a atuação política dos hackers a partir de um estudo de caso da rede Anonymous Brasil, uma das vertentes do hacktivismo no contexto brasileiro. Para tanto, utiliza as postagens de um dos diferentes perfis Anonymous no Twitter, no período da Operação Hacking Cup (#OpHackingCup, que consistiu em uma série de protestos virtuais contra a Copa do Mundo de 2014. Metodologicamente, o desenho de pesquisa adota uma abordagem multimétodo, unindo análise de conteúdo e estatística descritiva. Os resultados evidenciam que por meio da utilização de ferramentas digitais transgressivas e do anonimato, esses atores não estatais evidenciam táticas estratégicas de ação diante do controle/vigilância presentes na sociedade contemporânea. Palavras-chave: Anonymous Brasil. Ativismo hacker. Redes informacionais. Abstract: This article analyses the political actuation of hackers from a study case of the Anonymous Brazil network, one of the faces of hacktivism in the Brazilian context. For such, this paper utilises tweets from one Anonymous profile in Twitter, during the period of the Operation Hacking Cup (#OpHackingCup, which entailed several digital protests against the 2014 World Cup. Methodologically, this paper adopts a research design based on a multi-method approach, uniting content analysis and descriptive statistics. The results show that, by the means of transgressive digital tools and anonymity, those actors spotlight strategical tactics as a countermeasure to the control/surveillance that is present in the contemporary society. Keywords: Anonymous Brazil. Hacktivism. Informational networks.

  9. The clinical expression of hereditary protein C and protein S deficiency: : a relation to clinical thrombotic risk-factors and to levels of protein C and protein S

    NARCIS (Netherlands)

    Henkens, C. M. A.; van der Meer, J.; Hillege, J. L.; Bom, V. J. J.; Halie, M. R.; van der Schaaf, W.

    We investigated 103 first-degree relatives of 13 unrelated protein C or protein S deficient patients to assess the role of additional thrombotic risk factors and of protein C and protein S levels in the clinical expression of hereditary protein C and protein S deficiency. Fifty-seven relatives were

  10. 1-RAAP: An Efficient 1-Round Anonymous Authentication Protocol for Wireless Body Area Networks.

    Science.gov (United States)

    Liu, Jingwei; Zhang, Lihuan; Sun, Rong

    2016-05-19

    Thanks to the rapid technological convergence of wireless communications, medical sensors and cloud computing, Wireless Body Area Networks (WBANs) have emerged as a novel networking paradigm enabling ubiquitous Internet services, allowing people to receive medical care, monitor health status in real-time, analyze sports data and even enjoy online entertainment remotely. However, because of the mobility and openness of wireless communications, WBANs are inevitably exposed to a large set of potential attacks, significantly undermining their utility and impeding their widespread deployment. To prevent attackers from threatening legitimate WBAN users or abusing WBAN services, an efficient and secure authentication protocol termed 1-Round Anonymous Authentication Protocol (1-RAAP) is proposed in this paper. In particular, 1-RAAP preserves anonymity, mutual authentication, non-repudiation and some other desirable security properties, while only requiring users to perform several low cost computational operations. More importantly, 1-RAAP is provably secure thanks to its design basis, which is resistant to the anonymous in the random oracle model. To validate the computational efficiency of 1-RAAP, a set of comprehensive comparative studies between 1-RAAP and other authentication protocols is conducted, and the results clearly show that 1-RAAP achieves the best performance in terms of computational overhead.

  11. 1-RAAP: An Efficient 1-Round Anonymous Authentication Protocol for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Jingwei Liu

    2016-05-01

    Full Text Available Thanks to the rapid technological convergence of wireless communications, medical sensors and cloud computing, Wireless Body Area Networks (WBANs have emerged as a novel networking paradigm enabling ubiquitous Internet services, allowing people to receive medical care, monitor health status in real-time, analyze sports data and even enjoy online entertainment remotely. However, because of the mobility and openness of wireless communications, WBANs are inevitably exposed to a large set of potential attacks, significantly undermining their utility and impeding their widespread deployment. To prevent attackers from threatening legitimate WBAN users or abusing WBAN services, an efficient and secure authentication protocol termed 1-Round Anonymous Authentication Protocol (1-RAAP is proposed in this paper. In particular, 1-RAAP preserves anonymity, mutual authentication, non-repudiation and some other desirable security properties, while only requiring users to perform several low cost computational operations. More importantly, 1-RAAP is provably secure thanks to its design basis, which is resistant to the anonymous in the random oracle model. To validate the computational efficiency of 1-RAAP, a set of comprehensive comparative studies between 1-RAAP and other authentication protocols is conducted, and the results clearly show that 1-RAAP achieves the best performance in terms of computational overhead.

  12. Is the introduction of anonymous delivery associated with a reduction of high neonaticide rates in Austria? A retrospective study.

    Science.gov (United States)

    Klier, C M; Grylli, C; Amon, S; Fiala, C; Weizmann-Henelius, G; Pruitt, S L; Putkonen, H

    2013-03-01

    To assess rates of neonaticide after the implementation of a preventative 'anonymous delivery' law in mid-2001 in Austria. Women are allowed to access antenatal care and give birth in a hospital anonymously, without showing any ID and free of charge. Retrospective study. A complete census of police-reported neonaticides was obtained from the police statistics of Austria, Sweden and Finland. All neonaticides reported to the police, 1991-2009. Neonaticide rates before (1991-2001) and after (2002-2009) the introduction of anonymous delivery legislation per 100 000 births. The Mann-Whitney U-test for two independent samples was used to compare neonaticide rates in the period before the new law was introduced with the rates observed after the implementation of the new law for each country. On average the rate of police-reported neonaticides was 7.2 per 100 000 births (SD 3.5, median 7.1) in Austria prior to the new law being passed, and 3.1 per 100 000 births (SD 2.1, median 2.6) after the law was passed. A significant decrease in neonaticide was observed in Austria after the implementation of anonymous delivery (Mann-Whitney U-test P = 0.017). Whereas the Finnish and Swedish rates were lower than the Austrian rates before and after the implementation of the Austrian law, they remained unchanged over the study period. Our data demonstrate a significant decrease in the number of police-reported neonaticides in Austria after the implementation of anonymous delivery. Even though underlying factors associated with neonaticide are complex, the findings could indicate an effect of anonymous delivery in the prevention of this crime. © 2012 The Authors BJOG An International Journal of Obstetrics and Gynaecology © 2012 RCOG.

  13. A protein relational database and protein family knowledge bases to facilitate structure-based design analyses.

    Science.gov (United States)

    Mobilio, Dominick; Walker, Gary; Brooijmans, Natasja; Nilakantan, Ramaswamy; Denny, R Aldrin; Dejoannis, Jason; Feyfant, Eric; Kowticwar, Rupesh K; Mankala, Jyoti; Palli, Satish; Punyamantula, Sairam; Tatipally, Maneesh; John, Reji K; Humblet, Christine

    2010-08-01

    The Protein Data Bank is the most comprehensive source of experimental macromolecular structures. It can, however, be difficult at times to locate relevant structures with the Protein Data Bank search interface. This is particularly true when searching for complexes containing specific interactions between protein and ligand atoms. Moreover, searching within a family of proteins can be tedious. For example, one cannot search for some conserved residue as residue numbers vary across structures. We describe herein three databases, Protein Relational Database, Kinase Knowledge Base, and Matrix Metalloproteinase Knowledge Base, containing protein structures from the Protein Data Bank. In Protein Relational Database, atom-atom distances between protein and ligand have been precalculated allowing for millisecond retrieval based on atom identity and distance constraints. Ring centroids, centroid-centroid and centroid-atom distances and angles have also been included permitting queries for pi-stacking interactions and other structural motifs involving rings. Other geometric features can be searched through the inclusion of residue pair and triplet distances. In Kinase Knowledge Base and Matrix Metalloproteinase Knowledge Base, the catalytic domains have been aligned into common residue numbering schemes. Thus, by searching across Protein Relational Database and Kinase Knowledge Base, one can easily retrieve structures wherein, for example, a ligand of interest is making contact with the gatekeeper residue.

  14. Preference for anonymity in sperm donation for artificial insemination: an experience from low-resource settings in Nigeria

    Science.gov (United States)

    Ezugwu, Euzebus Chinonye; Eleje, George U; Iyoke, Chukwuemeka A; Mba, Sunday G; Nnaji, Henry C; Enechukwu, Chukwunonso I; Nkwo, Peter O

    2018-01-01

    Objective Anonymous sperm donation is a common practice in Nigeria with its associated legal and ethical challenges. This study aimed to investigate infertile couples’ opinions about issues of sperm donor anonymity and to determine factors that might influence their preferences. Methods A cross-sectional, multicentered, questionnaire-based study was conducted among infertile couples attending infertility clinics in three tertiary hospitals in the south-eastern region of Nigeria over a period of 6 months. Results A total of 450 infertile couples were recruited consecutively from the three study centers. However, 450 females and 352 males (total=802) participated in the study. The level of awareness of artificial insemination using donor sperm for the management of male infertility among the respondents was 69.2%, while its acceptability rate was 62.7%. The majority of the respondents indicated their preference for secrecy and anonymity in sperm donation. Approximately 84% of the respondents indicated that the mode of conception should never be disclosed to the donor-conceived child, and ~92% of them indicated that the identity of the sperm donor should never be revealed to the donor-conceived child. Fear of adverse effect of such disclosure on the child and the possible of rejection of the father in order to seek for the donor were the major reasons for their preference for anonymity. Conclusion Although it has been argued that every child has a right to know their genetic parents, the reasons proffered by the respondents for their preference for anonymity cannot be totally ignored. Establishing a regulatory body and enacting laws that will address both the ethical and legal issues associated with gamete donation in the developing world will go a long way in promoting openness and honest communication with donor-conceived children. PMID:29670338

  15. CRYPTOGRAPHIC SECURE CLOUD STORAGE MODEL WITH ANONYMOUS AUTHENTICATION AND AUTOMATIC FILE RECOVERY

    Directory of Open Access Journals (Sweden)

    Sowmiya Murthy

    2014-10-01

    Full Text Available We propose a secure cloud storage model that addresses security and storage issues for cloud computing environments. Security is achieved by anonymous authentication which ensures that cloud users remain anonymous while getting duly authenticated. For achieving this goal, we propose a digital signature based authentication scheme with a decentralized architecture for distributed key management with multiple Key Distribution Centers. Homomorphic encryption scheme using Paillier public key cryptosystem is used for encrypting the data that is stored in the cloud. We incorporate a query driven approach for validating the access policies defined by an individual user for his/her data i.e. the access is granted to a requester only if his credentials matches with the hidden access policy. Further, since data is vulnerable to losses or damages due to the vagaries of the network, we propose an automatic retrieval mechanism where lost data is recovered by data replication and file replacement with string matching algorithm. We describe a prototype implementation of our proposed model.

  16. Quantum election scheme based on anonymous quantum key distribution

    International Nuclear Information System (INIS)

    Zhou Rui-Rui; Yang Li

    2012-01-01

    An unconditionally secure authority-certified anonymous quantum key distribution scheme using conjugate coding is presented, based on which we construct a quantum election scheme without the help of an entanglement state. We show that this election scheme ensures the completeness, soundness, privacy, eligibility, unreusability, fairness, and verifiability of a large-scale election in which the administrator and counter are semi-honest. This election scheme can work even if there exist loss and errors in quantum channels. In addition, any irregularity in this scheme is sensible. (general)

  17. Relations between protein production, protein quality and environmental factors in Pisum mutants

    International Nuclear Information System (INIS)

    Gottschalk, W.; Mueller, H.P.; Wolff, G.

    1975-01-01

    The seed protein content of 138 radiation-induced Pisum mutants was determined. The variability of this genetically well-defined material agrees approximately with that of the world collection of Pisum sativum. Some environmental factors to a great extent influence the protein production of the mutants and the initial line. Therefore, it is necessary to consider the relations between the genetically controlled protein production and its dependence upon the environmental factors. This is especially evident if the protein situation of the same genotypes cultivated under the moderate climatic conditions of middle Europe is compared with the subtropical conditions of India. A generally firm correlation between seed size and protein content could not be found in material regarding 148 different mutants of our assortment. Therefore, the selection of small-grained mutants does not result in a selection of protein-rich genotypes in Pisum sativum. Considering all the criteria positively and negatively influencing the protein production, a positive situation could be found in some mutants, especially in the fasciated ones. Furthermore, an improvement of the protein quality could be reached by a genetically conditioned alteration of the globulin-albumin ratio leading to an increase of some essential amino acids such as methionine and lysine. The combined action of mutant genes results in unexpected changes of the protein quantity as well as the quality of the recombinants in relation to their parental mutants. The comparison of some essential amino acids of our useful mutants with those of the varieties of other genera of the Leguminosae shows certain trends of biochemical alterations realized during evolutionary development of the family. (author)

  18. Forensic linguistics: Applications of forensic linguistics methods to anonymous letters

    OpenAIRE

    NOVÁKOVÁ, Veronika

    2011-01-01

    The title of my bachelor work is ?Forensic linguistics: Applications of forensic linguistics methods to anonymous letters?. Forensic linguistics is young and not very known branch of applied linguistics. This bachelor work wants to introduce forensic linguistics and its method. The bachelor work has two parts ? theory and practice. The theoretical part informs about forensic linguistics in general. Its two basic aspects utilized in forensic science and respective methods. The practical part t...

  19. Informed Traders as Liquidity Providers: Anonymity, Liquidity and Price Formation

    OpenAIRE

    Barbara Rindi

    2008-01-01

    The tendency to introduce anonymity into financial markets apparently runs counter to the theory supporting transparency. This paper studies the impact of pre-trade transparency on liquidity in a market where risk-averse traders accommodate the liquidity demand of noise traders. When some risk-averse investors become informed, an adverse selection problem ensues for the others, making them reluctant to supply liquidity. Hence the disclosure of traders' identities improves liquidity by mitigat...

  20. The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network

    Science.gov (United States)

    2014-02-01

    attack is also similar to those that rely on misbehaving receivers and optimistic ACKs to bypass flow control protocol mechanisms [40]–[42]. In particular...thank the anonymous reviewers for their feedback and suggestions, Damon McCoy for discussions about misbehaving receivers and authenticated signals...ping-o-death. html. [40] S. Savage, N. Cardwell, D. Wetherall, and T. Anderson, “TCP Con- gestion Control with a Misbehaving Receiver,” ACM SIGCOMM CCR

  1. Predictive model of thrombospondin-1 and vascular endothelial growth factor in breast tumor tissue.

    Science.gov (United States)

    Rohrs, Jennifer A; Sulistio, Christopher D; Finley, Stacey D

    2016-01-01

    Angiogenesis, the formation of new blood capillaries from pre-existing vessels, is a hallmark of cancer. Thus far, strategies for reducing tumor angiogenesis have focused on inhibiting pro-angiogenic factors, while less is known about the therapeutic effects of mimicking the actions of angiogenesis inhibitors. Thrombospondin-1 (TSP1) is an important endogenous inhibitor of angiogenesis that has been investigated as an anti-angiogenic agent. TSP1 impedes the growth of new blood vessels in many ways, including crosstalk with pro-angiogenic factors. Due to the complexity of TSP1 signaling, a predictive systems biology model would provide quantitative understanding of the angiogenic balance in tumor tissue. Therefore, we have developed a molecular-detailed, mechanistic model of TSP1 and vascular endothelial growth factor (VEGF), a promoter of angiogenesis, in breast tumor tissue. The model predicts the distribution of the angiogenic factors in tumor tissue, revealing that TSP1 is primarily in an inactive, cleaved form due to the action of proteases, rather than bound to its cellular receptors or to VEGF. The model also predicts the effects of enhancing TSP1's interactions with its receptors and with VEGF. To provide additional predictions that can guide the development of new anti-angiogenic drugs, we simulate administration of exogenous TSP1 mimetics that bind specific targets. The model predicts that the CD47-binding TSP1 mimetic dramatically decreases the ratio of receptor-bound VEGF to receptor-bound TSP1, in favor of anti-angiogenesis. Thus, we have established a model that provides a quantitative framework to study the response to TSP1 mimetics.

  2. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jaewook Jung

    2016-08-01

    Full Text Available In wireless sensor networks (WSNs, a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.’s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.’s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes.

  3. dCache, towards Federated Identities & Anonymized Delegation

    Science.gov (United States)

    Ashish, A.; Millar, AP; Mkrtchyan, T.; Fuhrmann, P.; Behrmann, G.; Sahakyan, M.; Adeyemi, O. S.; Starek, J.; Litvintsev, D.; Rossi, A.

    2017-10-01

    For over a decade, dCache has relied on the authentication and authorization infrastructure (AAI) offered by VOMS, Kerberos, Xrootd etc. Although the established infrastructure has worked well and provided sufficient security, the implementation of procedures and the underlying software is often seen as a burden, especially by smaller communities trying to adopt existing HEP software stacks [1]. Moreover, scientists are increasingly dependent on service portals for data access [2]. In this paper, we describe how federated identity management systems can facilitate the transition from traditional AAI infrastructure to novel solutions like OpenID Connect. We investigate the advantages offered by OpenID Connect in regards to ‘delegation of authentication’ and ‘credential delegation for offline access’. Additionally, we demonstrate how macaroons can provide a more fine-granular authorization mechanism that supports anonymized delegation.

  4. Protecting whistle-blowers: Anonymity on the internet

    International Nuclear Information System (INIS)

    Guinnessy, P.

    1997-01-01

    Even though strict legislation exists in many countries, it appears that the next few years should be a golden opportunity for groups to successfully monitor and publish the activity of the nuclear states, and human right violations through use of the Internet. The reasons for this are: 1. The Internet is becoming widespread even in repressive regimes; 2. Software is available to either hide messages from others or hide the mailers account; 3. Information from sites in other countries can be easily obtained to be read inside repressive regimes from the Internet. In this regard It is suggested the Pugwash or a similar organization should set up either an anonymous account to receive information or maybe use a more heavily protected cyperpunk remailer. Such an ability would hopefully prompt more people to notify treaty violations

  5. Location Prediction Based on Transition Probability Matrices Constructing from Sequential Rules for Spatial-Temporal K-Anonymity Dataset

    Science.gov (United States)

    Liu, Zhao; Zhu, Yunhong; Wu, Chenxue

    2016-01-01

    Spatial-temporal k-anonymity has become a mainstream approach among techniques for protection of users’ privacy in location-based services (LBS) applications, and has been applied to several variants such as LBS snapshot queries and continuous queries. Analyzing large-scale spatial-temporal anonymity sets may benefit several LBS applications. In this paper, we propose two location prediction methods based on transition probability matrices constructing from sequential rules for spatial-temporal k-anonymity dataset. First, we define single-step sequential rules mined from sequential spatial-temporal k-anonymity datasets generated from continuous LBS queries for multiple users. We then construct transition probability matrices from mined single-step sequential rules, and normalize the transition probabilities in the transition matrices. Next, we regard a mobility model for an LBS requester as a stationary stochastic process and compute the n-step transition probability matrices by raising the normalized transition probability matrices to the power n. Furthermore, we propose two location prediction methods: rough prediction and accurate prediction. The former achieves the probabilities of arriving at target locations along simple paths those include only current locations, target locations and transition steps. By iteratively combining the probabilities for simple paths with n steps and the probabilities for detailed paths with n-1 steps, the latter method calculates transition probabilities for detailed paths with n steps from current locations to target locations. Finally, we conduct extensive experiments, and correctness and flexibility of our proposed algorithm have been verified. PMID:27508502

  6. Social influence in computer-mediated communication : The effects of anonymity on group behavior

    NARCIS (Netherlands)

    Postmes, T; Spears, R; Sakhel, K; de Groot, D

    2001-01-01

    Two studies examined hypotheses derived from a Social Identity model of Deindividuation Effects (SIDE) as applied to social influence in computer-mediated communication (CMC) in groups. This model predicts that anonymity can increase social influence if a common group identity is salient. In a first

  7. The thrombospondin-1 N700S polymorphism is associated with early myocardial infarction without altering von Willebrand factor multimer size.

    Science.gov (United States)

    Zwicker, Jeffrey I; Peyvandi, Flora; Palla, Roberta; Lombardi, Rossana; Canciani, Maria Teresa; Cairo, Andrea; Ardissino, Diego; Bernardinelli, Luisa; Bauer, Kenneth A; Lawler, Jack; Mannucci, Pier

    2006-08-15

    The N700S polymorphism of thrombospondin-1 (TSP-1) has been identified as a potential genetic risk factor for myocardial infarction (MI). In a large case-control study of 1425 individuals who survived a myocardial infarction prior to age 45, the N700S polymorphism was a significant risk factor for myocardial infarction in both homozygous (odds ratio [OR] 1.9, 95% confidence interval [CI] 1.1-3.3, P = .01) and heterozygous carriers of the S700 allele (OR 1.4, 95% CI 1.1-3.3, P = .01). TSP-1 has been shown to reduce von Willebrand factor (VWF) multimer size, and the domain responsible for VWF-reducing activity has been localized to the calcium-binding C-terminal sequence. As the N700S polymorphism was previously shown to alter the function of this domain, we investigated whether the altered VWF-reducing activity of TSP-1 underlies the observed prothrombotic phenotype. The TSP1 N700S polymorphism did not influence VWF multimer size in patients homozygous for either allele nor was there a significant reduction of VWF multimer size following incubation with recombinant N700S fragments or platelet-derived TSP-1.

  8. Use of anonymous Web communities and websites by medical consumers in Japan to research drug information.

    Science.gov (United States)

    Kishimoto, Keiko; Fukushima, Noriko

    2011-01-01

    In this study, we investigated the status of researching drug information online, and the type of Internet user who uses anonymous Web communities and websites. A Web-based cross-sectional survey of 10875 male and female Internet users aged 16 and over was conducted in March 2010. Of 10282 analyzed respondents, excluding medical professionals, about 47% reported that they had previously searched the Internet for drug information and had used online resources ranging from drug information search engines and pharmaceutical industry websites to social networking sites and Twitter. Respondents who had researched drug information online (n=4861) were analyzed by two multivariable logistic regressions. In Model 1, the use of anonymous websites associated with age (OR, 0.778; 95% CI, 0.742-0.816), referring to the reputation and the narrative of other Internet users on shopping (OR, 1.640; 95% CI, 1.450-1.855), taking a prescription drug (OR, 0.806; 95% CI, 0.705-0.922), and frequent consulting with non-professionals about medical care and health (OR, 1.613; 95% CI, 1.396-1.865). In Model 2, use of only anonymous websites was associated with age (OR, 0.753; 95% CI, 0.705-0.805), using the Internet daily (OR, 0.611; 95% CI, 0.462-0.808), taking a prescription drug (OR, 0.614; 95% CI, 0.505-0.747), and experience a side effect (OR, 0.526; 95% CI, 0.421-0.658). The analysis revealed the profiles of Internet users who researched drug information on social media sites where the information providers are anonymous and do not necessarily have adequate knowledge of medicine and online information literacy.

  9. Conducting Anonymous, Incentivized, Online Surveys With Sexual and Gender Minority Adolescents: Lessons Learned From a National Polyvictimization Study.

    Science.gov (United States)

    Sterzing, Paul R; Gartner, Rachel E; McGeough, Briana L

    2018-03-01

    Sexual and gender minority adolescents represent an understudied and hard-to-reach population who experience higher rates of mental and behavioral health problems in comparison to their cisgender, heterosexual peers. Online surveys and the proliferation of Internet-connected devices among adolescents offer an exciting opportunity for researchers to begin addressing research gaps and past methodological limitations with these hard-to-reach populations. The purpose of this article is to provide guidance to researchers who are designing and implementing anonymous, incentivized, online surveys by examining the following critical domains-(a) recruitment and engagement: means of leveraging social media and videos to recruit and engage a more nationally representative sample; (b) safety and protection: strategies for administering informed consent and protecting participant anonymity and well-being; and (c) data integrity: mechanisms to detect dishonest and repeat responders. To facilitate discussion of these aims, concrete examples are used from SpeakOut-a 3-year, national study funded by the National Institute of Justice that utilized an anonymous, incentivized, online survey with a large sample of sexual and gender minority adolescents ( N = 1,177) to identify the prevalence, incidence, and correlates of polyvictimization. The article concludes with lessons learned from this national study and recommendations for technological innovations and future research that will strengthen the utility of anonymous, incentivized, online surveys to study sexual and gender minority adolescents and other hard-to-reach populations.

  10. A lightweight and secure two factor anonymous authentication protocol for Global Mobility Networks

    Science.gov (United States)

    2018-01-01

    Global Mobility Networks(GLOMONETs) in wireless communication permits the global roaming services that enable a user to leverage the mobile services in any foreign country. Technological growth in wireless communication is also accompanied by new security threats and challenges. A threat-proof authentication protocol in wireless communication may overcome the security flaws by allowing only legitimate users to access a particular service. Recently, Lee et al. found Mun et al. scheme vulnerable to different attacks and proposed an advanced secure scheme to overcome the security flaws. However, this article points out that Lee et al. scheme lacks user anonymity, inefficient user authentication, vulnerable to replay and DoS attacks and Lack of local password verification. Furthermore, this article presents a more robust anonymous authentication scheme to handle the threats and challenges found in Lee et al.’s protocol. The proposed protocol is formally verified with an automated tool(ProVerif). The proposed protocol has superior efficiency in comparison to the existing protocols. PMID:29702675

  11. Business Information Exchange System with Security, Privacy, and Anonymity

    Directory of Open Access Journals (Sweden)

    Sead Muftic

    2016-01-01

    Full Text Available Business Information Exchange is an Internet Secure Portal for secure management, distribution, sharing, and use of business e-mails, documents, and messages. It has three applications supporting three major types of information exchange systems: secure e-mail, secure instant messaging, and secure sharing of business documents. In addition to standard security services for e-mail letters, which are also applied to instant messages and documents, the system provides innovative features of privacy and full anonymity of users and their locations, actions, transactions, and exchanged resources. In this paper we describe design, implementation, and use of the system.

  12. "Un-Googling” publications: The ethics and problems of anonymization

    DEFF Research Database (Denmark)

    Shklovski, Irina; Vertesi, Janet

    2013-01-01

    Digital tools of research dissemination make scholarly publications accessible to the public at large through simple search engines. As a result, the users that we study, interview, and cite may be at risk of exposure to unwelcome types of scrutiny and scholars must grapple with challenges...... to the ethics of exposure of our research participants. We present one approach to anonymization of research results with search engines in mind, which we call un-Googling, that we have developed to minimize risk to our participants. We discuss the considerations that this approach raises and pose a challenge...

  13. Osmotin, a Pathogenesis-Related Protein

    Czech Academy of Sciences Publication Activity Database

    Viktorová, J.; Krásný, Lukáš; Kamlar, M.; Nováková, M.; Macková, M.; Macek, T.

    2012-01-01

    Roč. 13, č. 7 (2012), s. 672-681 ISSN 1389-2037 Grant - others:GA ČR(CZ) GAP501/11/1654; GA ČR(CZ) GA522/09/1693 Program:GA; GA Institutional support: RVO:61388971 Keywords : osmotin * pathogenesis-related proteins * antifungal activity Subject RIV: CE - Biochemistry Impact factor: 2.326, year: 2012

  14. Hacktivism 1-2-3: how privacy enhancing technologies change the face of anonymous hacktivism

    NARCIS (Netherlands)

    Bodó, B.

    2014-01-01

    This short essay explores how the notion of hacktivism changes due to easily accessible, military grade Privacy Enhancing Technologies (PETs). Privacy Enhancing Technologies, technological tools which provide anonymous communications and protect users from online surveillance enable new forms of

  15. Structural studies of human glioma pathogenesis-related protein 1

    Energy Technology Data Exchange (ETDEWEB)

    Asojo, Oluwatoyin A., E-mail: oasojo@unmc.edu [College of Medicine, Nebraska Medical Center, Omaha, NE 68198-6495 (United States); Koski, Raymond A.; Bonafé, Nathalie [L2 Diagnostics LLC, 300 George Street, New Haven, CT 06511 (United States); College of Medicine, Nebraska Medical Center, Omaha, NE 68198-6495 (United States)

    2011-10-01

    Structural analysis of a truncated soluble domain of human glioma pathogenesis-related protein 1, a membrane protein implicated in the proliferation of aggressive brain cancer, is presented. Human glioma pathogenesis-related protein 1 (GLIPR1) is a membrane protein that is highly upregulated in brain cancers but is barely detectable in normal brain tissue. GLIPR1 is composed of a signal peptide that directs its secretion, a conserved cysteine-rich CAP (cysteine-rich secretory proteins, antigen 5 and pathogenesis-related 1 proteins) domain and a transmembrane domain. GLIPR1 is currently being investigated as a candidate for prostate cancer gene therapy and for glioblastoma targeted therapy. Crystal structures of a truncated soluble domain of the human GLIPR1 protein (sGLIPR1) solved by molecular replacement using a truncated polyalanine search model of the CAP domain of stecrisp, a snake-venom cysteine-rich secretory protein (CRISP), are presented. The correct molecular-replacement solution could only be obtained by removing all loops from the search model. The native structure was refined to 1.85 Å resolution and that of a Zn{sup 2+} complex was refined to 2.2 Å resolution. The latter structure revealed that the putative binding cavity coordinates Zn{sup 2+} similarly to snake-venom CRISPs, which are involved in Zn{sup 2+}-dependent mechanisms of inflammatory modulation. Both sGLIPR1 structures have extensive flexible loop/turn regions and unique charge distributions that were not observed in any of the previously reported CAP protein structures. A model is also proposed for the structure of full-length membrane-bound GLIPR1.

  16. A Secure and Anonymous Two-Factor Authentication Protocol in Multiserver Environment

    Directory of Open Access Journals (Sweden)

    Chenyu Wang

    2018-01-01

    Full Text Available With the great development of network technology, the multiserver system gets widely used in providing various of services. And the two-factor authentication protocols in multiserver system attract more and more attention. Recently, there are two new schemes for multiserver environment which claimed to be secure against the known attacks. However, after a scrutinization of these two schemes, we found that (1 their description of the adversary’s abilities is inaccurate; (2 their schemes suffer from many attacks. Thus, firstly, we corrected their description on the adversary capacities to introduce a widely accepted adversary model and then summarized fourteen security requirements of multiserver based on the works of pioneer contributors. Secondly, we revealed that one of the two schemes fails to preserve forward secrecy and user anonymity and cannot resist stolen-verifier attack and off-line dictionary attack and so forth and also demonstrated that another scheme fails to preserve forward secrecy and user anonymity and is not secure to insider attack and off-line dictionary attack, and so forth. Finally, we designed an enhanced scheme to overcome these identified weaknesses, proved its security via BAN logic and heuristic analysis, and then compared it with other relevant schemes. The comparison results showed the superiority of our scheme.

  17. Proof-of-Work as Anonymous Micropayment: Rewarding a Tor Relay

    OpenAIRE

    Biryukov, Alex; Pustogarov, Ivan

    2015-01-01

    In this paper we propose a new micropayments scheme which can be used to reward Tor relay operators. Tor clients do not pay Tor relays with electronic cash directly but submit proof of work shares which the relays can resubmit to a crypto-currency mining pool. Relays credit users who submit shares with tickets that can later be used to purchase improved service. Both shares and tickets when sent over Tor circuits are anonymous. The analysis of the crypto-currencies market prices shows that th...

  18. Preference for anonymity in sperm donation for artificial insemination: an experience from low-resource settings in Nigeria

    Directory of Open Access Journals (Sweden)

    Ezugwu EC

    2018-04-01

    Full Text Available Euzebus Chinonye Ezugwu,1,2 George U Eleje,3,4 Chukwuemeka A Iyoke,1,2 Sunday G Mba,5 Henry C Nnaji,2 Chukwunonso I Enechukwu,4 Peter O Nkwo1,2 1Department of Obstetrics and Gynecology, Faculty of Medical Sciences, College of Medicine, University of Nigeria, Ittuku Ozalla Campus, Enugu State, Nigeria; 2Department of Obstetrics and Gynecology, University of Nigeria Teaching Hospital, Ituku-Ozalla, Enugu State, Nigeria; 3Department of Obstetrics and Gynecology, Faculty of Medicine, Nnamdi Azikiwe University, Awka, Anambra State, Nigeria; 4Department of Obstetrics and Gynecology, Nnamdi Azikiwe University Teaching Hospital, Nnewi, Anambra State, Nigeria; 5Department of Obstetrics and Gynecology, Enugu State University Teaching Hospital, Enugu State, Nigeria Objective: Anonymous sperm donation is a common practice in Nigeria with its associated legal and ethical challenges. This study aimed to investigate infertile couples’ opinions about issues of sperm donor anonymity and to determine factors that might influence their preferences.Methods: A cross-sectional, multicentered, questionnaire-based study was conducted among infertile couples attending infertility clinics in three tertiary hospitals in the south-eastern region of Nigeria over a period of 6 months.Results: A total of 450 infertile couples were recruited consecutively from the three study centers. However, 450 females and 352 males (total=802 participated in the study. The level of awareness of artificial insemination using donor sperm for the management of male infertility among the respondents was 69.2%, while its acceptability rate was 62.7%. The majority of the respondents indicated their preference for secrecy and anonymity in sperm donation. Approximately 84% of the respondents indicated that the mode of conception should never be disclosed to the donor-conceived child, and ~92% of them indicated that the identity of the sperm donor should never be revealed to the donor

  19. Mutual support and recovery in the Russian Alcoholics Anonymous online community

    Directory of Open Access Journals (Sweden)

    Lyytikäinen Laura

    2016-04-01

    Full Text Available AIMS – In Russia the paradigm of alcoholism as a disease is still in contrast to the general perception of alcoholics as weak-willed. This article studies alcoholism and recovery in Russia through the case study of the Russian Alcoholics Anonymous online group. It studies how people who are seeking help for their drinking problems in this online community come to incorporate a new self-understanding of being ill with alcoholism.

  20. Annotation and Anonymity: Playful Photo-Sharing by Visiting Groups of Teenagers

    OpenAIRE

    Rowland, Duncan; Appiah-Kubi, Kwamena; Shipp, Victoria; Mortier, Richard Michael; Benford, Steve

    2015-01-01

    This paper investigates the playful photo taking behaviour of teenagers during group visits to two touristic public events (an airshow and a guided tour of a museum). These studies provide the feedback for the iterative development of a smartphone based anonymous image annotation and sharing application. The resulting implications for the design of such photo systems are examined, specifically the appropriateness of opportunistic upload for social media. Playfulness in photography has many im...

  1. Keeping mum about dad: "contracts" to protect gamete donor anonymity.

    Science.gov (United States)

    Rees, Anne

    2012-06-01

    This article considers the legal status of so-called contracts for anonymity between fertility clinics and donors of gametes that were made in the period before legislation authorising disclosure. It notes that while clinics frequently cite the existence of these "contracts" to argue against retrospective legislation authorising disclosure of the donor's identity, they may be nothing more than one-sided statements of informed consent. However, the article notes that even if an agreement between a donor and a clinic is not contractual, it does not follow that a person conceived through assisted reproductive technology has any right of access to the identity of the donor. The writer has not been able to locate examples of written promises by the clinics promising anonymity. There are written promises by the donors not to seek the identity of the recipients. These promises do not bind the resulting offspring nor do they appear to be supported by consideration. The article suggests that the basis for any individual donor to restrain a clinic from revealing their identity may be found in promissory estoppel. Nevertheless, there is no real issue in Australia concerning clinics revealing these details absent legislative authority. The issue is whether parliaments will legislate to authorise the disclosure. The article notes that it would be rare for parliaments to legislate to overturn existing legal contracts but suggests that the contract argument may not be as strong as has been thought.

  2. Compatibility of Adlerian Theory and Practice with the Philosophy and Practices of Alcoholics Anonymous.

    Science.gov (United States)

    Carroll, Jane J.

    1999-01-01

    Tenets of Adlerian theory and practice are compatible with the philosophy and practices of Alcoholics Anonymous. Counselors can expect treatment approaches based on Adlerian counseling theory to be congruent with 12-step practices of individuals who are in recovery from alcohol dependence. (Author)

  3. Prediction of the Ebola Virus Infection Related Human Genes Using Protein-Protein Interaction Network.

    Science.gov (United States)

    Cao, HuanHuan; Zhang, YuHang; Zhao, Jia; Zhu, Liucun; Wang, Yi; Li, JiaRui; Feng, Yuan-Ming; Zhang, Ning

    2017-01-01

    Ebola hemorrhagic fever (EHF) is caused by Ebola virus (EBOV). It is reported that human could be infected by EBOV with a high fatality rate. However, association factors between EBOV and host still tend to be ambiguous. According to the "guilt by association" (GBA) principle, proteins interacting with each other are very likely to function similarly or the same. Based on this assumption, we tried to obtain EBOV infection-related human genes in a protein-protein interaction network using Dijkstra algorithm. We hope it could contribute to the discovery of novel effective treatments. Finally, 15 genes were selected as potential EBOV infection-related human genes. Copyright© Bentham Science Publishers; For any queries, please email at epub@benthamscience.org.

  4. METAL DELM - metal avrelianis contribution to the study of mining coins and anonymous quadrantes

    Directory of Open Access Journals (Sweden)

    Vojvoda Mirjana D.

    2016-01-01

    Full Text Available In the course of rescue archaeological investigations at the Viminacium necropolis of Vi{e Grobalja in 1984, one anonymous quadrans of the VIII Apollo group was discovered (cat. 1. It was discovered in trench 63 in the immediate vicinity of a grave with an inhumation (G 343 that, besides two pottery vessels, also yielded as grave offerings one as of Faustina the Elder, minted after her death, in AD 141. Other finds presented here are four specimens of Roman mining coins from the private collection of Petar Fajfri} from [abac (cat. 2-5. All specimens come from the well known site of Duge Njive in the area of the village of Banatsko Polje (Bogati} borough where, by all appearances, are the remains of a vicus or smaller settlement. Five specimens of mining coins from that site have already been published. Both mining coins and anonymous quadrantes represent, in general, rare types of numismatic finds. Nine anonymous quadrantes are known so far from the territory of Serbia (Table 1 and the provenance is known for three specimens from the region of Guberevac-Babe (Kosmaj, housed in the National Museum in Belgrade. All three belong to the Minerva group with an owl facing to the right represented on the reverse. For two more anonymous quadrantes the place of discovery is known: one specimen comes from Singidunum and belongs to the Mercury group and the other that was found at Viminacium and is the subject of this paper is of the Apollo group. There are four more specimens from unknown sites for which it is assumed that they come from the Upper Moesia territory. Two of them are from the Vajfert collection and two from the Kovačević collection in the National Museum in Belgrade, There has, however, been a somewhat greater number (38 of Roman mining coins discovered in Serbia (Table 1. We know the finding locations of 25 of them: from the Kosmaj area (Babe, Guberevac and Stojnik, the Ibar valley (from the vicinity of Trepča and So~anica, Ritopek

  5. Regulation of Cellular Redox Signaling by Matricellular Proteins in Vascular Biology, Immunology, and Cancer.

    Science.gov (United States)

    Roberts, David D; Kaur, Sukhbir; Isenberg, Jeffrey S

    2017-10-20

    In contrast to structural elements of the extracellular matrix, matricellular proteins appear transiently during development and injury responses, but their sustained expression can contribute to chronic disease. Through interactions with other matrix components and specific cell surface receptors, matricellular proteins regulate multiple signaling pathways, including those mediated by reactive oxygen and nitrogen species and H 2 S. Dysregulation of matricellular proteins contributes to the pathogenesis of vascular diseases and cancer. Defining the molecular mechanisms and receptors involved is revealing new therapeutic opportunities. Recent Advances: Thrombospondin-1 (TSP1) regulates NO, H 2 S, and superoxide production and signaling in several cell types. The TSP1 receptor CD47 plays a central role in inhibition of NO signaling, but other TSP1 receptors also modulate redox signaling. The matricellular protein CCN1 engages some of the same receptors to regulate redox signaling, and ADAMTS1 regulates NO signaling in Marfan syndrome. In addition to mediating matricellular protein signaling, redox signaling is emerging as an important pathway that controls the expression of several matricellular proteins. Redox signaling remains unexplored for many matricellular proteins. Their interactions with multiple cellular receptors remains an obstacle to defining signaling mechanisms, but improved transgenic models could overcome this barrier. Therapeutics targeting the TSP1 receptor CD47 may have beneficial effects for treating cardiovascular disease and cancer and have recently entered clinical trials. Biomarkers are needed to assess their effects on redox signaling in patients and to evaluate how these contribute to their therapeutic efficacy and potential side effects. Antioxid. Redox Signal. 27, 874-911.

  6. Protein Carbamylation: A Marker Reflecting Increased Age-Related Cell Oxidation

    Directory of Open Access Journals (Sweden)

    Julia Carracedo

    2018-05-01

    Full Text Available Carbamylation is a post-translational modification of proteins that may partake in the oxidative stress-associated cell damage, and its increment has been recently proposed as a “hallmark of aging”. The molecular mechanisms associated with aging are related to an increased release of free radicals. We have studied whether carbamylated proteins from the peripheral blood of healthy subjects are related to oxidative damage and aging, taking into account the gender and the immune profile of the subjects. The study was performed in healthy human volunteers. The detection of protein carbamylation and malondialdehyde (MDA levels was evaluated using commercial kits. The immune profile was calculated using parameters of immune cell function. The results show that the individuals from the elderly group (60–79 years old have increased carbamylated protein and MDA levels. When considered by gender, only men between 60 and 79 years old showed significantly increased carbamylated proteins and MDA levels. When those subjects were classified by their immune profile, the carbamylated protein levels were higher in those with an older immune profile. In conclusion, the carbamylation of proteins in peripheral blood is related to age-associated oxidative damage and to an aging functional immunological signature. Our results suggest that carbamylated proteins may play an important role at the cellular level in the aging process.

  7. Motility precedes egress of malaria parasites from oocysts

    Science.gov (United States)

    Klug, Dennis; Frischknecht, Friedrich

    2017-01-01

    Malaria is transmitted when an infected Anopheles mosquito deposits Plasmodium sporozoites in the skin during a bite. Sporozoites are formed within oocysts at the mosquito midgut wall and are released into the hemolymph, from where they invade the salivary glands and are subsequently transmitted to the vertebrate host. We found that a thrombospondin-repeat containing sporozoite-specific protein named thrombospondin-releated protein 1 (TRP1) is important for oocyst egress and salivary gland invasion, and hence for the transmission of malaria. We imaged the release of sporozoites from oocysts in situ, which was preceded by active motility. Parasites lacking TRP1 failed to migrate within oocysts and did not egress, suggesting that TRP1 is a vital component of the events that precede intra-oocyst motility and subsequently sporozoite egress and salivary gland invasion. DOI: http://dx.doi.org/10.7554/eLife.19157.001 PMID:28115054

  8. Proteomic Analysis of Sauvignon Blanc Grape Skin, Pulp and Seed and Relative Quantification of Pathogenesis-Related Proteins.

    Directory of Open Access Journals (Sweden)

    Bin Tian

    Full Text Available Thaumatin-like proteins (TLPs and chitinases are the main constituents of so-called protein hazes which can form in finished white wine and which is a great concern of winemakers. These soluble pathogenesis-related (PR proteins are extracted from grape berries. However, their distribution in different grape tissues is not well documented. In this study, proteins were first separately extracted from the skin, pulp and seed of Sauvignon Blanc grapes, followed by trypsin digestion and analysis by liquid chromatography-electrospray ionization-tandem mass spectrometry (LC-ESI-MS/MS. Proteins identified included 75 proteins from Sauvignon Blanc grape skin, 63 from grape pulp and 35 from grape seed, mostly functionally classified as associated with metabolism and energy. Some were present exclusively in specific grape tissues; for example, proteins involved in photosynthesis were only detected in grape skin and proteins found in alcoholic fermentation were only detected in grape pulp. Moreover, proteins identified in grape seed were less diverse than those identified in grape skin and pulp. TLPs and chitinases were identified in both Sauvignon Blanc grape skin and pulp, but not in the seed. To relatively quantify the PR proteins, the protein extracts of grape tissues were seperated by HPLC first and then analysed by SDS-PAGE. The results showed that the protein fractions eluted at 9.3 min and 19.2 min under the chromatographic conditions of this study confirmed that these corresponded to TLPs and chitinases seperately. Thus, the relative quantification of TLPs and chitinases in protein extracts was carried out by comparing the area of corresponding peaks against the area of a thamautin standard. The results presented in this study clearly demonstrated the distribution of haze-forming PR proteins in grape berries, and the relative quantification of TLPs and chitinases could be applied in fast tracking of changes in PR proteins during grape growth and

  9. Design and Implement of the Anonymous Communications in the Mobile IP Networks%移动IP中通信匿名技术的设计与实现

    Institute of Scientific and Technical Information of China (English)

    康凯; 郭伟; 吴诗其

    2002-01-01

    One of the key problems in the mobile communication is the anonymous communication. The mobile userwants to hide his real identifying information to the visiting domain and the public network which he does not trust,and prevent from being tracked and located. In this paper, we have discoursed the anonymous communications in themobile IP, and presented a novel strategy of the dynamic address allocation and the routing with anonymity. The sug-gested method enables any identifying information can be carried over the anonymous and secure connections, andprovide end-to-end security. The implements of the mobile host and the mobile subnet are also presented.

  10. Quantitative Evaluation of Serum Proteins Uncovers a Protein Signature Related to Maturity-Onset Diabetes of the Young (MODY).

    Science.gov (United States)

    Tuerxunyiming, Muhadasi; Xian, Feng; Zi, Jin; Yimamu, Yilihamujiang; Abuduwayite, Reshalaiti; Ren, Yan; Li, Qidan; Abudula, Abulizi; Liu, SiQi; Mohemaiti, Patamu

    2018-01-05

    Maturity-onset diabetes of the young (MODY) is an inherited monogenic type of diabetes. Genetic mutations in MODY often cause nonsynonymous changes that directly lead to the functional distortion of proteins and the pathological consequences. Herein, we proposed that the inherited mutations found in a MODY family could cause a disturbance of protein abundance, specifically in serum. The serum samples were collected from a Uyghur MODY family through three generations, and the serum proteins after depletion treatment were examined by quantitative proteomics to characterize the MODY-related serum proteins followed by verification using target quantification of proteomics. A total of 32 serum proteins were preliminarily identified as the MODY-related. Further verification test toward the individual samples demonstrated the 12 candidates with the significantly different abundance in the MODY patients. A comparison of the 12 proteins among the sera of type 1 diabetes, type 2 diabetes, MODY, and healthy subjects was conducted and revealed a protein signature related with MODY composed of the serum proteins such as SERPINA7, APOC4, LPA, C6, and F5.

  11. Anonymous Search Histories Featuring Personalized Advertisement - Balancing Privacy with Economic Interests

    OpenAIRE

    Thorben Burghardt; Klemens Bohm; Achim Guttmann; Chris Clifton

    2011-01-01

    Search engines are key to finding information on the web. Search presently is free for users financed by targeted advertisement. Today, the current search terms determine the ad placement. In the near future, search-engine providers will make use of detailed user profiles for better ad placement. This puts user privacy at risk. Anonymizing search histories, which is a solution in principle, gives way to a trade-off between privacy and the usability of the data for ad placement. This paper stu...

  12. Mirroring the videos of Anonymous:cloud activism, living networks, and political mimesis

    OpenAIRE

    Fish, Adam Richard

    2016-01-01

    Mirrors describe the multiplication of data across a network. In this article, I examine the politics of mirroring as practiced on videos by the hacktivist network Anonymous. Mirrors are designed to retain visibility on social media platforms and motivate viewers towards activism. They emerge from a particular social structure and propagate a specific symbolic system. Furthermore, mirrors are not exact replicas nor postmodern representations. Rather, mirroring maps a contestation over visibil...

  13. Bystander's willingness to report theft, physical assault, and sexual assault: the impact of gender, anonymity, and relationship with the offender.

    Science.gov (United States)

    Nicksa, Sarah C

    2014-01-01

    This research examines bystander willingness to report three different crimes to the police or campus authorities among a college student sample (n = 295). Twelve original vignettes varied anonymity when reporting, bystander's relationship with the offender (friend or stranger), and crime type. A factorial analysis of variance showed that main effects were found for crime type, bystander's gender, and bystander's relationship with the offender; anonymity was not significant. The physical assault was the most likely to be reported (4.47), followed by theft (3.26), and sexual assault (2.36). Women were more likely than men to report each crime type, and bystanders who were good friends of the offender were less likely to report than strangers. No two- or three-way interactions were significant, but a significant four-way interaction indicated that anonymity, relationship with the offender, and bystander's gender predicted willingness to report for the sexual assault scenario.

  14. A transthyretin-related protein is functionally expressed in Herbaspirillum seropedicae.

    Science.gov (United States)

    Matiollo, Camila; Vernal, Javier; Ecco, Gabriela; Bertoldo, Jean Borges; Razzera, Guilherme; de Souza, Emanuel M; Pedrosa, Fábio O; Terenzi, Hernán

    2009-10-02

    Transthyretin-related proteins (TRPs) constitute a family of proteins structurally related to transthyretin (TTR) and are found in a large range of bacterial, fungal, plant, invertebrate, and vertebrate species. However, it was recently recognized that both prokaryotic and eukaryotic members of this family are not functionally related to transthyretins. TRPs are in fact involved in the purine catabolic pathway and function as hydroxyisourate hydrolases. An open reading frame encoding a protein similar to the Escherichia coli TRP was identified in Herbaspirillum seropedicae genome (Hs_TRP). It was cloned, overexpressed in E. coli, and purified to homogeneity. Mass spectrometry data confirmed the identity of this protein, and circular dichroism spectrum indicated a predominance of beta-sheet structure, as expected for a TRP. We have demonstrated that Hs_TRP is a 5-hydroxyisourate hydrolase and by site-directed mutagenesis the importance of three conserved catalytic residues for Hs_TRP activity was further confirmed. The production of large quantities of this recombinant protein opens up the possibility of obtaining its 3D-structure and will help further investigations into purine catabolism.

  15. Functional evolution of ADAMTS genes: Evidence from analyses of phylogeny and gene organization

    Directory of Open Access Journals (Sweden)

    Van Meir Erwin G

    2005-02-01

    Full Text Available Abstract Background The ADAMTS (A Disintegrin-like and Metalloprotease with Thrombospondin motifs proteins are a family of metalloproteases with sequence similarity to the ADAM proteases, that contain the thrombospondin type 1 sequence repeat motifs (TSRs common to extracellular matrix proteins. ADAMTS proteins have recently gained attention with the discovery of their role in a variety of diseases, including tissue and blood disorders, cancer, osteoarthritis, Alzheimer's and the genetic syndromes Weill-Marchesani syndrome (ADAMTS10, thrombotic thrombocytopenic purpura (ADAMTS13, and Ehlers-Danlos syndrome type VIIC (ADAMTS2 in humans and belted white-spotting mutation in mice (ADAMTS20. Results Phylogenetic analysis and comparison of the exon/intron organization of vertebrate (Homo, Mus, Fugu, chordate (Ciona and invertebrate (Drosophila and Caenorhabditis ADAMTS homologs has elucidated the evolutionary relationships of this important gene family, which comprises 19 members in humans. Conclusions The evolutionary history of ADAMTS genes in vertebrate genomes has been marked by rampant gene duplication, including a retrotransposition that gave rise to a distinct ADAMTS subfamily (ADAMTS1, -4, -5, -8, -15 that may have distinct aggrecanase and angiogenesis functions.

  16. Applying Semigroup Property of Enhanced Chebyshev Polynomials to Anonymous Authentication Protocol

    Directory of Open Access Journals (Sweden)

    Hong Lai

    2012-01-01

    Full Text Available We apply semigroup property of enhanced Chebyshev polynomials to present an anonymous authentication protocol. This paper aims at improving security and reducing computational and storage overhead. The proposed scheme not only has much lower computational complexity and cost in the initialization phase but also allows the users to choose their passwords freely. Moreover, it can provide revocation of lost or stolen smart card, which can resist man-in-the-middle attack and off-line dictionary attack together with various known attacks.

  17. A Comparison of the Effects of K-Anonymity on Machine Learning Algorithms

    OpenAIRE

    Hayden Wimmer; Loreen Powell

    2014-01-01

    While research has been conducted in machine learning algorithms and in privacy preserving in data mining (PPDM), a gap in the literature exists which combines the aforementioned areas to determine how PPDM affects common machine learning algorithms. The aim of this research is to narrow this literature gap by investigating how a common PPDM algorithm, K-Anonymity, affects common machine learning and data mining algorithms, namely neural networks, logistic regression, decision trees, and Baye...

  18. Isthmin 1 is a secreted protein expressed in skin, mucosal tissues, and NK, NKT, and th17 cells.

    Science.gov (United States)

    Valle-Rios, Ricardo; Maravillas-Montero, José L; Burkhardt, Amanda M; Martinez, Cynthia; Buhren, Bettina Alexandra; Homey, Bernhard; Gerber, Peter Arne; Robinson, Octavio; Hevezi, Peter; Zlotnik, Albert

    2014-10-01

    Using a comprehensive microarray database of human gene expression, we identified that in mammals, a secreted protein known as isthmin 1 (ISM1) is expressed in skin, mucosal tissues, and selected lymphocyte populations. ISM1 was originally identified in Xenopus brain during development, and it encodes a predicted ∼50-kDa protein containing a signal peptide, a thrombospondin domain, and an adhesion-associated domain. We confirmed the pattern of expression of ISM1 in both human and mouse tissues. ISM1 is expressed by DX5(+) lung lymphocytes that include NK and NKT-like cells, and is also expressed by some CD4(+) T cells upon activation but its expression increases significantly when CD4(+) T cells were polarized to the Th17 lineage in vitro. The presence of IFN-γ during CD4(+) T cell polarization inhibits ISM1 expression. Given that ISM1 has been reported to have anti-angiogenic properties, these observations suggest that ISM1 is a mediator of lymphocyte effector functions and may participate in both innate and acquired immune responses.

  19. 7-year trajectories of Alcoholics Anonymous attendance and associations with treatment

    Science.gov (United States)

    Kaskutas, Lee Ann; Bond, Jason; Avalos, Lyndsay Ammon

    2009-01-01

    Although many members of Alcoholics Anonymous (AA) are introduced to AA during treatment, the relationship between treatment and AA attendance over time is unknown. This paper describes four latent classes of AA attendance among 586 dependent alcoholics interviewed by telephone 1, 3, 5 and 7 years after baseline, and models the relationship between treatment exposure and AA attendance in each class. There was a low AA group (averaging fewer than 5 meetings at most follow-ups), a medium AA group (about 50 meetings a year at each follow-up), a descending AA group (about 150 meetings year 1, then decreasing steeply), and a high AA group (about 200 meetings at 1 year, then decreasing gradually by year 7). Declines in meeting attendance were not always accompanied by decreases in abstinence. After accounting for the effect of time on AA attendance (i.e., the “ups-and-downs” that occur over time), treatment exposure was minimally related to AA attendance in all but the descending AA group, where it was negatively associated (p<.001). Considering AA patterns over time highlights a different role for treatment in AA attendance than what is gleaned from analyses at single timepoints. PMID:19632789

  20. Anonymity versus privacy: selective information sharing in online cancer communities.

    Science.gov (United States)

    Frost, Jeana; Vermeulen, Ivar E; Beekers, Nienke

    2014-05-14

    Active sharing in online cancer communities benefits patients. However, many patients refrain from sharing health information online due to privacy concerns. Existing research on privacy emphasizes data security and confidentiality, largely focusing on electronic medical records. Patient preferences around information sharing in online communities remain poorly understood. Consistent with the privacy calculus perspective adopted from e-commerce research, we suggest that patients approach online information sharing instrumentally, weighing privacy costs against participation benefits when deciding whether to share certain information. Consequently, we argue that patients prefer sharing clinical information over daily life and identity information that potentially compromises anonymity. Furthermore, we explore whether patients' prior experiences, age, health, and gender affect perceived privacy costs and thus willingness to share information. The goal of the present study is to document patient preferences for sharing information within online health platforms. A total of 115 cancer patients reported sharing intentions for 15 different types of information, demographics, health status, prior privacy experiences, expected community utility, and privacy concerns. Factor analysis on the 15 information types revealed 3 factors coinciding with 3 proposed information categories: clinical, daily life, and identity information. A within-subject ANOVA showed a strong preference for sharing clinical information compared to daily life and identity information (F1,114=135.59, P=.001, η(2)=.93). Also, adverse online privacy experiences, age, and health status negatively affected information-sharing intentions. Female patients shared information less willingly. Respondents' information-sharing intentions depend on dispositional and situational factors. Patients share medical details more willingly than daily life or identity information. The results suggest the need to focus on

  1. Selfrando: Securing the Tor Browser against De-anonymization Exploits

    Directory of Open Access Journals (Sweden)

    Conti Mauro

    2016-10-01

    Full Text Available Tor is a well-known anonymous communication system used by millions of users, including journalists and civil rights activists all over the world. The Tor Browser gives non-technical users an easy way to access the Tor Network. However, many government organizations are actively trying to compromise Tor not only in regions with repressive regimes but also in the free world, as the recent FBI incidents clearly demonstrate. Exploiting software vulnerabilities in general, and browser vulnerabilities in particular, constitutes a clear and present threat to the Tor software. The Tor Browser shares a large part of its attack surface with the Firefox browser. Therefore, Firefox vulnerabilities (even patched ones are highly valuable to attackers trying to monitor users of the Tor Browser.

  2. The vascular permeabilizing factors histamine and serotonin induce angiogenesis through TR3/Nur77 and subsequently truncate it through thrombospondin-1

    Science.gov (United States)

    Qin, Liuliang; Zhao, Dezheng; Xu, Jianfeng; Ren, Xianghui; Terwilliger, Ernest F.; Parangi, Sareh; Lawler, Jack; Dvorak, Harold F.

    2013-01-01

    Angiogenesis plays an important role in cancer and in many other human diseases. Vascular endothelial growth factor-A (VEGF-A), the best known angiogenic factor, was originally discovered as a potent vascular permeability factor (VPF), suggesting that other vascular permeabilizing agents, such as histamine and serotonin, might also have angiogenic activity. We recently demonstrated that, like VEGF-A, histamine and serotonin up-regulate the orphan nuclear receptor and transcription factor TR3 (mouse homolog Nur77) and that TR3/Nur77 is essential for their vascular permeabilizing activities. We now report that histamine and serotonin are also angiogenic factors that, at low micromolar concentrations, induce endothelial cell proliferation, migration and tube formation in vitro, and angiogenesis in vivo. All of these responses are mediated through specific histamine and serotonin receptors, are independent of VEGF-A, and are directly dependent on TR3/Nur77. Initially, the angiogenic response closely resembled that induced by VEGF-A, with generation of “mother” vessels. However, after ∼10 days, mother vessels began to regress as histamine and serotonin, unlike VEGF-A, up-regulated the potent angiogenesis inhibitor thrombospondin-1, thereby triggering a negative feedback loop. Thus, histamine and serotonin induce an angiogenic response that fits the time scale of acute inflammation. PMID:23315169

  3. Prediction of Protein-Protein Interactions Related to Protein Complexes Based on Protein Interaction Networks

    Directory of Open Access Journals (Sweden)

    Peng Liu

    2015-01-01

    Full Text Available A method for predicting protein-protein interactions based on detected protein complexes is proposed to repair deficient interactions derived from high-throughput biological experiments. Protein complexes are pruned and decomposed into small parts based on the adaptive k-cores method to predict protein-protein interactions associated with the complexes. The proposed method is adaptive to protein complexes with different structure, number, and size of nodes in a protein-protein interaction network. Based on different complex sets detected by various algorithms, we can obtain different prediction sets of protein-protein interactions. The reliability of the predicted interaction sets is proved by using estimations with statistical tests and direct confirmation of the biological data. In comparison with the approaches which predict the interactions based on the cliques, the overlap of the predictions is small. Similarly, the overlaps among the predicted sets of interactions derived from various complex sets are also small. Thus, every predicted set of interactions may complement and improve the quality of the original network data. Meanwhile, the predictions from the proposed method replenish protein-protein interactions associated with protein complexes using only the network topology.

  4. An Anonymous Mutual Authenticated Key Agreement Scheme for Wearable Sensors in Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Chien-Ming Chen

    2018-07-01

    Full Text Available The advancement of Wireless Body Area Networks (WBAN have led to significant progress in medical and health care systems. However, such networks still suffer from major security and privacy threats, especially for the data collected in medical or health care applications. Lack of security and existence of anonymous communication in WBAN brings about the operation failure of these networks. Recently, Li et al. proposed a lightweight protocol for wearable sensors in wireless body area networks. In their paper, the authors claimed that the protocol may provide anonymous mutual authentication and resist against various types of attacks. This study shows that such a protocol is still vulnerable to three types of attacks, i.e., the offline identity guessing attack, the sensor node impersonation attack and the hub node spoofing attack. We then present a secure scheme that addresses these problems, and retains similar efficiency in wireless sensors nodes and mobile phones.

  5. Chaotic maps and biometrics-based anonymous three-party authenticated key exchange protocol without using passwords

    International Nuclear Information System (INIS)

    Xie Qi; Hu Bin; Chen Ke-Fei; Liu Wen-Hao; Tan Xiao

    2015-01-01

    In three-party password authenticated key exchange (AKE) protocol, since two users use their passwords to establish a secure session key over an insecure communication channel with the help of the trusted server, such a protocol may suffer the password guessing attacks and the server has to maintain the password table. To eliminate the shortages of password-based AKE protocol, very recently, according to chaotic maps, Lee et al. [2015 Nonlinear Dyn. 79 2485] proposed a first three-party-authenticated key exchange scheme without using passwords, and claimed its security by providing a well-organized BAN logic test. Unfortunately, their protocol cannot resist impersonation attack, which is demonstrated in the present paper. To overcome their security weakness, by using chaotic maps, we propose a biometrics-based anonymous three-party AKE protocol with the same advantages. Further, we use the pi calculus-based formal verification tool ProVerif to show that our AKE protocol achieves authentication, security and anonymity, and an acceptable efficiency. (paper)

  6. Prediction and characterization of human ageing-related proteins by using machine learning.

    Science.gov (United States)

    Kerepesi, Csaba; Daróczy, Bálint; Sturm, Ádám; Vellai, Tibor; Benczúr, András

    2018-03-06

    Ageing has a huge impact on human health and economy, but its molecular basis - regulation and mechanism - is still poorly understood. By today, more than three hundred genes (almost all of them function as protein-coding genes) have been related to human ageing. Although individual ageing-related genes or some small subsets of these genes have been intensively studied, their analysis as a whole has been highly limited. To fill this gap, for each human protein we extracted 21000 protein features from various databases, and using these data as an input to state-of-the-art machine learning methods, we classified human proteins as ageing-related or non-ageing-related. We found a simple classification model based on only 36 protein features, such as the "number of ageing-related interaction partners", "response to oxidative stress", "damaged DNA binding", "rhythmic process" and "extracellular region". Predicted values of the model quantify the relevance of a given protein in the regulation or mechanisms of the human ageing process. Furthermore, we identified new candidate proteins having strong computational evidence of their important role in ageing. Some of them, like Cytochrome b-245 light chain (CY24A) and Endoribonuclease ZC3H12A (ZC12A) have no previous ageing-associated annotations.

  7. Vigilância e anonimato em aplicativos mobile: um estudo sobre a privacidade em relações homoafetivas no digital | Surveillance and anonymity in mobile applications: a study about the privacy in digital same sex relations

    Directory of Open Access Journals (Sweden)

    Manuela do Corral Vieira

    2016-11-01

    Full Text Available RESUMO Este artigo busca compreender de que forma homens que utilizam os aplicativos de relacionamento Tinder, Grindr e Scruff – considerando seus pontos de semelhanças e de especificidades, conforme serão detalhadas ao longo deste estudo – experienciam facetas de suas identidades e constroem práticas de sociabilidade, fazendo uso ou não do anonimato, na vivência de relações homoafetivas. Além disso, a pesquisa analisa de que forma estas plataformas digitais se configuram como heterotopias e “armários digitais”, nos quais os sujeitos desenvolvem formas de resistência e proteção a práticas de vigilâncias sociais on e off-lines. Palavras-chave: Privacidade; Anonimato; Identidade; Sociabilidade; Aplicativos de Relacionamento. ABSTRACT This article seeks to understand how men who use the relationship applications Tinder, Grindr and Scruff – considering their similarities points and specificities, as will be detailed in the course of this study – experience facets of their identities and build sociability practices making use or not of anonymity, in experiences of same sex relations. Furthermore, the research examines how these digital platforms are configured as heterotopias and "digital lockers" in which subjects develop forms of resistance and protection to the surveillances practices on and off-lines. Keywords: Privacy; Anonymity; Identity; Sociability; Relationship Applications.

  8. Protein expression analysis of inflammation-related colon carcinogenesis

    Directory of Open Access Journals (Sweden)

    Yasui Yumiko

    2009-01-01

    Full Text Available Background: Chronic inflammation is a risk factor for colorectal cancer (CRC development. The aim of this study was to determine the differences in protein expression between CRC and the surrounding nontumorous colonic tissues in the mice that received azoxymethane (AOM and dextran sodium sulfate (DSS using a proteomic analysis. Materials and Methods: Male ICR mice were given a single intraperitoneal injection of AOM (10 mg/kg body weight, followed by 2% (w/v DSS in their drinking water for seven days, starting one week after the AOM injection. Colonic adenocarcinoma developed after 20 weeks and a proteomics analysis based on two-dimensional gel electrophoresis and ultraflex TOF/TOF mass spectrometry was conducted in the cancerous and nontumorous tissue specimens. Results: The proteomic analysis revealed 21 differentially expressed proteins in the cancerous tissues in comparison to the nontumorous tissues. There were five markedly increased proteins (beta-tropomyosin, tropomyosin 1 alpha isoform b, S100 calcium binding protein A9, and an unknown protein and 16 markedly decreased proteins (Car1 proteins, selenium-binding protein 1, HMG-CoA synthase, thioredoxin 1, 1 Cys peroxiredoxin protein 2, Fcgbp protein, Cytochrome c oxidase, subunit Va, ETHE1 protein, and 7 unknown proteins. Conclusions: There were 21 differentially expressed proteins in the cancerous tissues of the mice that received AOM and DSS. Their functions include metabolism, the antioxidant system, oxidative stress, mucin production, and inflammation. These findings may provide new insights into the mechanisms of inflammation-related colon carcinogenesis and the establishment of novel therapies and preventative strategies to treat carcinogenesis in the inflamed colon.

  9. Cloud Based Data Protection in Anonymously Controlled SDN

    Directory of Open Access Journals (Sweden)

    Jian Shen

    2018-01-01

    Full Text Available Nowadays, Software Defined Network (SDN develops rapidly for its novel structure which separates the control plane and the data plane of network devices. Many researchers devoted themselves to the study of such a special network. However, some limitations restrict the development of SDN. On the one hand, the single controller in the conventional model bears all threats, and the corruption of it will result in network paralysis. On the other hand, the data will be increasing more in SDN switches in the data plane, while the storage space of these switches is limited. In order to solve the mentioned issues, we propose two corresponding protocols in this paper. Specifically, one is an anonymous protocol in the control plane, and the other is a verifiable outsourcing protocol in the data plane. The evaluation indicates that our protocol is correct, secure, and efficient.

  10. Gamblers Anonymous as a Recovery Pathway: A Scoping Review.

    Science.gov (United States)

    Schuler, Andrée; Ferentzy, Peter; Turner, Nigel E; Skinner, Wayne; McIsaac, Kathryn E; Ziegler, Carolyn P; Matheson, Flora I

    2016-12-01

    Given the preponderance of Gamblers Anonymous (GA), there has been relatively little effort to explore the existing evidence base on its effectiveness as a recovery approach for problem gambling. To remedy this gap in the literature we conducted a scoping review of the literature on mutual aid for individuals experiencing problem gambling published between 2002 and 2015. We searched 13 databases and reviewed reference lists and websites of relevant organizations. We reviewed records for eligibility and extracted relevant data from eligible articles. Three reviewers independently assessed the methodological quality of the included studies using the Mixed Methods Appraisal Tool. We identified 17 studies in 25 publications that were eligible for inclusion. Most studies were conducted in the United States, were cross-sectional in design, and involved both male and female adult participants. Results indicate that the evidence for the effectiveness of GA either as a control condition or in conjunction with formal treatment or medication is inconsistent. An emphasis on patience, using the Serenity Prayer as a way to gain acceptance of financial matters and reality, and absolute assertion of identity as a "compulsive gambler" were identified as important aspects of GA's recovery culture. There is a need for large-scale randomized controlled trials to determine GA's effectiveness, as well as research exploring the mechanisms through which GA works, barriers to GA as a recovery approach, and the status of women in the fellowship.

  11. Delineating social network data anonymization via random edge perturbation

    KAUST Repository

    Xue, Mingqiang

    2012-01-01

    Social network data analysis raises concerns about the privacy of related entities or individuals. To address this issue, organizations can publish data after simply replacing the identities of individuals with pseudonyms, leaving the overall structure of the social network unchanged. However, it has been shown that attacks based on structural identification (e.g., a walk-based attack) enable an adversary to re-identify selected individuals in an anonymized network. In this paper we explore the capacity of techniques based on random edge perturbation to thwart such attacks. We theoretically establish that any kind of structural identification attack can effectively be prevented using random edge perturbation and show that, surprisingly, important properties of the whole network, as well as of subgraphs thereof, can be accurately calculated and hence data analysis tasks performed on the perturbed data, given that the legitimate data recipient knows the perturbation probability as well. Yet we also examine ways to enhance the walk-based attack, proposing a variant we call probabilistic attack. Nevertheless, we demonstrate that such probabilistic attacks can also be prevented under sufficient perturbation. Eventually, we conduct a thorough theoretical study of the probability of success of any}structural attack as a function of the perturbation probability. Our analysis provides a powerful tool for delineating the identification risk of perturbed social network data; our extensive experiments with synthetic and real datasets confirm our expectations. © 2012 ACM.

  12. The Anonymization Protection Algorithm Based on Fuzzy Clustering for the Ego of Data in the Internet of Things

    Directory of Open Access Journals (Sweden)

    Mingshan Xie

    2017-01-01

    Full Text Available In order to enhance the enthusiasm of the data provider in the process of data interaction and improve the adequacy of data interaction, we put forward the concept of the ego of data and then analyzed the characteristics of the ego of data in the Internet of Things (IOT in this paper. We implement two steps of data clustering for the Internet of things; the first step is the spatial location of adjacent fuzzy clustering, and the second step is the sampling time fuzzy clustering. Equivalent classes can be obtained through the two steps. In this way we can make the data with layout characteristics to be classified into different equivalent classes, so that the specific location information of the data can be obscured, the layout characteristics of tags are eliminated, and ultimately anonymization protection would be achieved. The experimental results show that the proposed algorithm can greatly improve the efficiency of protection of the data in the interaction with others in the incompletely open manner, without reducing the quality of anonymization and enhancing the information loss. The anonymization data set generated by this method has better data availability, and this algorithm can effectively improve the security of data exchange.

  13. The accumulation of a platelet protein, thrombospondin, at the site of arterial thrombus formation: Preliminary report

    International Nuclear Information System (INIS)

    Perlman, S.B.; Hammes, R.J.; Besozzi, M.C.; Folts, J.D.; Mosher, D.F.

    1987-01-01

    There are many methods available for the detection of thrombosis, none of which are noninvasive, rapid and accurate. Thrombosponding is a platelet protein that is present in the developing thrombus and may be an effective substance to use for imaging thrombosis. Vascular stenosis and thrombosis were produced in coronary, carotid and femoral arteries in eleven adult mongrel dogs. 131 I labeled thrombosponding was administered to each animal to determine whether the radiotracer accumulated at the site of thrombus formation. The radioactivity per gram of vessels with thrombi was significantly different from the control vessels or whole blood (p=0.0037 and p=0.015, respectively, paired t-test). This preliminary work suggests that iodinated thrombosponding accumulates at the site of thrombus formation. Labeled thrombosponding may be a rapid, safe and accurate method of detecting arterial thrombosis. (orig.)

  14. Identifying Novel Candidate Genes Related to Apoptosis from a Protein-Protein Interaction Network

    Directory of Open Access Journals (Sweden)

    Baoman Wang

    2015-01-01

    Full Text Available Apoptosis is the process of programmed cell death (PCD that occurs in multicellular organisms. This process of normal cell death is required to maintain the balance of homeostasis. In addition, some diseases, such as obesity, cancer, and neurodegenerative diseases, can be cured through apoptosis, which produces few side effects. An effective comprehension of the mechanisms underlying apoptosis will be helpful to prevent and treat some diseases. The identification of genes related to apoptosis is essential to uncover its underlying mechanisms. In this study, a computational method was proposed to identify novel candidate genes related to apoptosis. First, protein-protein interaction information was used to construct a weighted graph. Second, a shortest path algorithm was applied to the graph to search for new candidate genes. Finally, the obtained genes were filtered by a permutation test. As a result, 26 genes were obtained, and we discuss their likelihood of being novel apoptosis-related genes by collecting evidence from published literature.

  15. A case of refractory thrombotic thrombocytopenic purpura treated ...

    African Journals Online (AJOL)

    Background. Thrombotic thrombocytopenic purpura (TTP) is a rare, life-threaten- ing disorder that occurs due to deficiency of ADAMTS13 (a disintegrin and metalloproteinase with a thrombospondin type 1 motif, member. 13), which is a von Willebrand factor (VWF) cleaving protein.[1]. The absent or severely reduced activity ...

  16. The SBASE protein domain library, release 8.0: a collection of annotated protein sequence segments.

    Science.gov (United States)

    Murvai, J; Vlahovicek, K; Barta, E; Pongor, S

    2001-01-01

    SBASE 8.0 is the eighth release of the SBASE library of protein domain sequences that contains 294 898 annotated structural, functional, ligand-binding and topogenic segments of proteins, cross-referenced to most major sequence databases and sequence pattern collections. The entries are clustered into over 2005 statistically validated domain groups (SBASE-A) and 595 non-validated groups (SBASE-B), provided with several WWW-based search and browsing facilities for online use. A domain-search facility was developed, based on non-parametric pattern recognition methods, including artificial neural networks. SBASE 8.0 is freely available by anonymous 'ftp' file transfer from ftp.icgeb.trieste.it. Automated searching of SBASE can be carried out with the WWW servers http://www.icgeb.trieste.it/sbase/ and http://sbase.abc. hu/sbase/.

  17. Anonymity Versus Privacy: Selective Information Sharing in Online Cancer Communities

    Science.gov (United States)

    Vermeulen, Ivar E; Beekers, Nienke

    2014-01-01

    Background Active sharing in online cancer communities benefits patients. However, many patients refrain from sharing health information online due to privacy concerns. Existing research on privacy emphasizes data security and confidentiality, largely focusing on electronic medical records. Patient preferences around information sharing in online communities remain poorly understood. Consistent with the privacy calculus perspective adopted from e-commerce research, we suggest that patients approach online information sharing instrumentally, weighing privacy costs against participation benefits when deciding whether to share certain information. Consequently, we argue that patients prefer sharing clinical information over daily life and identity information that potentially compromises anonymity. Furthermore, we explore whether patients’ prior experiences, age, health, and gender affect perceived privacy costs and thus willingness to share information. Objective The goal of the present study is to document patient preferences for sharing information within online health platforms. Methods A total of 115 cancer patients reported sharing intentions for 15 different types of information, demographics, health status, prior privacy experiences, expected community utility, and privacy concerns. Results Factor analysis on the 15 information types revealed 3 factors coinciding with 3 proposed information categories: clinical, daily life, and identity information. A within-subject ANOVA showed a strong preference for sharing clinical information compared to daily life and identity information (F 1,114=135.59, P=.001, η2=.93). Also, adverse online privacy experiences, age, and health status negatively affected information-sharing intentions. Female patients shared information less willingly. Conclusions Respondents’ information-sharing intentions depend on dispositional and situational factors. Patients share medical details more willingly than daily life or identity

  18. Oxidation of DNA, proteins and lipids by DOPA, protein-bound DOPA, and related catechol(amine)s

    DEFF Research Database (Denmark)

    Pattison, David I; Dean, Roger T; Davies, Michael Jonathan

    2002-01-01

    Incubation of free 3,4-dihydroxyphenylalanine (DOPA), protein-bound DOPA (PB-DOPA) and related catechols with DNA, proteins and lipids has been shown to result in oxidative damage to the target molecule. This article reviews these reactions with particular emphasis on those that occur in the pres......Incubation of free 3,4-dihydroxyphenylalanine (DOPA), protein-bound DOPA (PB-DOPA) and related catechols with DNA, proteins and lipids has been shown to result in oxidative damage to the target molecule. This article reviews these reactions with particular emphasis on those that occur...... in the presence of molecular O(2) and redox-active metal ions (e.g. Fe(3+), Cu(2+), Cr(6+)), which are known to increase the rate of DOPA oxidation. The majority of oxidative damage appears to be mediated by reactive oxygen species (ROS) such as superoxide and HO(.) radicals, though other DOPA oxidation products...

  19. An improved biometrics-based remote user authentication scheme with user anonymity.

    Science.gov (United States)

    Khan, Muhammad Khurram; Kumari, Saru

    2013-01-01

    The authors review the biometrics-based user authentication scheme proposed by An in 2012. The authors show that there exist loopholes in the scheme which are detrimental for its security. Therefore the authors propose an improved scheme eradicating the flaws of An's scheme. Then a detailed security analysis of the proposed scheme is presented followed by its efficiency comparison. The proposed scheme not only withstands security problems found in An's scheme but also provides some extra features with mere addition of only two hash operations. The proposed scheme allows user to freely change his password and also provides user anonymity with untraceability.

  20. Alcoholics Anonymous and twelve-step recovery: a model based on social and cognitive neuroscience.

    Science.gov (United States)

    Galanter, Marc

    2014-01-01

    In the course of achieving abstinence from alcohol, longstanding members of Alcoholics Anonymous (AA) typically experience a change in their addiction-related attitudes and behaviors. These changes are reflective of physiologically grounded mechanisms which can be investigated within the disciplines of social and cognitive neuroscience. This article is designed to examine recent findings associated with these disciplines that may shed light on the mechanisms underlying this change. Literature review and hypothesis development. Pertinent aspects of the neural impact of drugs of abuse are summarized. After this, research regarding specific brain sites, elucidated primarily by imaging techniques, is reviewed relative to the following: Mirroring and mentalizing are described in relation to experimentally modeled studies on empathy and mutuality, which may parallel the experiences of social interaction and influence on AA members. Integration and retrieval of memories acquired in a setting like AA are described, and are related to studies on storytelling, models of self-schema development, and value formation. A model for ascription to a Higher Power is presented. The phenomena associated with AA reflect greater complexity than the empirical studies on which this article is based, and certainly require further elucidation. Despite this substantial limitation in currently available findings, there is heuristic value in considering the relationship between the brain-based and clinical phenomena described here. There are opportunities for the study of neuroscientific correlates of Twelve-Step-based recovery, and these can potentially enhance our understanding of related clinical phenomena. © American Academy of Addiction Psychiatry.

  1. Identification of the G13 (cAMP-response-element-binding protein-related protein) gene product related to activating transcription factor 6 as a transcriptional activator of the mammalian unfolded protein response.

    Science.gov (United States)

    Haze, K; Okada, T; Yoshida, H; Yanagi, H; Yura, T; Negishi, M; Mori, K

    2001-04-01

    Eukaryotic cells control the levels of molecular chaperones and folding enzymes in the endoplasmic reticulum (ER) by a transcriptional induction process termed the unfolded protein response (UPR). The mammalian UPR is mediated by the cis-acting ER stress response element consisting of 19 nt (CCAATN(9)CCACG), the CCACG part of which is considered to provide specificity. We recently identified the basic leucine zipper (bZIP) protein ATF6 as a mammalian UPR-specific transcription factor; ATF6 is activated by ER stress-induced proteolysis and binds directly to CCACG. Here we report that eukaryotic cells express another bZIP protein closely related to ATF6 in both structure and function. This protein encoded by the G13 (cAMP response element binding protein-related protein) gene is constitutively synthesized as a type II transmembrane glycoprotein anchored in the ER membrane and processed into a soluble form upon ER stress as occurs with ATF6. The proteolytic processing of ATF6 and the G13 gene product is accompanied by their relocation from the ER to the nucleus; their basic regions seem to function as a nuclear localization signal. Overexpression of the soluble form of the G13 product constitutively activates the UPR, whereas overexpression of a mutant lacking the activation domain exhibits a strong dominant-negative effect. Furthermore, the soluble forms of ATF6 and the G13 gene product are unable to bind to several point mutants of the cis-acting ER stress response element in vitro that hardly respond to ER stress in vivo. We thus concluded that the two related bZIP proteins are crucial transcriptional regulators of the mammalian UPR, and propose calling the ATF6 gene product ATF6alpha and the G13 gene product ATF6beta.

  2. RSEQtools: a modular framework to analyze RNA-Seq data using compact, anonymized data summaries.

    Science.gov (United States)

    Habegger, Lukas; Sboner, Andrea; Gianoulis, Tara A; Rozowsky, Joel; Agarwal, Ashish; Snyder, Michael; Gerstein, Mark

    2011-01-15

    The advent of next-generation sequencing for functional genomics has given rise to quantities of sequence information that are often so large that they are difficult to handle. Moreover, sequence reads from a specific individual can contain sufficient information to potentially identify and genetically characterize that person, raising privacy concerns. In order to address these issues, we have developed the Mapped Read Format (MRF), a compact data summary format for both short and long read alignments that enables the anonymization of confidential sequence information, while allowing one to still carry out many functional genomics studies. We have developed a suite of tools (RSEQtools) that use this format for the analysis of RNA-Seq experiments. These tools consist of a set of modules that perform common tasks such as calculating gene expression values, generating signal tracks of mapped reads and segmenting that signal into actively transcribed regions. Moreover, the tools can readily be used to build customizable RNA-Seq workflows. In addition to the anonymization afforded by MRF, this format also facilitates the decoupling of the alignment of reads from downstream analyses. RSEQtools is implemented in C and the source code is available at http://rseqtools.gersteinlab.org/.

  3. A robust uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care.

    Science.gov (United States)

    Wen, Fengtong

    2013-12-01

    User authentication plays an important role to protect resources or services from being accessed by unauthorized users. In a recent paper, Das et al. proposed a secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. This scheme uses three factors, e.g. biometrics, password, and smart card, to protect the security. It protects user privacy and is believed to have many abilities to resist a range of network attacks, even if the secret information stored in the smart card is compromised. In this paper, we analyze the security of Das et al.'s scheme, and show that the scheme is in fact insecure against the replay attack, user impersonation attacks and off-line guessing attacks. Then, we also propose a robust uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. Compared with the existing schemes, our protocol uses a different user authentication mechanism to resist replay attack. We show that our proposed scheme can provide stronger security than previous protocols. Furthermore, we demonstrate the validity of the proposed scheme through the BAN (Burrows, Abadi, and Needham) logic.

  4. Huntingtin-associated protein-1 (HAP1) regulates endocytosis and interacts with multiple trafficking-related proteins.

    Science.gov (United States)

    Mackenzie, Kimberly D; Lim, Yoon; Duffield, Michael D; Chataway, Timothy; Zhou, Xin-Fu; Keating, Damien J

    2017-07-01

    Huntingtin-associated protein 1 (HAP1) was initially identified as a binding partner of huntingtin, mutations in which underlie Huntington's disease. Subcellular localization and protein interaction data indicate that HAP1 may be important in vesicle trafficking, cell signalling and receptor internalization. In this study, a proteomics approach was used for the identification of novel HAP1-interacting partners to attempt to shed light on the physiological function of HAP1. Using affinity chromatography with HAP1-GST protein fragments bound to Sepharose columns, this study identified a number of trafficking-related proteins that bind to HAP1. Interestingly, many of the proteins that were identified by mass spectrometry have trafficking-related functions and include the clathrin light chain B and Sec23A, an ER to Golgi trafficking vesicle coat component. Using co-immunoprecipitation and GST-binding assays the association between HAP1 and clathrin light chain B has been validated in vitro. This study also finds that HAP1 co-localizes with clathrin light chain B. In line with a physiological function of the HAP1-clathrin interaction this study detected a dramatic reduction in vesicle retrieval and endocytosis in adrenal chromaffin cells. Furthermore, through examination of transferrin endocytosis in HAP1 -/- cortical neurons, this study has determined that HAP1 regulates neuronal endocytosis. In this study, the interaction between HAP1 and Sec23A was also validated through endogenous co-immunoprecipitation in rat brain homogenate. Through the identification of novel HAP1 binding partners, many of which have putative trafficking roles, this study provides us with new insights into the mechanisms underlying the important physiological function of HAP1 as an intracellular trafficking protein through its protein-protein interactions. Copyright © 2017 Elsevier Inc. All rights reserved.

  5. Factors related to outcomes in lupus-related protein-losing enteropathy.

    Science.gov (United States)

    Lim, Doo-Ho; Kim, Yong-Gil; Bae, Seung-Hyeon; Ahn, Soomin; Hong, Seokchan; Lee, Chang-Keun; Yoo, Bin

    2015-11-01

    Protein-losing enteropathy (PLE), characterized by severe hypoalbuminemia and peripheral edema, is a rare manifestation of systemic lupus erythematosus. This present study aimed to identify the distinctive features of lupus-related PLE and evaluate the factors related to the treatment response. From March 1998 to March 2014, the clinical data of 14 patients with lupus PLE and seven patients with idiopathic PLE from a tertiary center were reviewed. PLE was defined as a demonstration of protein leakage from the gastrointestinal tract by either technetium 99m-labelled human albumin scanning or fecal α1-antitrypsin clearance. A positive steroid response was defined as a return of serum albumin to ≥ 3.0 g/dL within 4 weeks after initial steroid monotherapy, and remission as maintenance of serum albumin ≥ 3.0 g/dL for at least 3 months. A high serum total cholesterol level was defined as a level of ≥ 240 mg/dL. The mean age of the lupus-related PLE patients was 37.0 years, and the mean follow-up duration was 55.8 months. Significantly higher erythrocyte sedimentation rate and serum total cholesterol levels were found for lupus PLE than for idiopathic PLE. Among the 14 patients with lupus PLE, eight experienced a positive steroid response, and the serum total cholesterol level was significantly higher in the positive steroid response group. A positive steroid response was associated with an initial high serum total cholesterol level and achievement of remission within 6 months. In lupus-related PLE, a high serum total cholesterol level could be a predictive factor for the initial steroid response, indicating a good response to steroid therapy alone.

  6. PPI-IRO: A two-stage method for protein-protein interaction extraction based on interaction relation ontology

    KAUST Repository

    Li, Chuanxi

    2014-01-01

    Mining Protein-Protein Interactions (PPIs) from the fast-growing biomedical literature resources has been proven as an effective approach for the identifi cation of biological regulatory networks. This paper presents a novel method based on the idea of Interaction Relation Ontology (IRO), which specifi es and organises words of various proteins interaction relationships. Our method is a two-stage PPI extraction method. At fi rst, IRO is applied in a binary classifi er to determine whether sentences contain a relation or not. Then, IRO is taken to guide PPI extraction by building sentence dependency parse tree. Comprehensive and quantitative evaluations and detailed analyses are used to demonstrate the signifi cant performance of IRO on relation sentences classifi cation and PPI extraction. Our PPI extraction method yielded a recall of around 80% and 90% and an F1 of around 54% and 66% on corpora of AIMed and Bioinfer, respectively, which are superior to most existing extraction methods. Copyright © 2014 Inderscience Enterprises Ltd.

  7. Protein Simulation Data in the Relational Model.

    Science.gov (United States)

    Simms, Andrew M; Daggett, Valerie

    2012-10-01

    High performance computing is leading to unprecedented volumes of data. Relational databases offer a robust and scalable model for storing and analyzing scientific data. However, these features do not come without a cost-significant design effort is required to build a functional and efficient repository. Modeling protein simulation data in a relational database presents several challenges: the data captured from individual simulations are large, multi-dimensional, and must integrate with both simulation software and external data sites. Here we present the dimensional design and relational implementation of a comprehensive data warehouse for storing and analyzing molecular dynamics simulations using SQL Server.

  8. Sexuality Information Needs of Latino and African American Ninth Graders: A Content Analysis of Anonymous Questions

    Science.gov (United States)

    Angulo-Olaiz, Francisca; Goldfarb, Eva S.; Constantine, Norman A.

    2014-01-01

    This study used qualitative content analysis to examine anonymous questions about sex and sexuality submitted by Latino and African American adolescents in Los Angeles, California, classrooms. The majority of questions asked about sexuality and sexual behavior, or anatomy and physiology, with fewer questions about pregnancy and pregnancy…

  9. Age-related differences in plasma proteins: how plasma proteins change from neonates to adults.

    Directory of Open Access Journals (Sweden)

    Vera Ignjatovic

    Full Text Available The incidence of major diseases such as cardiovascular disease, thrombosis and cancer increases with age and is the major cause of mortality world-wide, with neonates and children somehow protected from such diseases of ageing. We hypothesized that there are major developmental differences in plasma proteins and that these contribute to age-related changes in the incidence of major diseases. We evaluated the human plasma proteome in healthy neonates, children and adults using the 2D-DIGE approach. We demonstrate significant changes in number and abundance of up to 100 protein spots that have marked differences in during the transition of the plasma proteome from neonate and child through to adult. These proteins are known to be involved in numerous physiological processes such as iron transport and homeostasis, immune response, haemostasis and apoptosis, amongst others. Importantly, we determined that the proteins that are differentially expressed with age are not the same proteins that are differentially expressed with gender and that the degree of phosphorylation of plasma proteins also changes with age. Given the multi-functionality of these proteins in human physiology, understanding the differences in the plasma proteome in neonates and children compared to adults will make a major contribution to our understanding of developmental biology in humans.

  10. Structure and Function of Human Tyrosinase and Tyrosinase-Related Proteins

    NARCIS (Netherlands)

    Lai, Xuelei; Wichers, Harry J.; Soler-Lopez, Montserrat; Dijkstra, Bauke W.

    2018-01-01

    Melanin is the main pigment responsible for the color of human skin, hair and eye. Its biosynthesis requires three melanogenic enzymes, tyrosinase (TYR), and the tyrosinase-related proteins TYRP1 and TYRP2. The difficulty of isolating pure and homogeneous proteins from endogenous sources has

  11. Robust anonymous authentication scheme for telecare medical information systems.

    Science.gov (United States)

    Xie, Qi; Zhang, Jun; Dong, Na

    2013-04-01

    Patient can obtain sorts of health-care delivery services via Telecare Medical Information Systems (TMIS). Authentication, security, patient's privacy protection and data confidentiality are important for patient or doctor accessing to Electronic Medical Records (EMR). In 2012, Chen et al. showed that Khan et al.'s dynamic ID-based authentication scheme has some weaknesses and proposed an improved scheme, and they claimed that their scheme is more suitable for TMIS. However, we show that Chen et al.'s scheme also has some weaknesses. In particular, Chen et al.'s scheme does not provide user's privacy protection and perfect forward secrecy, is vulnerable to off-line password guessing attack and impersonation attack once user's smart card is compromised. Further, we propose a secure anonymity authentication scheme to overcome their weaknesses even an adversary can know all information stored in smart card.

  12. Low Proportion of Dietary Plant Protein among Athletes with Premenstrual Syndrome-Related Performance Impairment.

    Science.gov (United States)

    Yamada, Keiko; Takeda, Takashi

    2018-02-01

    Premenstrual syndrome (PMS) is psychosomatic disorder that are limited to the late luteal phase in the menstrual cycle. PMS could impair athletic performance. To investigate associations between proportions of dietary plant and animal protein and PMS-related impairment of athletic performance, we surveyed 135 female athletes aged 18-23 years attending Kindai University. Participants belonged to authorized university clubs, all of which have high rankings in Japanese university sports. Participants completed self-administered questionnaires on diet history, demographics, and PMS-related impairment of athletic performance. Total protein, animal protein, and plant protein intake were examined, and the proportion of dietary plant protein was calculated for each participant. We divided athletes into two groups: those without PMS-related impairment of athletic performance (n = 117) and those with PMS-related performance impairment (n = 18). A t-test was used to compare mean values and multivariable adjusted mean values between groups; adjustment variables were energy intake, body mass index, and daily training duration. Total protein intake was not significantly different between the groups. However, athletes whose performance was affected by PMS reported higher intake of animal protein (mean 50.6 g) than athletes whose performance was unaffected by PMS (mean 34.9 g). Plant protein intake was lower among athletes with PMS-related impairment (mean 25.4 g) than among athletes without impairment (mean 26.9 g). The proportion of dietary plant protein was lower among athletes with PMS-related impairment (39.3%) than those without impairment (45.9%). A low proportion of dietary plant protein may cause PMS-related athletic impairment among athletes.

  13. Ethylene-induced senescence-related gene expression requires protein synthesis

    International Nuclear Information System (INIS)

    Lawton, K.A.; Raghothama, K.G.; Woodson, W.R.

    1990-01-01

    We have investigated the effects of inhibiting protein synthesis on the ethylene-induced expression of 3 carnation senescence-related genes, pSR5, pSR8, and pSR12. Treatment of preclimacteric carnation petal discs with 1μg/ml of cycloheximide, a cytoplasmic protein synthesis inhibitor, for 3h inhibited protein synthesis by >80% as quantitated by the incorporation of [35S]methionine into protein. Pre-treatment of petal discs with cycloheximide prevented ethylene-induced SR transcript accumulation. Cycloheximide treatment of petal discs held in air did not result in increased levels of SR mRNA. These results indicate that ethylene does not interact with pre-formed factors but rather that the activation of SR gene expression by ethylene is mediated by labile protein factor(s) synthesized on cytoplasmic ribosomes. Experiments are currently underway to determine if cycloheximide exerts its effect at the transcriptional or post-transcriptional level

  14. An Improved Biometrics-Based Remote User Authentication Scheme with User Anonymity

    Directory of Open Access Journals (Sweden)

    Muhammad Khurram Khan

    2013-01-01

    Full Text Available The authors review the biometrics-based user authentication scheme proposed by An in 2012. The authors show that there exist loopholes in the scheme which are detrimental for its security. Therefore the authors propose an improved scheme eradicating the flaws of An’s scheme. Then a detailed security analysis of the proposed scheme is presented followed by its efficiency comparison. The proposed scheme not only withstands security problems found in An’s scheme but also provides some extra features with mere addition of only two hash operations. The proposed scheme allows user to freely change his password and also provides user anonymity with untraceability.

  15. Proteomic analysis of exosomes from nasopharyngeal carcinoma cell identifies intercellular transfer of angiogenic proteins

    KAUST Repository

    Chan, Yuk-kit

    2015-04-01

    Exosomes, a group of secreted extracellular nanovesicles containing genetic materials and signaling molecules, play a critical role in intercellular communication. During tumorigenesis, exosomes have been demonstrated to promote tumor angiogenesis and metastasis while their biological functions in nasopharyngeal carcinoma (NPC) are poorly understood. In this study, we focused on the role of NPC-derived exosomes on angiogenesis. Exosomes derived from the NPC C666-1 cells and immortalized nasopharyngeal epithelial cells (NP69 and NP460) were isolated using ultracentrifugation. The molecular profile and biophysical characteristics of exosomes were verified by Western blotting, sucrose density gradient, and electron microscopy. We showed that the C666-1 exosomes (10 and 20 μg/ml) could significantly increase the tubulogenesis, migration and invasion of human umbilical vein endothelial cells (HUVECs) in a dose-dependent manner. Subsequently, an iTRAQ-based quantitative proteomics was used to identify the differentially expressed proteins in C666-1 exosomes. Among the 640 identified proteins, 51 and 89 proteins were considered as up- and down-regulated (≥ 1.5-fold variations) in C666-1 exosomes compared to the normal counterparts, respectively. As expected, pro-angiogenic proteins including intercellular adhesion molecule-1 (ICAM-1) and CD44 variant isoform 5 (CD44v5) are among the up-regulated proteins, whereas angio-suppressive protein, thrombospondin-1 (TSP-1) was down-regulated in C666-1 exosomes. Further confocal microscopic study and Western blotting clearly demonstrated that the alteration of ICAM-1, and TSP-1 expressions in recipient HUVECs are due to internalization of exosomes. Taken together, these data strongly indicated the critical roles of identified angiogenic proteins in the involvement of exosomes-induced angiogenesis, which could potentially be developed as therapeutic targets in future. This article is protected by copyright. All rights reserved.

  16. Proteomic analysis of exosomes from nasopharyngeal carcinoma cell identifies intercellular transfer of angiogenic proteins

    KAUST Repository

    Chan, Yuk-kit; Zhang, Huoming; Liu, Pei; Tsao, George Sai-wah; Li Lung, Maria; Mak, Nai-ki; Ngok-shun Wong, Ricky; Ying-kit Yue, Patrick

    2015-01-01

    Exosomes, a group of secreted extracellular nanovesicles containing genetic materials and signaling molecules, play a critical role in intercellular communication. During tumorigenesis, exosomes have been demonstrated to promote tumor angiogenesis and metastasis while their biological functions in nasopharyngeal carcinoma (NPC) are poorly understood. In this study, we focused on the role of NPC-derived exosomes on angiogenesis. Exosomes derived from the NPC C666-1 cells and immortalized nasopharyngeal epithelial cells (NP69 and NP460) were isolated using ultracentrifugation. The molecular profile and biophysical characteristics of exosomes were verified by Western blotting, sucrose density gradient, and electron microscopy. We showed that the C666-1 exosomes (10 and 20 μg/ml) could significantly increase the tubulogenesis, migration and invasion of human umbilical vein endothelial cells (HUVECs) in a dose-dependent manner. Subsequently, an iTRAQ-based quantitative proteomics was used to identify the differentially expressed proteins in C666-1 exosomes. Among the 640 identified proteins, 51 and 89 proteins were considered as up- and down-regulated (≥ 1.5-fold variations) in C666-1 exosomes compared to the normal counterparts, respectively. As expected, pro-angiogenic proteins including intercellular adhesion molecule-1 (ICAM-1) and CD44 variant isoform 5 (CD44v5) are among the up-regulated proteins, whereas angio-suppressive protein, thrombospondin-1 (TSP-1) was down-regulated in C666-1 exosomes. Further confocal microscopic study and Western blotting clearly demonstrated that the alteration of ICAM-1, and TSP-1 expressions in recipient HUVECs are due to internalization of exosomes. Taken together, these data strongly indicated the critical roles of identified angiogenic proteins in the involvement of exosomes-induced angiogenesis, which could potentially be developed as therapeutic targets in future. This article is protected by copyright. All rights reserved.

  17. Sex Differences in Attitudes towards Online Privacy and Anonymity among Israeli Students with Different Technical Backgrounds

    Science.gov (United States)

    Weinberger, Maor; Zhitomirsky-Geffet, Maayan; Bouhnik, Dan

    2017-01-01

    Introduction: In this exploratory study, we proposed an experimental framework to investigate and model male/female differences in attitudes towards online privacy and anonymity among Israeli students. Our aim was to comparatively model men and women's online privacy attitudes, and to assess the online privacy gender gap. Method: Various factors…

  18. Criminología Informática. Anonymous: ¿justicia cibernética o terrorismo enmascarado?/Informatic Criminology. Anonymous: ¿Cyber Justice or masked terrorism?

    Directory of Open Access Journals (Sweden)

    Daniel Romano Ozcáriz

    2017-08-01

    Full Text Available Desde hace ya una década se viene escuchando las acciones cibernéticas de un grupo de ciberactivistas autodenominado Anonymous, pero ¿qué sabemos realmente de ellos? Ciertamente poco, debido en parte a la anárquica organización que los representa y a la ingente cantidad de bulos y rumores sin confirmar que inundan las redes. En honor a la verdad, es imprescindible hacer una limpieza de información y separar lo que es este grupo realmente de lo que es puro desprestigio o sobrevaloración, y de las mentiras. Para ello analizaremos cinco puntos fundamentales, para una mejor comprensión: su definición, valores, principios, simbología y su historia/acciones más representativas.

  19. Anonymous or confidential HIV counseling and voluntary testing in federally funded testing sites--United States, 1995-1997.

    Science.gov (United States)

    1999-06-25

    Human immunodeficiency virus (HIV) counseling and voluntary testing (CT) programs have been an important part of national HIV prevention efforts since the first HIV antibody tests became available in 1985. In 1995, these programs accounted for approximately 15% of annual HIV antibody testing in the United States, excluding testing for blood donation. CT opportunities are offered to persons at risk for HIV infection at approximately 11,000 sites, including dedicated HIV CT sites, sexually transmitted disease (STD) clinics, drug-treatment centers, hospitals, and prisons. In 39 states, testing can be obtained anonymously, where persons do not have to give their name to get tested. All states provide confidential testing (by name) and have confidentiality laws and regulations to protect this information. This report compares patterns of anonymous and confidential testing in all federally funded CT programs from 1995 through 1997 and documents the importance of both types of testing opportunities.

  20. cuticleDB: a relational database of Arthropod cuticular proteins

    Directory of Open Access Journals (Sweden)

    Willis Judith H

    2004-09-01

    Full Text Available Abstract Background The insect exoskeleton or cuticle is a bi-partite composite of proteins and chitin that provides protective, skeletal and structural functions. Little information is available about the molecular structure of this important complex that exhibits a helicoidal architecture. Scores of sequences of cuticular proteins have been obtained from direct protein sequencing, from cDNAs, and from genomic analyses. Most of these cuticular protein sequences contain motifs found only in arthropod proteins. Description cuticleDB is a relational database containing all structural proteins of Arthropod cuticle identified to date. Many come from direct sequencing of proteins isolated from cuticle and from sequences from cDNAs that share common features with these authentic cuticular proteins. It also includes proteins from the Drosophila melanogaster and the Anopheles gambiae genomes, that have been predicted to be cuticular proteins, based on a Pfam motif (PF00379 responsible for chitin binding in Arthropod cuticle. The total number of the database entries is 445: 370 derive from insects, 60 from Crustacea and 15 from Chelicerata. The database can be accessed from our web server at http://bioinformatics.biol.uoa.gr/cuticleDB. Conclusions CuticleDB was primarily designed to contain correct and full annotation of cuticular protein data. The database will be of help to future genome annotators. Users will be able to test hypotheses for the existence of known and also of yet unknown motifs in cuticular proteins. An analysis of motifs may contribute to understanding how proteins contribute to the physical properties of cuticle as well as to the precise nature of their interaction with chitin.

  1. Gamblers Anonymous in Israel: a participant observation study of a self-help group.

    Science.gov (United States)

    Cromer, G

    1978-10-01

    This participant observation study of the first Gamblers Anonymous group in Israel is designed to show (1) the ways in which the group helps it members rehabilitate themselves, (2) the three stages through which they must go in order to ensure success, and (3) the reason why some participants fail to do so. The article concludes with a number of observations concerning the extent of gambling in Israel and the different ways that should be developed for dealing with the problem.

  2. Trigeminal nerve injury-induced thrombospondin-4 up-regulation contributes to orofacial neuropathic pain states in a rat model.

    Science.gov (United States)

    Li, K-W; Kim, D-S; Zaucke, F; Luo, Z D

    2014-04-01

    Injury to the trigeminal nerve often results in the development of chronic pain states including tactile allodynia, or hypersensitivity to light touch, in orofacial area, but its underlying mechanisms are poorly understood. Peripheral nerve injury has been shown to cause up-regulation of thrombospondin-4 (TSP4) in dorsal spinal cord that correlates with neuropathic pain development. In this study, we examined whether injury-induced TSP4 is critical in mediating orofacial pain development in a rat model of chronic constriction injury to the infraorbital nerve. Orofacial sensitivity to mechanical stimulation was examined in a unilateral infraorbital nerve ligation rat model. The levels of TSP4 in trigeminal ganglia and associated spinal subnucleus caudalis and C1/C2 spinal cord (Vc/C2) from injured rats were examined at time points correlating with the initiation and peak orofacial hypersensitivity. TSP4 antisense and mismatch oligodeoxynucleotides were intrathecally injected into injured rats to see if antisense oligodeoxynucleotide treatment could reverse injury-induced TSP4 up-regulation and orofacial behavioural hypersensitivity. Our data indicated that trigeminal nerve injury induced TSP4 up-regulation in Vc/C2 at a time point correlated with orofacial tactile allodynia. In addition, intrathecal treatment with TSP4 antisense, but not mismatch, oligodeoxynucleotides blocked both injury-induced TSP4 up-regulation in Vc/C2 and behavioural hypersensitivity. Our data support that infraorbital nerve injury leads to TSP4 up-regulation in trigeminal spinal complex that contributes to orofacial neuropathic pain states. Blocking this pathway may provide an alternative approach in management of orofacial neuropathic pain states. © 2013 European Pain Federation - EFIC®

  3. Yeast hnRNP-related proteins contribute to the maintenance of telomeres

    Energy Technology Data Exchange (ETDEWEB)

    Lee-Soety, Julia Y., E-mail: jlee04@sju.edu [Department of Biology, Saint Joseph' s University, PA 19131 (United States); Jones, Jennifer; MacGibeny, Margaret A.; Remaly, Erin C.; Daniels, Lynsey; Ito, Andrea; Jean, Jessica; Radecki, Hannah; Spencer, Shannon [Department of Biology, Saint Joseph' s University, PA 19131 (United States)

    2012-09-14

    Highlights: Black-Right-Pointing-Pointer Yeast hnRNP-related proteins are able to prevent faster senescence in telomerase-null cells. Black-Right-Pointing-Pointer The conserved RRMs in Npl3 are important for telomere maintenance. Black-Right-Pointing-Pointer Human hnRNP A1 is unable to complement the lack of NPL3 in yeast. Black-Right-Pointing-Pointer Npl3 and Cbc2 may work as telomere capping proteins. -- Abstract: Telomeres protect the ends of linear chromosomes, which if eroded to a critical length can become uncapped and lead to replicative senescence. Telomerase maintains telomere length in some cells, but inappropriate expression facilitates the immortality of cancer cells. Recently, proteins involved in RNA processing and ribosome assembly, such as hnRNP (heterogeneous nuclear ribonucleoprotein) A1, have been found to participate in telomere maintenance in mammals. The Saccharomyces cerevisiae protein Npl3 shares significant amino acid sequence similarities with hnRNP A1. We found that deleting NPL3 accelerated the senescence of telomerase null cells. The highly conserved RNA recognition motifs (RRM) in Npl3 appear to be important for preventing faster senescence. Npl3 preferentially binds telomere sequences in vitro, suggesting that Npl3 may affect telomeres directly. Despite similarities between the two proteins, human hnRNP A1 is unable to complement the lack of Npl3 to rescue accelerated senescence in tlc1 npl3 cells. Deletion of CBC2, which encodes another hnRNP-related protein that associates with Npl3, also accelerates senescence. Potential mechanisms by which hnRNP-related proteins maintain telomeres are discussed.

  4. Social networks as mediators of the effect of Alcoholics Anonymous.

    Science.gov (United States)

    Kaskutas, Lee Ann; Bond, Jason; Humphreys, Keith

    2002-07-01

    This study tested the hypothesis that the relationship between Alcoholics Anonymous (AA) involvement and reduced substance use is partially explained (or 'mediated') by changes in social networks. This is a naturalistic longitudinal study of the course of alcohol problems. Study sites were the 10 largest public and private alcohol treatment programs in a northern California county. Three hundred and seventy-seven men and 277 women were recruited upon seeking treatment at study sites. At baseline and 1-year follow-up, we assessed alcohol consequences and dependence symptoms, consumption, social support for abstinence, pro-drinking social influences and AA involvement. In the structural equation model, AA involvement was a significant predictor of lower alcohol consumption and fewer related problems. The size of this effect decreased by 36% when network size and support for drinking were included as mediators. In logistic regression models predicting abstinence at follow-up, AA remained highly significant after including social network variables but was again reduced in magnitude. Thirty-day abstinence was predicted by AA involvement (OR=2.9), not having pro-drinking influences in one's network (OR=0.7) and having support for reducing consumption from people met in AA (versus no support; OR=3.4). In contrast, having support from non-AA members was not a significant predictor of abstinence. For alcohol-related outcomes other than abstinence, significant relationships were found for both AA-based and non-AA-based support. The type of social support specifically given by AA members, such as 24-hour availability, role modeling and experientially based advice for staying sober, may help to explain AA's mechanism of action. Results highlight the value of focusing on outcomes reflective of AA's goals (such as abstinence) when studying how AA works.

  5. Human-Chromatin-Related Protein Interactions Identify a Demethylase Complex Required for Chromosome Segregation

    Directory of Open Access Journals (Sweden)

    Edyta Marcon

    2014-07-01

    Full Text Available Chromatin regulation is driven by multicomponent protein complexes, which form functional modules. Deciphering the components of these modules and their interactions is central to understanding the molecular pathways these proteins are regulating, their functions, and their relation to both normal development and disease. We describe the use of affinity purifications of tagged human proteins coupled with mass spectrometry to generate a protein-protein interaction map encompassing known and predicted chromatin-related proteins. On the basis of 1,394 successful purifications of 293 proteins, we report a high-confidence (85% precision network involving 11,464 protein-protein interactions among 1,738 different human proteins, grouped into 164 often overlapping protein complexes with a particular focus on the family of JmjC-containing lysine demethylases, their partners, and their roles in chromatin remodeling. We show that RCCD1 is a partner of histone H3K36 demethylase KDM8 and demonstrate that both are important for cell-cycle-regulated transcriptional repression in centromeric regions and accurate mitotic division.

  6. SH2/SH3 adaptor proteins can link tyrosine kinases to a Ste20-related protein kinase, HPK1.

    Science.gov (United States)

    Anafi, M; Kiefer, F; Gish, G D; Mbamalu, G; Iscove, N N; Pawson, T

    1997-10-31

    Ste20-related protein kinases have been implicated as regulating a range of cellular responses, including stress-activated protein kinase pathways and the control of cytoskeletal architecture. An important issue involves the identities of the upstream signals and regulators that might control the biological functions of mammalian Ste20-related protein kinases. HPK1 is a protein-serine/threonine kinase that possesses a Ste20-like kinase domain, and in transfected cells activates a protein kinase pathway leading to the stress-activated protein kinase SAPK/JNK. Here we have investigated candidate upstream regulators that might interact with HPK1. HPK1 possesses an N-terminal catalytic domain and an extended C-terminal tail with four proline-rich motifs. The SH3 domains of Grb2 bound in vitro to specific proline-rich motifs in the HPK1 tail and functioned synergistically to direct the stable binding of Grb2 to HPK1 in transfected Cos1 cells. Epidermal growth factor (EGF) stimulation did not affect the binding of Grb2 to HPK1 but induced recruitment of the Grb2.HPK1 complex to the autophosphorylated EGF receptor and to the Shc docking protein. Several activated receptor and cytoplasmic tyrosine kinases, including the EGF receptor, stimulated the tyrosine phosphorylation of the HPK1 serine/threonine kinase. These results suggest that HPK1, a mammalian Ste20-related protein-serine/threonine kinase, can potentially associate with protein-tyrosine kinases through interactions mediated by SH2/SH3 adaptors such as Grb2. Such interaction may provide a possible mechanism for cross-talk between distinct biochemical pathways following the activation of tyrosine kinases.

  7. Integration of relational and hierarchical network information for protein function prediction

    Directory of Open Access Journals (Sweden)

    Jiang Xiaoyu

    2008-08-01

    Full Text Available Abstract Background In the current climate of high-throughput computational biology, the inference of a protein's function from related measurements, such as protein-protein interaction relations, has become a canonical task. Most existing technologies pursue this task as a classification problem, on a term-by-term basis, for each term in a database, such as the Gene Ontology (GO database, a popular rigorous vocabulary for biological functions. However, ontology structures are essentially hierarchies, with certain top to bottom annotation rules which protein function predictions should in principle follow. Currently, the most common approach to imposing these hierarchical constraints on network-based classifiers is through the use of transitive closure to predictions. Results We propose a probabilistic framework to integrate information in relational data, in the form of a protein-protein interaction network, and a hierarchically structured database of terms, in the form of the GO database, for the purpose of protein function prediction. At the heart of our framework is a factorization of local neighborhood information in the protein-protein interaction network across successive ancestral terms in the GO hierarchy. We introduce a classifier within this framework, with computationally efficient implementation, that produces GO-term predictions that naturally obey a hierarchical 'true-path' consistency from root to leaves, without the need for further post-processing. Conclusion A cross-validation study, using data from the yeast Saccharomyces cerevisiae, shows our method offers substantial improvements over both standard 'guilt-by-association' (i.e., Nearest-Neighbor and more refined Markov random field methods, whether in their original form or when post-processed to artificially impose 'true-path' consistency. Further analysis of the results indicates that these improvements are associated with increased predictive capabilities (i.e., increased

  8. SAM: Secure Access of Media Independent Information Service with User Anonymity

    Directory of Open Access Journals (Sweden)

    Li Guangsong

    2010-01-01

    Full Text Available Seamless handover across different access technologies is very important in the future wireless networks. To optimize vertical handover in heterogeneous networks, IEEE 802.21 standard defines Media Independent Handover (MIH services. The MIH services can be a new target to attackers, which will be the main concern for equipment vendors and service providers. In this paper, we focus specifically on security of Media Independent Information Service (MIIS and present a new access authentication scheme with user anonymity for MIIS. The protocol can be used to establish a secure channel between the mobile node and the information server. Security and performance of the protocol are also analyzed in this paper.

  9. Identification of De Novo Synthesized and Relatively Older Proteins

    OpenAIRE

    Jaleel, Abdul; Henderson, Gregory C.; Madden, Benjamin J.; Klaus, Katherine A.; Morse, Dawn M.; Gopala, Srinivas; Nair, K. Sreekumaran

    2010-01-01

    OBJECTIVE The accumulation of old and damaged proteins likely contributes to complications of diabetes, but currently no methodology is available to measure the relative age of a specific protein alongside assessment of posttranslational modifications (PTM). To accomplish our goal of studying the impact of insulin deficiency and hyperglycemia in type 1 diabetes upon accumulation of old damaged isoforms of plasma apolipoprotein A-1 (ApoA-1), we sought to develop a novel methodology, which is r...

  10. Alcoholics Anonymous and other mutual help organizations: Impact of a 45-minute didactic for primary care and categorical internal medicine residents.

    Science.gov (United States)

    Marcovitz, David; Cristello, Julie V; Kelly, John F

    2017-01-01

    Substance use disorders (SUDs) are highly prevalent among primary care patients. One evidence-based, cost-effective referral option is ubiquitous mutual help organizations (MHOs) such as Alcoholics Anonymous (AA), Narcotics Anonymous (NA), and SMART Recovery; however, little is known about how to effectively increase trainee knowledge and confidence with these referrals. The primary aim of this study was to evaluate whether a single 45-minute combined lecture and role play-based didactic for primary care residents could enhance knowledge, improve attitudes, and bolster confidence in referring patients with addictions to community MHOs. The authors developed a 45-minute lecture and role play addressing the evidence for MHOs, their respective background/content, and how to make effective referrals. Participants were administered a brief survey of their MHO-related knowledge, attitudes, and confidence before and after the session to evaluate the didactic impact. Participants were 55 primary care and categorical internal medicine residents divided among postgraduate year 1 (PGY1; 27.3%), PGY2 (38.2%), and PGY3 (34.5%). They had a mean age of 29 (SD = 2.62); 49% were female, 69% were Caucasian, and 78% reported some religious affiliation. Participants' subjective knowledge about MHOs increased significantly (P didactic. Role play may be a useful supplementary tool in enhancing residents' knowledge and skill in treating patients with SUD.

  11. Attachment Styles and Changes among Women Members of Overeaters Anonymous Who Have Recovered from Binge-Eating Disorder

    Science.gov (United States)

    Hertz, Pnina; Addad, Moshe; Ronel, Natti

    2012-01-01

    In Overeaters Anonymous (OA), the 12-step self-help program for compulsive overeaters, binge eating is regarded as a physical, spiritual, and emotional disorder. Consequently, the program proposes recovery through the adoption of a lifestyle that leads to physical, spiritual, and emotional well-being. A qualitative phenomenological study that…

  12. The Diversity of Yellow-Related Proteins in Sand Flies (Diptera: Psychodidae.

    Directory of Open Access Journals (Sweden)

    Michal Sima

    Full Text Available Yellow-related proteins (YRPs present in sand fly saliva act as affinity binders of bioamines, and help the fly to complete a bloodmeal by scavenging the physiological signals of damaged cells. They are also the main antigens in sand fly saliva and their recombinant form is used as a marker of host exposure to sand flies. Moreover, several salivary proteins and plasmids coding these proteins induce strong immune response in hosts bitten by sand flies and are being used to design protecting vaccines against Leishmania parasites. In this study, thirty two 3D models of different yellow-related proteins from thirteen sand fly species of two genera were constructed based on the known protein structure from Lutzomyia longipalpis. We also studied evolutionary relationships among species based on protein sequences as well as sequence and structural variability of their ligand-binding site. All of these 33 sand fly YRPs shared a similar structure, including a unique tunnel that connects the ligand-binding site with the solvent by two independent paths. However, intraspecific modifications found among these proteins affects the charges of the entrances to the tunnel, the length of the tunnel and its hydrophobicity. We suggest that these structural and sequential differences influence the ligand-binding abilities of these proteins and provide sand flies with a greater number of YRP paralogs with more nuanced answers to bioamines. All these characteristics allow us to better evaluate these proteins with respect to their potential use as part of anti-Leishmania vaccines or as an antigen to measure host exposure to sand flies.

  13. iDASH: integrating data for analysis, anonymization, and sharing

    Science.gov (United States)

    Bafna, Vineet; Boxwala, Aziz A; Chapman, Brian E; Chapman, Wendy W; Chaudhuri, Kamalika; Day, Michele E; Farcas, Claudiu; Heintzman, Nathaniel D; Jiang, Xiaoqian; Kim, Hyeoneui; Kim, Jihoon; Matheny, Michael E; Resnic, Frederic S; Vinterbo, Staal A

    2011-01-01

    iDASH (integrating data for analysis, anonymization, and sharing) is the newest National Center for Biomedical Computing funded by the NIH. It focuses on algorithms and tools for sharing data in a privacy-preserving manner. Foundational privacy technology research performed within iDASH is coupled with innovative engineering for collaborative tool development and data-sharing capabilities in a private Health Insurance Portability and Accountability Act (HIPAA)-certified cloud. Driving Biological Projects, which span different biological levels (from molecules to individuals to populations) and focus on various health conditions, help guide research and development within this Center. Furthermore, training and dissemination efforts connect the Center with its stakeholders and educate data owners and data consumers on how to share and use clinical and biological data. Through these various mechanisms, iDASH implements its goal of providing biomedical and behavioral researchers with access to data, software, and a high-performance computing environment, thus enabling them to generate and test new hypotheses. PMID:22081224

  14. Anonymization of Electronic Medical Records to Support Clinical Analysis

    CERN Document Server

    Gkoulalas-Divanis, Aris

    2013-01-01

    Anonymization of Electronic Medical Records to Support Clinical Analysis closely examines the privacy threats that may arise from medical data sharing, and surveys the state-of-the-art methods developed to safeguard data against these threats. To motivate the need for computational methods, the book first explores the main challenges facing the privacy-protection of medical data using the existing policies, practices and regulations. Then, it takes an in-depth look at the popular computational privacy-preserving methods that have been developed for demographic, clinical and genomic data sharing, and closely analyzes the privacy principles behind these methods, as well as the optimization and algorithmic strategies that they employ. Finally, through a series of in-depth case studies that highlight data from the US Census as well as the Vanderbilt University Medical Center, the book outlines a new, innovative class of privacy-preserving methods designed to ensure the integrity of transferred medical data for su...

  15. Comparative proteomic analysis of normal and collagen IX null mouse cartilage reveals altered extracellular matrix composition and novel components of the collagen IX interactome.

    Science.gov (United States)

    Brachvogel, Bent; Zaucke, Frank; Dave, Keyur; Norris, Emma L; Stermann, Jacek; Dayakli, Münire; Koch, Manuel; Gorman, Jeffrey J; Bateman, John F; Wilson, Richard

    2013-05-10

    Collagen IX is an integral cartilage extracellular matrix component important in skeletal development and joint function. Proteomic analysis and validation studies revealed novel alterations in collagen IX null cartilage. Matrilin-4, collagen XII, thrombospondin-4, fibronectin, βig-h3, and epiphycan are components of the in vivo collagen IX interactome. We applied a proteomics approach to advance our understanding of collagen IX ablation in cartilage. The cartilage extracellular matrix is essential for endochondral bone development and joint function. In addition to the major aggrecan/collagen II framework, the interacting complex of collagen IX, matrilin-3, and cartilage oligomeric matrix protein (COMP) is essential for cartilage matrix stability, as mutations in Col9a1, Col9a2, Col9a3, Comp, and Matn3 genes cause multiple epiphyseal dysplasia, in which patients develop early onset osteoarthritis. In mice, collagen IX ablation results in severely disturbed growth plate organization, hypocellular regions, and abnormal chondrocyte shape. This abnormal differentiation is likely to involve altered cell-matrix interactions but the mechanism is not known. To investigate the molecular basis of the collagen IX null phenotype we analyzed global differences in protein abundance between wild-type and knock-out femoral head cartilage by capillary HPLC tandem mass spectrometry. We identified 297 proteins in 3-day cartilage and 397 proteins in 21-day cartilage. Components that were differentially abundant between wild-type and collagen IX-deficient cartilage included 15 extracellular matrix proteins. Collagen IX ablation was associated with dramatically reduced COMP and matrilin-3, consistent with known interactions. Matrilin-1, matrilin-4, epiphycan, and thrombospondin-4 levels were reduced in collagen IX null cartilage, providing the first in vivo evidence for these proteins belonging to the collagen IX interactome. Thrombospondin-4 expression was reduced at the mRNA level

  16. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Science.gov (United States)

    Mehmood, Zahid; Chen, Gongliang; Li, Jianhua; Li, Linsen; Alzahrani, Bander

    2017-01-01

    Over the past few years, Session Initiation Protocol (SIP) is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  17. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Directory of Open Access Journals (Sweden)

    Zahid Mehmood

    Full Text Available Over the past few years, Session Initiation Protocol (SIP is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  18. A case study of the Secure Anonymous Information Linkage (SAIL) Gateway: A privacy-protecting remote access system for health-related research and evaluation☆

    Science.gov (United States)

    Jones, Kerina H.; Ford, David V.; Jones, Chris; Dsilva, Rohan; Thompson, Simon; Brooks, Caroline J.; Heaven, Martin L.; Thayer, Daniel S.; McNerney, Cynthia L.; Lyons, Ronan A.

    2014-01-01

    With the current expansion of data linkage research, the challenge is to find the balance between preserving the privacy of person-level data whilst making these data accessible for use to their full potential. We describe a privacy-protecting safe haven and secure remote access system, referred to as the Secure Anonymised Information Linkage (SAIL) Gateway. The Gateway provides data users with a familiar Windows interface and their usual toolsets to access approved anonymously-linked datasets for research and evaluation. We outline the principles and operating model of the Gateway, the features provided to users within the secure environment, and how we are approaching the challenges of making data safely accessible to increasing numbers of research users. The Gateway represents a powerful analytical environment and has been designed to be scalable and adaptable to meet the needs of the rapidly growing data linkage community. PMID:24440148

  19. Domestic violence in a UK abortion clinic: anonymous cross-sectional prevalence survey.

    Science.gov (United States)

    Motta, Silvia; Penn-Kekana, Loveday; Bewley, Susan

    2015-04-01

    To measure the prevalence of domestic violence (DV) experienced by women seeking termination of pregnancy (TOP) in a UK abortion clinic. A cross-sectional anonymous questionnaire survey of all women aged over 16 years accessing a TOP clinic in inner London between 20 May 2012 and 2 July 2012. The main outcome measures were: distribution of questionnaires, response rate, lifetime prevalence of abuse, past-year prevalence of physical and sexual abuse, prevalence of physical abuse during current pregnancy, relationship of lifetime abuse to number of terminations, and receptivity to DV services. Questionnaires were distributed to 46% (383/828) of women accessing the clinic. Response rate was 50% (190/383). Lifetime prevalence of abuse was 16%. Past-year prevalence of physical abuse was 11% and sexual abuse was 4%. Prevalence of physical abuse during the current pregnancy was 4%. Prevalence of lifetime abuse was lower in women having a first termination (12%) versus one (20%) or two or more previous terminations (24%), although this was not statistically significant (p=0.192). The majority (75%) of participants expressing an opinion on the possibility of having a support service for DV in the abortion clinic setting were positive, unrelated to their personal experience, but some concerns were raised about implementation. In order to provide effective support for women, services require a needs assessment of their local population. Asking women presenting for abortion about DV, even anonymously, is challenging but feasible. Future work should be directed to women's unmet safety needs. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  20. Moves on the Street: Classifying Crime Hotspots Using Aggregated Anonymized Data on People Dynamics.

    Science.gov (United States)

    Bogomolov, Andrey; Lepri, Bruno; Staiano, Jacopo; Letouzé, Emmanuel; Oliver, Nuria; Pianesi, Fabio; Pentland, Alex

    2015-09-01

    The wealth of information provided by real-time streams of data has paved the way for life-changing technological advancements, improving the quality of life of people in many ways, from facilitating knowledge exchange to self-understanding and self-monitoring. Moreover, the analysis of anonymized and aggregated large-scale human behavioral data offers new possibilities to understand global patterns of human behavior and helps decision makers tackle problems of societal importance. In this article, we highlight the potential societal benefits derived from big data applications with a focus on citizen safety and crime prevention. First, we introduce the emergent new research area of big data for social good. Next, we detail a case study tackling the problem of crime hotspot classification, that is, the classification of which areas in a city are more likely to witness crimes based on past data. In the proposed approach we use demographic information along with human mobility characteristics as derived from anonymized and aggregated mobile network data. The hypothesis that aggregated human behavioral data captured from the mobile network infrastructure, in combination with basic demographic information, can be used to predict crime is supported by our findings. Our models, built on and evaluated against real crime data from London, obtain accuracy of almost 70% when classifying whether a specific area in the city will be a crime hotspot or not in the following month.

  1. A secure user anonymity-preserving three-factor remote user authentication scheme for the telecare medicine information systems.

    Science.gov (United States)

    Das, Ashok Kumar

    2015-03-01

    Recent advanced technology enables the telecare medicine information system (TMIS) for the patients to gain the health monitoring facility at home and also to access medical services over the Internet of mobile networks. Several remote user authentication schemes have been proposed in the literature for TMIS. However, most of them are either insecure against various known attacks or they are inefficient. Recently, Tan proposed an efficient user anonymity preserving three-factor authentication scheme for TMIS. In this paper, we show that though Tan's scheme is efficient, it has several security drawbacks such as (1) it fails to provide proper authentication during the login phase, (2) it fails to provide correct updation of password and biometric of a user during the password and biometric update phase, and (3) it fails to protect against replay attack. In addition, Tan's scheme lacks the formal security analysis and verification. Later, Arshad and Nikooghadam also pointed out some security flaws in Tan's scheme and then presented an improvement on Tan's s scheme. However, we show that Arshad and Nikooghadam's scheme is still insecure against the privileged-insider attack through the stolen smart-card attack, and it also lacks the formal security analysis and verification. In order to withstand those security loopholes found in both Tan's scheme, and Arshad and Nikooghadam's scheme, we aim to propose an effective and more secure three-factor remote user authentication scheme for TMIS. Our scheme provides the user anonymity property. Through the rigorous informal and formal security analysis using random oracle models and the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool, we show that our scheme is secure against various known attacks, including the replay and man-in-the-middle attacks. Furthermore, our scheme is also efficient as compared to other related schemes.

  2. Compatibility of a novel thrombospondin-1 analog with fertility and pregnancy in a xenograft mouse model of endometriosis.

    Directory of Open Access Journals (Sweden)

    Diane S Nakamura

    Full Text Available Endometriosis is a gynecological disease defined by the growth of endometrium outside of the uterus. Although endometriosis contributes to 50% of female infertility cases, medical treatments are incompatible with pregnancy. Angiogenesis, the growth of blood vessels from existing vasculature, plays a crucial role in endometriotic lesion growth and survival. Previously, we demonstrated the effectiveness of thrombospondin-1 analog, ABT-898 (Abbott Laboratories to inhibit endometriotic lesion vascularization in mice. We have now evaluated the trans-generational implications of ABT-898 treatment before and during mouse pregnancy. We hypothesized that ABT-898 would target lesion vasculature without affecting pregnancy, offspring development, or ovarian and uterine vascularity in mice. Endometriosis was induced using human endometrium in β-estradiol-primed BALB/c-Rag-2-/-Il2rγ-/- mice receiving intraperitoneal injections of ABT-898 (25 mg/kg or 5% dextrose control for 21 days. Ultrasound assessment of lesion vascularization revealed a reduction in blood flow supplying treated lesions. Excised ABT-898 treated lesions stained for CD31+ endothelial cells exhibited a decrease in microvessel density. Following confirmation of estrous cycling, mice were bred and treated with ABT-898 on gestation days 7, 9, 11, 13, 15, 17, and 19. ABT-898 did not affect estrous cycling or pregnancy parameters including litter size across generations and offspring weight gain. Quantification of angiogenic cytokine plasma levels revealed no significant differences between treatment groups. Vimentin staining of the uterus and ovary revealed no observable effects of ABT-898. Similarly, no obvious histological anomalies were observed in the kidney, liver, ovary, or uterus following ABT-898 treatment. These results suggest that ABT-898 effectively inhibit endometriotic lesion vascularization without affecting trans-generational pregnancy outcomes in mice.

  3. Structure and dynamics of the peptide strand KRFK from the thrombospondin TSP-1 in water.

    Science.gov (United States)

    Taleb Bendiab, W; Benomrane, B; Bounaceur, B; Dauchez, M; Krallafa, A M

    2018-02-14

    Theoretical investigations of a solute in liquid water at normal temperature and pressure can be performed at different levels of theory. Static quantum calculations as well as classical and ab initio molecular dynamics are used to completely explore the conformational space for large solvated molecular systems. In the classical approach, it is essential to describe all of the interactions of the solute and the solvent in detail. Water molecules are very often described as rigid bodies when the most commonly used interaction potentials, such as the SPCE and the TIP4P models, are employed. Recently, a physical model based upon a cluster of rigid water molecules with a tetrahedral architecture (AB 4 ) was proposed that describes liquid water as a mixture of both TIP4P and SPCE molecular species that occur in the proportions implied by the tetrahedral architecture (one central molecule versus four outer molecules; i.e., 20% TIP4P versus 80% SPCE molecules). In this work, theoretical spectroscopic data for a peptide strand were correlated with the structural properties of the peptide strand solvated in water, based on data calculated using different theoretical approaches and physical models. We focused on a particular peptide strand, KRFK (lysine-arginine-phenylalanine-lysine), found in the thrombospondin TSP-1, due to its interesting properties. As the activity and electronic structure of this system is strongly linked to its structure, we correlated its structure with charge-density maps obtained using different semi-empirical charge Q eq equations. The structural and thermodynamic properties obtained from classical simulations were correlated with ab initio molecular dynamics (AIMD) data. Structural changes in the peptide strand were rationalized in terms of the motions of atoms and groups of atoms. To achieve this, conformational changes were investigated using calculated infrared spectra for the peptide in the gas phase and in water solvent. The calculated AIMD

  4. Preserving Smart Objects Privacy through Anonymous and Accountable Access Control for a M2M-Enabled Internet of Things

    Science.gov (United States)

    Hernández-Ramos, José L.; Bernabe, Jorge Bernal; Moreno, M. Victoria; Skarmeta, Antonio F.

    2015-01-01

    As we get into the Internet of Things era, security and privacy concerns remain as the main obstacles in the development of innovative and valuable services to be exploited by society. Given the Machine-to-Machine (M2M) nature of these emerging scenarios, the application of current privacy-friendly technologies needs to be reconsidered and adapted to be deployed in such global ecosystem. This work proposes different privacy-preserving mechanisms through the application of anonymous credential systems and certificateless public key cryptography. The resulting alternatives are intended to enable an anonymous and accountable access control approach to be deployed on large-scale scenarios, such as Smart Cities. Furthermore, the proposed mechanisms have been deployed on constrained devices, in order to assess their suitability for a secure and privacy-preserving M2M-enabled Internet of Things. PMID:26140349

  5. Preserving Smart Objects Privacy through Anonymous and Accountable Access Control for a M2M-Enabled Internet of Things

    Directory of Open Access Journals (Sweden)

    José L. Hernández-Ramos

    2015-07-01

    Full Text Available As we get into the Internet of Things era, security and privacy concerns remain as the main obstacles in the development of innovative and valuable services to be exploited by society. Given the Machine-to-Machine (M2M nature of these emerging scenarios, the application of current privacy-friendly technologies needs to be reconsidered and adapted to be deployed in such global ecosystem. This work proposes different privacy-preserving mechanisms through the application of anonymous credential systems and certificateless public key cryptography. The resulting alternatives are intended to enable an anonymous and accountable access control approach to be deployed on large-scale scenarios, such as Smart Cities. Furthermore, the proposed mechanisms have been deployed on constrained devices, in order to assess their suitability for a secure and privacy-preserving M2M-enabled Internet of Things.

  6. Preserving Smart Objects Privacy through Anonymous and Accountable Access Control for a M2M-Enabled Internet of Things.

    Science.gov (United States)

    Hernández-Ramos, José L; Bernabe, Jorge Bernal; Moreno, M Victoria; Skarmeta, Antonio F

    2015-07-01

    As we get into the Internet of Things era, security and privacy concerns remain as the main obstacles in the development of innovative and valuable services to be exploited by society. Given the Machine-to-Machine (M2M) nature of these emerging scenarios, the application of current privacy-friendly technologies needs to be reconsidered and adapted to be deployed in such global ecosystem. This work proposes different privacy-preserving mechanisms through the application of anonymous credential systems and certificateless public key cryptography. The resulting alternatives are intended to enable an anonymous and accountable access control approach to be deployed on large-scale scenarios, such as Smart Cities. Furthermore, the proposed mechanisms have been deployed on constrained devices, in order to assess their suitability for a secure and privacy-preserving M2M-enabled Internet of Things.

  7. Effects of Cultural Orientation on Attitude Toward Anonymity in E-Collaboration

    Science.gov (United States)

    Zhong, Yingqin; Liu, Na; Lim, John

    The important role of attitude in the acceptance and diffusion of technology has been widely acknowledged. Greater research efforts have been called for examining the relationships between cultural variables and attitude toward technology. In this regard, this study investigates the impact of cultural orientation (focusing on an individual's degree of collectivism) on attitude toward e-collaboration technology. A theoretical model is proposed and subsequently tested using a questionnaire survey involving 236 data points. Self-reliance, competitive success, and group work orientation are found as significant indicators reflecting an individual's degree of collectivism, which in turn influences willingness to participate, evaluation of collaborative effort, and preference for anonymity feature. Subsequently, the three variables are found to affect perceptions about decision quality, enjoyment, uncertainty, and pressure in e-collaboration.

  8. Relating the effects of protein type and content in increased-protein cheese pies to consumers' perception of satiating capacity.

    Science.gov (United States)

    Marcano, J; Varela, P; Fiszman, S

    2015-02-01

    Since proteins have been shown to have the highest satiation-inducing effects of all the macronutrients, increasing the protein level is one of the main strategies for designing foods with enhanced satiating capacity. However, few studies analyze the effect that protein addition has on the texture and flavor characteristics of the target food item to relate it to the expected satiating capacity it elicits. The present work studied cheese pies with three levels of soy and whey proteins. Since the protein level altered the rheological behavior of the batters before baking and the texture of the baked pies, the feasibility of adding several protein levels for obtaining a range of final products was investigated. A check-all-that-apply questionnaire containing 32 sensory and non-sensory characteristics of the samples was given to consumers (n = 131) who also scored the perceived samples' satiating capacity. The results showed that the type and content of protein contributed distinctive sensory characteristics to the samples that could be related to their satiating capacity perception. Harder and drier samples (high protein levels) were perceived as more satiating with less perceptible sweet and milky cheese pie characteristic flavors. Soy contributed an off-flavour. These results will contribute to a better understanding of the interrelation of all these factors, aiding the development of highly palatable solid foods with enhanced satiating capacities.

  9. Chaotic maps and biometrics-based anonymous three-party authenticated key exchange protocol without using passwords

    Science.gov (United States)

    Xie, Qi; Hu, Bin; Chen, Ke-Fei; Liu, Wen-Hao; Tan, Xiao

    2015-11-01

    In three-party password authenticated key exchange (AKE) protocol, since two users use their passwords to establish a secure session key over an insecure communication channel with the help of the trusted server, such a protocol may suffer the password guessing attacks and the server has to maintain the password table. To eliminate the shortages of password-based AKE protocol, very recently, according to chaotic maps, Lee et al. [2015 Nonlinear Dyn. 79 2485] proposed a first three-party-authenticated key exchange scheme without using passwords, and claimed its security by providing a well-organized BAN logic test. Unfortunately, their protocol cannot resist impersonation attack, which is demonstrated in the present paper. To overcome their security weakness, by using chaotic maps, we propose a biometrics-based anonymous three-party AKE protocol with the same advantages. Further, we use the pi calculus-based formal verification tool ProVerif to show that our AKE protocol achieves authentication, security and anonymity, and an acceptable efficiency. Project supported by the Natural Science Foundation of Zhejiang Province, China (Grant No. LZ12F02005), the Major State Basic Research Development Program of China (Grant No. 2013CB834205), and the National Natural Science Foundation of China (Grant No. 61070153).

  10. Staurosporine and extracellular matrix proteins mediate the conversion of small cell lung carcinoma cells into a neuron-like phenotype.

    Directory of Open Access Journals (Sweden)

    Tamara Murmann

    Full Text Available Small cell lung carcinomas (SCLCs represent highly aggressive tumors with an overall five-year survival rate in the range of 5 to 10%. Here, we show that four out of five SCLC cell lines reversibly develop a neuron-like phenotype on extracellular matrix constituents such as fibronectin, laminin or thrombospondin upon staurosporine treatment in an RGD/integrin-mediated manner. Neurite-like processes extend rapidly with an average speed of 10 µm per hour. Depending on the cell line, staurosporine treatment affects either cell cycle arrest in G2/M phase or induction of polyploidy. Neuron-like conversion, although not accompanied by alterations in the expression pattern of a panel of neuroendocrine genes, leads to changes in protein expression as determined by two-dimensional gel electrophoresis. It is likely that SCLC cells already harbour the complete molecular repertoire to convert into a neuron-like phenotype. More extensive studies are needed to evaluate whether the conversion potential of SCLC cells is suitable for therapeutic interventions.

  11. Inseminação artificial e anonimato do doador Artificial insemination and donor anonymity

    Directory of Open Access Journals (Sweden)

    Maria do Carmo Demasi Wanssa

    2010-12-01

    Full Text Available Através desse trabalho, objetiva-se abordar o tema de doação de gametas e do anonimato envolvendo este ato na reprodução medicamente assistida. Analisando rapidamente o caráter técnico da doação e seleção dos gametas e a necessidade de uma legislação específica sobre o assunto nos diferentes países do mundo que adotaram esse método, diante da pluralidade social existente. Consideram-se os aspectos éticos e legais vigentes no Brasil ditados pela Resolução do Conselho Federal de Medicina n° 1.358/93 que determina as condutas dos médicos brasileiros e define, dentre outros aspectos, o da doação e do anonimato, envolvendo o aspecto autonomia. A necessidade de proteção dos sujeitos através do termo de consentimento informado ou de recusa informada, permitindo garantir a informação e esclarecimento necessário ao casal que decide submeter-se aos planos de reprodução medicamente assistida assim como ao doador que, por sua vez, também deve dar garantias escritas quanto à espontaneidade e à alienação dos direitos sobre os gametas à instituição que se torna a responsável por estes. Tudo isso, aliado à veracidade e confidencialidade, compõe os elementos fundamentais para a manutenção do anonimato entre o doador e o receptor. Anonimato este, ainda muito discutido pelos estudiosos de diversas áreas e países.This article aims to address the issue of the donation of gametes and the anonymity involved in this act of medically-assisted reproduction. It briefly discusses the technical aspects of the donation and selection of gametes and the need for specific legislation on the issue in various countries that have adopted this method, in view of the plurality of different social systems in the world today. The article addresses the legal and ethical issues that are currently being aired in Brazil, and the rulings contained in the Federal Medical Council Resolution 1,358/93, which rules on the conduct of physicians in

  12. Anonymization of Court Decisions: Are Restrictions on the Right to Information in “Accordance with the Law”?

    Directory of Open Access Journals (Sweden)

    Gruodytė Edita

    2016-12-01

    Full Text Available In Lithuania rules for the anonymization of court decisions were introduced in 2005. These rules require automatic anonymization of all court decisions, which in the opinion of the authors violates the public interest to know and freedom of expression is unjustifiably restricted on behalf of the right to privacy. This issue covers two diametrically opposed human rights: the right to privacy and the right to information. The first question is how the balance between two equivalent rights could be reached. The second question is whether this regulation is in accordance with the law as it is established in the national Constitution and revealed by the Constitutional Court of the Republic of Lithuania and developed by the jurisprudence of the European Court of Human Rights. The authors conclude that the legislator is not empowered to delegate to the Judicial Council issues which are a matter of legal regulation and suggest possible solutions evaluating practice of the Court of Justice of the European Union, the European Court of Human Rights, and selected EU countries.

  13. A case study of the Secure Anonymous Information Linkage (SAIL) Gateway: a privacy-protecting remote access system for health-related research and evaluation.

    Science.gov (United States)

    Jones, Kerina H; Ford, David V; Jones, Chris; Dsilva, Rohan; Thompson, Simon; Brooks, Caroline J; Heaven, Martin L; Thayer, Daniel S; McNerney, Cynthia L; Lyons, Ronan A

    2014-08-01

    With the current expansion of data linkage research, the challenge is to find the balance between preserving the privacy of person-level data whilst making these data accessible for use to their full potential. We describe a privacy-protecting safe haven and secure remote access system, referred to as the Secure Anonymised Information Linkage (SAIL) Gateway. The Gateway provides data users with a familiar Windows interface and their usual toolsets to access approved anonymously-linked datasets for research and evaluation. We outline the principles and operating model of the Gateway, the features provided to users within the secure environment, and how we are approaching the challenges of making data safely accessible to increasing numbers of research users. The Gateway represents a powerful analytical environment and has been designed to be scalable and adaptable to meet the needs of the rapidly growing data linkage community. Copyright © 2014 The Aurthors. Published by Elsevier Inc. All rights reserved.

  14. Exploring Sequence Characteristics Related to High- Level Production of Secreted Proteins in Aspergillus niger

    NARCIS (Netherlands)

    Van den Berg, B.A.; Reinders, M.J.T.; Hulsman, M.; Wu, L.; Pel, H.J.; Roubos, J.A.; De Ridder, D.

    2012-01-01

    Protein sequence features are explored in relation to the production of over-expressed extracellular proteins by fungi. Knowledge on features influencing protein production and secretion could be employed to improve enzyme production levels in industrial bioprocesses via protein engineering. A large

  15. Oxysterol-binding protein-related protein (ORP) 9 is a PDK-2 substrate and regulates Akt phosphorylation.

    Science.gov (United States)

    Lessmann, Eva; Ngo, Mike; Leitges, Michael; Minguet, Susana; Ridgway, Neale D; Huber, Michael

    2007-02-01

    The oxysterol-binding protein and oxysterol-binding protein-related protein family has been implicated in lipid transport and metabolism, vesicle trafficking and cell signaling. While investigating the phosphorylation of Akt/protein kinase B in stimulated bone marrow-derived mast cells, we observed that a monoclonal antibody directed against phospho-S473 Akt cross-reacted with oxysterol-binding protein-related protein 9 (ORP9). Further analysis revealed that mast cells exclusively express ORP9S, an N-terminal truncated version of full-length ORP9L. A PDK-2 consensus phosphorylation site in ORP9L and OPR9S at S287 (VPEFS(287)Y) was confirmed by site-directed mutagenesis. In contrast to Akt, increased phosphorylation of ORP9S S287 in stimulated mast cells was independent of phosphatidylinositol 3-kinase but sensitive to inhibition of conventional PKC isotypes. PKC-beta dependence was confirmed by lack of ORP9S phosphorylation at S287 in PKC-beta-deficient, but not PKC-alpha-deficient, mast cells. Moreover, co-immunoprecipitation of PKC-beta and ORP9S, and in vitro phosphorylation of ORP9S in this complex, argued for direct phosphorylation of ORP9S by PKC-beta, introducing ORP9S as a novel PKC-beta substrate. Akt was also detected in a PKC-beta/ORP9S immune complex and phosphorylation of Akt on S473 was delayed in PKC-deficient mast cells. In HEK293 cells, RNAi experiments showed that depletion of ORP9L increased Akt S473 phosphorylation 3-fold without affecting T308 phosphorylation in the activation loop. Furthermore, mammalian target of rapamycin was implicated in ORP9L phosphorylation in HEK293 cells. These studies identify ORP9 as a PDK-2 substrate and negative regulator of Akt phosphorylation at the PDK-2 site.

  16. Cartilage oligomeric matrix protein enhances matrix assembly during chondrogenesis of human mesenchymal stem cells.

    Science.gov (United States)

    Haleem-Smith, Hana; Calderon, Raul; Song, Yingjie; Tuan, Rocky S; Chen, Faye H

    2012-04-01

    Cartilage oligomeric matrix protein/thrombospondin-5 (COMP/TSP5) is an abundant cartilage extracellular matrix (ECM) protein that interacts with major cartilage ECM components, including aggrecan and collagens. To test our hypothesis that COMP/TSP5 functions in the assembly of the ECM during cartilage morphogenesis, we have employed mesenchymal stem cell (MSC) chondrogenesis in vitro as a model to examine the effects of COMP over-expression on neo-cartilage formation. Human bone marrow-derived MSCs were transfected with either full-length COMP cDNA or control plasmid, followed by chondrogenic induction in three-dimensional pellet or alginate hydrogel culture. MSC chondrogenesis and ECM production was estimated based on quantitation of sulfated glycosaminoglycan (sGAG) accumulation, immunohistochemistry of the presence and distribution of cartilage ECM proteins, and real-time RT-PCR analyis of mRNA expression of cartilage markers. Our results showed that COMP over-expression resulted in increased total sGAG content during the early phase of MSC chondrogenesis, and increased immuno-detectable levels of aggrecan and collagen type II in the ECM of COMP-transfected pellet and alginate cultures, indicating more abundant cartilaginous matrix. COMP transfection did not significantly increase the transcript levels of the early chondrogenic marker, Sox9, or aggrecan, suggesting that enhancement of MSC cartilage ECM was effected at post-transcriptional levels. These findings strongly suggest that COMP functions in mesenchymal chondrogenesis by enhancing cartilage ECM organization and assembly. The action of COMP is most likely mediated not via direct changes in cartilage matrix gene expression but via interactions of COMP with other cartilage ECM proteins, such as aggrecan and collagens, that result in enhanced assembly and retention.

  17. CARTILAGE OLIGOMERIC MATRIX PROTEIN ENHANCES MATRIX ASSEMBLY DURING CHONDROGENESIS OF HUMAN MESENCHYMAL STEM CELLS

    Science.gov (United States)

    Haleem-Smith, Hana; Calderon, Raul; Song, Yingjie; Tuan, Rocky S.; Chen, Faye H.

    2011-01-01

    Cartilage oligomeric matrix protein/thrombospondin-5 (COMP/TSP5) is an abundant cartilage extracellular matrix (ECM) protein that interacts with major cartilage ECM components, including aggrecan and collagens. To test our hypothesis that COMP/TSP5 functions in the assembly of the ECM during cartilage morphogenesis, we have employed mesenchymal stem cell (MSC) chondrogenesis in vitro as a model to examine the effects of COMP over-expression on neo-cartilage formation. Human bone marrow-derived MSCs were transfected with either full-length COMP cDNA or control plasmid, followed by chondrogenic induction in three-dimensional pellet or alginate-hydrogel culture. MSC chondrogenesis and ECM production was estimated based on quantitation of sulfated glycosaminoglycan (sGAG) accumulation, immunohistochemistry of the presence and distribution of cartilage ECM proteins, and real-time RT-PCR analyis of mRNA expression of cartilage markers. Our results showed that COMP over-expression resulted in increased total sGAG content during the early phase of MSC chondrogenesis, and increased immuno-detectable levels of aggrecan and collagen type II in the ECM of COMP-transfected pellet and alginate cultures, indicating more abundant cartilaginous matrix. COMP transfection did not significantly increase the transcript levels of the early chondrogenic marker, Sox9, or aggrecan, suggesting that enhancement of MSC cartilage ECM was effected at post-transcriptional levels. These findings strongly suggest that COMP functions in mesenchymal chondrogenesis by enhancing cartilage ECM organization and assembly. The action of COMP is most likely mediated not via direct changes in cartilage matrix gene expression but via interactions of COMP with other cartilage ECM proteins, such as aggrecan and collagens, that result in enhanced assembly and retention. PMID:22095699

  18. Glycated Lysine Residues: A Marker for Non-Enzymatic Protein Glycation in Age-Related Diseases

    Directory of Open Access Journals (Sweden)

    Nadeem A. Ansari

    2011-01-01

    Full Text Available Nonenzymatic glycosylation or glycation of macromolecules, especially proteins leading to their oxidation, play an important role in diseases. Glycation of proteins primarily results in the formation of an early stage and stable Amadori-lysine product which undergo further irreversible chemical reactions to form advanced glycation endproducts (AGEs. This review focuses these products in lysine rich proteins such as collagen and human serum albumin for their role in aging and age-related diseases. Antigenic characteristics of glycated lysine residues in proteins together with the presence of serum autoantibodies to the glycated lysine products and lysine-rich proteins in diabetes and arthritis patients indicates that these modified lysine residues may be a novel biomarker for protein glycation in aging and age-related diseases.

  19. On the Anonymity Risk of Time-Varying User Profiles

    Directory of Open Access Journals (Sweden)

    Silvia Puglisi

    2017-04-01

    Full Text Available Websites and applications use personalisation services to profile their users, collect their patterns and activities and eventually use this data to provide tailored suggestions. User preferences and social interactions are therefore aggregated and analysed. Every time a user publishes a new post or creates a link with another entity, either another user, or some online resource, new information is added to the user profile. Exposing private data does not only reveal information about single users’ preferences, increasing their privacy risk, but can expose more about their network that single actors intended. This mechanism is self-evident in social networks where users receive suggestions based on their friends’ activities. We propose an information-theoretic approach to measure the differential update of the anonymity risk of time-varying user profiles. This expresses how privacy is affected when new content is posted and how much third-party services get to know about the users when a new activity is shared. We use actual Facebook data to show how our model can be applied to a real-world scenario.

  20. Comparing Acceptance and Commitment Group Therapy and 12-Steps Narcotics Anonymous in Addict’s Rehabilitation Process: A Randomized Controlled Trial

    Directory of Open Access Journals (Sweden)

    Manoochehr Azkhosh

    2016-12-01

    Full Text Available Objective: Substance abuse is a socio-psychological disorder. The aim of this study was to compare the effectiveness of acceptance and commitment therapy with 12-steps Narcotics Anonymous on psychological well-being of opiate dependent individuals in addiction treatment centers in Shiraz, Iran.Method: This was a randomized controlled trial. Data were collected at entry into the study and at post-test and follow-up visits. The participants were selected from opiate addicted individuals who referred to addiction treatment centers in Shiraz. Sixty individuals were evaluated according to inclusion/ exclusion criteria and were divided into three equal groups randomly (20 participants per group. One group received acceptance and commitment group therapy (Twelve 90-minute sessions and the other group was provided with the 12-steps Narcotics Anonymous program and the control group received the usual methadone maintenance treatment. During the treatment process, seven participants dropped out. Data were collected using the psychological well-being questionnaire and AAQ questionnaire in the three groups at pre-test, post-test and follow-up visits. Data were analyzed using repeated measure analysis of variance.Results: Repeated measure analysis of variance revealed that the mean difference between the three groups was significant (P<0.05 and that acceptance and commitment therapy group showed improvement relative to the NA and control groups on psychological well-being and psychological flexibility.Conclusion: The results of this study revealed that acceptance and commitment therapy can be helpful in enhancing positive emotions and increasing psychological well-being of addicts who seek treatment.

  1. Relation between Protein Intrinsic Normal Mode Weights and Pre-Existing Conformer Populations.

    Science.gov (United States)

    Ozgur, Beytullah; Ozdemir, E Sila; Gursoy, Attila; Keskin, Ozlem

    2017-04-20

    Intrinsic fluctuations of a protein enable it to sample a large repertoire of conformers including the open and closed forms. These distinct forms of the protein called conformational substates pre-exist together in equilibrium as an ensemble independent from its ligands. The role of ligand might be simply to alter the equilibrium toward the most appropriate form for binding. Normal mode analysis is proved to be useful in identifying the directions of conformational changes between substates. In this study, we demonstrate that the ratios of normalized weights of a few normal modes driving the protein between its substates can give insights about the ratios of kinetic conversion rates of the substates, although a direct relation between the eigenvalues and kinetic conversion rates or populations of each substate could not be observed. The correlation between the normalized mode weight ratios and the kinetic rate ratios is around 83% on a set of 11 non-enzyme proteins and around 59% on a set of 17 enzymes. The results are suggestive that mode motions carry intrinsic relations with thermodynamics and kinetics of the proteins.

  2. Sources of dietary protein in relation to blood pressure in a general Dutch population.

    Directory of Open Access Journals (Sweden)

    Wieke Altorf-van der Kuil

    Full Text Available BACKGROUND: Little is known about the relation of different dietary protein types with blood pressure (BP. We examined whether intake of total, plant, animal, dairy, meat, and grain protein was related to BP in a cross sectional cohort of 20,820 Dutch adults, aged 20-65 y and not using antihypertensive medication. DESIGN: Mean BP levels were calculated in quintiles of energy-adjusted protein with adjustment for age, sex, BMI, education, smoking, and intake of energy, alcohol, and other nutrients including protein from other sources. In addition, mean BP difference after substitution of 3 en% carbohydrates or MUFA with protein was calculated. RESULTS: Total protein and animal protein were not associated with BP (p(trend = 0.62 and 0.71 respectively, both at the expense of carbohydrates and MUFA. Systolic BP was 1.8 mmHg lower (p(trend36 g/d than in the lowest (<27 g/d quintile of plant protein. This inverse association was present both at the expense of carbohydrates and MUFA and more pronounced in individuals with untreated hypertension (-3.6 mmHg than in those with normal (+0.1 mmHg or prehypertensive BP (-0.3 mmHg; p(interaction<0.01. Meat and grain protein were not related to BP. Dairy protein was directly associated with systolic BP (+1.6 mmHg, p(trend<0.01, but not with diastolic BP (p(trend = 0.24. CONCLUSIONS: Total protein and animal protein were not associated with BP in this general untreated Dutch population. Plant protein may be beneficial to BP, especially in people with elevated BP. However, because high intake of plant protein may be a marker of a healthy diet and lifestyle in general, confirmation from randomized controlled trials is warranted.

  3. Protein level affects the relative lysine requirement of growing rainbow trout (Oncorhynchus mykiss) fry.

    Science.gov (United States)

    Bodin, Noelie; Govaerts, Bernadette; Abboudi, Tarik; Detavernier, Christel; De Saeger, Sarah; Larondelle, Yvan; Rollin, Xavier

    2009-07-01

    The effect of two digestible protein levels (310 and 469 g/kg DM) on the relative lysine (Lys; g Lys/kg DM or g Lys/100 g protein) and the absolute Lys (g Lys intake/kg 0.75 per d) requirements was studied in rainbow trout fry using a dose-response trial. At each protein level, sixteen isoenergetic (22-23 MJ digestible energy/kg DM) diets were tested, involving a full range (2-70 g/kg DM) of sixteen Lys levels. Each diet was given to one group of sixty rainbow trout fry (mean initial body weight 0.78 g) reared at 15 degrees C for 31 feeding d. The Lys requirements were estimated based on the relationships between weight, protein, and Lys gains (g/kg 0.75 per d) and Lys concentration (g/kg DM or g/100 g protein) or Lys intake (g/kg 0.75 per d), using the broken-line model (BLM) and the non-linear four-parameter saturation kinetics model (SKM-4). Both the model and the response criterion chosen markedly impacted the relative Lys requirement. The relative Lys requirement for Lys gain of rainbow trout estimated with the BLM (and SKM-4 at 90 % of the maximum response) increased from 16.8 (19.6) g/kg DM at a low protein level to 23.4 (24.5) g/kg DM at a high protein level. However, the dietary protein content affected neither the absolute Lys requirement nor the relative Lys requirement expressed as g Lys/100 g protein nor the Lys requirement for maintenance (21 mg Lys/kg 0.75 per d).

  4. Sperm donor recruitment within an NHS fertility service since the removal of anonymity.

    Science.gov (United States)

    Tomlinson, Mathew J; Pooley, Karen; Pierce, Angela; Hopkisson, James F

    2010-09-01

    The marked decline in the number of sperm donors recruited in the UK has been largely attributed to changes in regulations and in particular those related to the removal of anonymity. After a 5-year period of inactivity, the sperm donor bank in Nottingham was provided with limited resources to try and recruit donors who were willing to be identified on the HFEA register. Marketing was sporadic and at first low cost and the enquiry rate only increased significantly when the centre's website became operational and higher cost advertising was used. Over a 4-year period, a total of 151 enquiries gave rise to 14 useable donors at a cost of approximately £5,500 each. Donor sperm was generally of high quality having been density gradient prepared prior to cryopreservation and provided an overall ongoing pregnancy rate of 21.6% and 45.6% by IUI and IVF, respectively. The overall exercise demonstrated that identifiable donors were coming forward but in lower numbers compared to those observed before 2005. At current treatment prices, centres should be aware that recouping the costs of donor recruitment and processing may be difficult and that the cost of both donor sperm and donor insemination are likely to rise significantly.

  5. Long-Term Influence of Duration and Frequency of Participation in Alcoholics Anonymous on Individuals With Alcohol Use Disorders.

    Science.gov (United States)

    Moos, Rudolf H.; Moos, Bernice S.

    2004-01-01

    This study examined the influence of the duration and frequency of a baseline episode of participation in Alcoholics Anonymous (AA) among 473 individuals with alcohol use disorders on 1-year and 8-year outcomes and the effect of additional participation and delayed participation on outcomes. Compared with individuals who did not participate,…

  6. Effects of vitamin D(3)-binding protein-derived macrophage activating factor (GcMAF) on angiogenesis.

    Science.gov (United States)

    Kanda, Shigeru; Mochizuki, Yasushi; Miyata, Yasuyoshi; Kanetake, Hiroshi; Yamamoto, Nobuto

    2002-09-04

    The vitamin D(3)-binding protein (Gc protein)-derived macrophage activating factor (GcMAF) activates tumoricidal macrophages against a variety of cancers indiscriminately. We investigated whether GcMAF also acts as an antiangiogenic factor on endothelial cells. The effects of GcMAF on angiogenic growth factor-induced cell proliferation, chemotaxis, and tube formation were examined in vitro by using cultured endothelial cells (murine IBE cells, porcine PAE cells, and human umbilical vein endothelial cells [HUVECs]) and in vivo by using a mouse cornea micropocket assay. Blocking monoclonal antibodies to CD36, a receptor for the antiangiogenic factor thrombospondin-1, which is also a possible receptor for GcMAF, were used to investigate the mechanism of GcMAF action. GcMAF inhibited the endothelial cell proliferation, chemotaxis, and tube formation that were all stimulated by fibroblast growth factor-2 (FGF-2), vascular endothelial growth factor-A, or angiopoietin 2. FGF-2-induced neovascularization in murine cornea was also inhibited by GcMAF. Monoclonal antibodies against murine and human CD36 receptor blocked the antiangiogenic action of GcMAF on the angiogenic factor stimulation of endothelial cell chemotaxis. In addition to its ability to activate tumoricidal macrophages, GcMAF has direct antiangiogenic effects on endothelial cells independent of tissue origin. The antiangiogenic effects of GcMAF may be mediated through the CD36 receptor.

  7. Expression of Iron-Related Proteins Differentiate Non-Cancerous and Cancerous Breast Tumors

    Directory of Open Access Journals (Sweden)

    Sara Pizzamiglio

    2017-02-01

    Full Text Available We have previously reported hepcidin and ferritin increases in the plasma of breast cancer patients, but not in patients with benign breast disease. We hypothesized that these differences in systemic iron homeostasis may reflect alterations in different iron-related proteins also play a key biochemical and regulatory role in breast cancer. Thus, here we explored the expression of a bundle of molecules involved in both iron homeostasis and tumorigenesis in tissue samples. Enzyme-linked immunosorbent assay (ELISA or reverse-phase protein array (RPPA, were used to measure the expression of 20 proteins linked to iron processes in 24 non-cancerous, and 56 cancerous, breast tumors. We found that cancerous tissues had higher level of hepcidin than benign lesions (p = 0.012. The univariate analysis of RPPA data highlighted the following seven proteins differentially expressed between non-cancerous and cancerous breast tissue: signal transducer and transcriptional activator 5 (STAT5, signal transducer and activator of transcription 3 (STAT3, bone morphogenetic protein 6 (BMP6, cluster of differentiation 74 (CD74, transferrin receptor (TFRC, inhibin alpha (INHA, and STAT5_pY694. These findings were confirmed for STAT5, STAT3, BMP6, CD74 and INHA when adjusting for age. The multivariate statistical analysis indicated an iron-related 10-protein panel effective in separating non-cancerous from cancerous lesions including STAT5, STAT5_pY694, myeloid differentiation factor 88 (MYD88, CD74, iron exporter ferroportin (FPN, high mobility group box 1 (HMGB1, STAT3_pS727, TFRC, ferritin heavy chain (FTH, and ferritin light chain (FTL. Our results showed an association between some iron-related proteins and the type of tumor tissue, which may provide insight in strategies for using iron chelators to treat breast cancer.

  8. The Problem of Anonymity in Archives: A Literature Review=Arşivlerde Anonimlik Sorunu: Bir Literatür Değerlendirmesi

    Directory of Open Access Journals (Sweden)

    Emily Ross

    2013-12-01

    Full Text Available Archivists processing documents rely on factors such as authorship and provenance to contextualize their materials and render them searchable. But in my past experience as an archives user, I repeatedly came across instances of anonymity: letters and diaries by unnamed authors or to unknown recipients, photographs of unknown subjects. In some cases this anonymity is a loss of information that was once there, but in other case it enabled the material to come into existence in the first place: such as in the case of satirical political poetry, for which a writer might face legal censure. In this literature review, the issue of anonymity in the archives is explored, both in a pragmatic sense (recommended strategies for managing it, and a philosophical sense (according anonymous documents the same status as documents with known authors./Arşivcilikte belgelerin işlenmesi, materyallerin kavramsallaştırılması ve aranabilir hale gelmesinde önemli olan yazarlık ve kaynak (menşe gibi faktörlere dayanmaktadır. Ancak bir arşiv kullanıcısı olarak deneyimlerimizde defalarca isimsiz yazarlar tarafından bilinmeyen kişilere atfedilmiş mektuplar ve günlükler, bilinmeyen konuların fotoğrafları gibi anonim eserlerle karşılaşmaktayız. Bir zamanlar bu anonimlik bazen bir bilgi kaybı olarak görülürken bazen de belgenin yazarının yasal kınamaya maruz kalabildiği hicivli siyasi bir şiir örneğinde olduğu gibi eserin ilk etapta ortaya çıkmasını sağlamaktaydı. Bu literatür taramasında arşivlerde anonimlik sorunu hem pragmatik anlamda (konunun yönetimi için önerilen stratejiler hem de felsefi anlamda (anonim belgelere uygun olarak bilinen yazarlı belgelerle aynı statüde ele alınmaktadır.

  9. [The "secret book" of Dr Friedrich Benjamin Osiander: anonymous births in the Göttingen Accouchierhaus, 1794-1819].

    Science.gov (United States)

    Schlumbohm, Jürgen

    2014-01-01

    to have been limited to the payment of this boarding money. One of the couples married later and took in the twins that had been born clandestinely out of wedlock. One mother kept close contact with her son through intermediaries. All of the women who gave birth in this clandestine fashion received practical as well as financial support, often from the child's father or from a relative. Few of them came by themselves. In those days, only women who used the maternity hospital free of charge would have been as isolated in the difficult perinatal period as are women today who choose to deliver their babies anonymously.

  10. Isthmin is a novel secreted protein expressed as part of the Fgf-8 synexpression group in the Xenopus midbrain-hindbrain organizer.

    Science.gov (United States)

    Pera, Edgar M; Kim, James I; Martinez, Sarah L; Brechner, Mariel; Li, Su Yu; Wessely, Oliver; De Robertis, E M

    2002-08-01

    Patterning of the central nervous system is regulated by a signaling center located at the midbrain-hindbrain boundary (MHB), or isthmus organizer. Fibroblast growth factors secreted from the MHB are required and sufficient to direct the ordered growth and regionalization of the midbrain and anterior hindbrain. In an unbiased secretion cloning screen of Xenopus gastrula embryos we identified a novel gene, which we designated as Isthmin (xIsm) due to its prominent expression at the MHB. xIsm encodes a secreted protein of 449 amino acids containing one copy of the thrombospondin type 1 repeat (TSR). We also found orthologous Isthmin genes in human (hIsm) and mouse (mIsm), as well as a gene encoding an Isthmin-like human unknown protein (hIsm-l). The conservation of a unique carboxy-terminal region between hIsm and hIsm-l suggests that Isthmin is the founding member of a new family of secreted proteins. xIsm was strongly expressed maternally in the Xenopus egg and showed zygotic expression in the ventral blastopore lip, notochord, and MHB. Additional expression domains were detected in neural crest, ear vesicle, and developing blood islands. Interestingly, xIsm was co-expressed with Fibroblast growth factor-8 (xFgf-8) at multiple sites including the MHB, indicating that these two genes are part of a synexpression group which also includes sprouty and sef homologs.

  11. Protein 4.1, a component of the erythrocyte membrane skeleton and its related homologue proteins forming the protein 4.1/FERM superfamily.

    Directory of Open Access Journals (Sweden)

    Aleksander F Sikorski

    2007-01-01

    Full Text Available The review is focused on the domain structure and function of protein 4.1, one of the proteins belonging to the membrane skeleton. The protein 4.1 of the red blood cells (4.1R is a multifunctional protein that localizes to the membrane skeleton and stabilizes erythrocyte shape and membrane mechanical properties, such as deformability and stability, via lateral interactions with spectrin, actin, glycophorin C and protein p55. Protein 4.1 binding is modulated through the action of kinases and/or calmodulin-Ca2+. Non-erythroid cells express the 4.1R homologues: 4.1G (general type, 4.1B (brain type, and 4.1N (neuron type, and the whole group belongs to the protein 4.1 superfamily, which is characterized by the presence of a highly conserved FERM domain at the N-terminus of the molecule. Proteins 4.1R, 4.1G, 4.1N and 4.1B are encoded by different genes. Most of the 4.1 superfamily proteins also contain an actin-binding domain. To date, more than 40 members have been identified. They can be divided into five groups: protein 4.1 molecules, ERM proteins, talin-related molecules, protein tyrosine phosphatase (PTPH proteins and NBL4 proteins. We have focused our attention on the main, well known representatives of 4.1 superfamily and tried to choose the proteins which are close to 4.1R or which have distinct functions. 4.1 family proteins are not just linkers between the plasma membrane and membrane skeleton; they also play an important role in various processes. Some, such as focal adhesion kinase (FAK, non-receptor tyrosine kinase that localizes to focal adhesions in adherent cells, play the role in cell adhesion. The other members control or take part in tumor suppression, regulation of cell cycle progression, inhibition of cell proliferation, downstream signaling of the glutamate receptors, and establishment of cell polarity; some are also involved in cell proliferation, cell motility, and/or cell-to-cell communication.

  12. Cell protein cross-linking by erbstatin and related compounds | Center for Cancer Research

    Science.gov (United States)

    The scheme depicts a possible mechanism of cross-linking by erbstatin and related analogues. A mechanism of action is proposed which involves initial oxidation to reactive quinone intermediates that subsequently cross-link protein nucleophiles via multiple 1,4-Michael-type additions. Similar alkylation of protein by protein-tyrosine kinase inhibitors, such as herbimycin A, has

  13. Entre o controle e o ativismo hacker: a ação política dos Anonymous Brasil

    Directory of Open Access Journals (Sweden)

    Murilo Bansi Machado

    Full Text Available Resumo Este trabalho trata da ação política dos Anonymous, principal expressão do ativismo hacker atual, argumentando que o hacktivismo se configura como uma forma de resistência política nas sociedades de controle. Para isso, centra-se no estudo da faceta brasileira e hacktivista do coletivo. A fim de ressaltar seu caráter político, recorre às principais expressões dohacking na literatura. Descreve motivações, métodos e a ética de sua ação política, tendo como base uma análise comparativa de duas operações deflagradas por Anonymous brasileiros em 2012: #OpWeeksPayment e #OpGlobo. Por fim, identifica quatro de suas principais formas de engajamento político: promoção do anonimato; “evangelização”; formação de redes distribuídas; e o fato de o coletivo exibir e possibilitar várias formas de ações políticas.

  14. A Policy Based Approach for the Management of Web Browser Resources to Prevent Anonymity Attacks in Tor

    Science.gov (United States)

    Navarro-Arribas, Guillermo; Garcia-Alfaro, Joaquin

    Web browsers are becoming the universal interface to reach applications and services related with these systems. Different browsing contexts may be required in order to reach them, e.g., use of VPN tunnels, corporate proxies, anonymisers, etc. By browsing context we mean how the user browsers the Web, including mainly the concrete configuration of its browser. When the context of the browser changes, its security requirements also change. In this work, we present the use of authorisation policies to automatise the process of controlling the resources of a Web browser when its context changes. The objective of our proposal is oriented towards easing the adaptation to the security requirements of the new context and enforce them in the browser without the need for user intervention. We present a concrete application of our work as a plug-in for the adaption of security requirements in Mozilla/Firefox browser when a context of anonymous navigation through the Tor network is enabled.

  15. Fictional Marriage Proposal of Anonymous Astrakhan Khan

    Directory of Open Access Journals (Sweden)

    Roman Hautala

    2017-03-01

    Full Text Available The following text is reproduced from a handwritten copy of the letter made by the Italian humanist Gian Vincenzo Pinelli (1535–1601 and contained in one codex of Ambrosiana Library in Milan (R 104 sup., fol. 194r [see the description of the codex in: 3, no. 341. p. 125]. This codex (588 folios contains Italian and Latin texts of the 16th century of extremely diverse content, which does not allow to determe neither the name of the author of the reproduced letter, nor the date of its writing. Nevertheless, a reference to the name of “Luther” in the letter suggests that it must have been written in the 16th century and an indication of the main purpose of the letter – matchmaking to anonymous queen – makes it possible to put forward quite a bold (but, for now, unproven hypothesis that this letter might be addressed to approximates of the Polish Queen Bona Sforza and the widow of King Sigismund I the Old starting with the April 1, 1548. Following this hypothesis, the alleged author of the letter could be the ruler of Astrakhan Yamgurchi or the Crimean khan Sahib Giray. However, this assumption remains only a hypothesis, and the author of this article hopes that future researchers will be able to identify both the author of the letter and its recipients. Be that as it may, this letter is of undoubtedly fictitious character since it does not indicate the name of its author and the date of writing and obviously differs from official form of the Tatar rulers’ letters. Undoubtedly, this letter refers to the literary genre of fictional letters of the rulers, which became extremely popular in Europe since the second half of the 15th century. As an illustration of this genre, the author of this article presents a “letter” of the Turkish sultan to the Tatars and their “response” from the fictional collection of “Letters of the Great Turk” [1, fol. 18r] of Laudivius Hierosolymitanus, which was a relatively widespread in Europe in the

  16. A method for investigating protein-protein interactions related to Salmonella typhimurium pathogenesis

    Energy Technology Data Exchange (ETDEWEB)

    Chowdhury, Saiful M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Shi, Liang [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Yoon, Hyunjin [Dartmouth College, Hanover, NH (United States); Ansong, Charles [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Rommereim, Leah M. [Dartmouth College, Hanover, NH (United States); Norbeck, Angela D. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Auberry, Kenneth J. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Moore, R. J. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Adkins, Joshua N. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Heffron, Fred [Oregon Health and Science Univ., Portland, OR (United States); Smith, Richard D. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2009-02-10

    We successfully modified an existing method to investigate protein-protein interactions in the pathogenic bacterium Salmonella typhimurium (STM). This method includes i) addition of a histidine-biotin-histidine tag to the bait proteins via recombinant DNA techniques; ii) in vivo cross-linking with formaldehyde; iii) tandem affinity purification of bait proteins under fully denaturing conditions; and iv) identification of the proteins cross-linked to the bait proteins by liquid-chromatography in conjunction with tandem mass-spectrometry. In vivo cross-linking stabilized protein interactions permitted the subsequent two-step purification step conducted under denaturing conditions. The two-step purification greatly reduced nonspecific binding of non-cross-linked proteins to bait proteins. Two different negative controls were employed to reduce false-positive identification. In an initial demonstration of this approach, we tagged three selected STM proteins- HimD, PduB and PhoP- with known binding partners that ranged from stable (e.g., HimD) to transient (i.e., PhoP). Distinct sets of interacting proteins were identified with each bait protein, including the known binding partners such as HimA for HimD, as well as anticipated and unexpected binding partners. Our results suggest that novel protein-protein interactions may be critical to pathogenesis by Salmonella typhimurium. .

  17. Oxysterol-Binding Protein-Related Protein 1L Regulates Cholesterol Egress from the Endo-Lysosomal System

    Directory of Open Access Journals (Sweden)

    Kexin Zhao

    2017-05-01

    Full Text Available Lipoprotein cholesterol is delivered to the limiting membrane of late endosomes/lysosomes (LELs by Niemann-Pick C1 (NPC1. However, the mechanism of cholesterol transport from LELs to the endoplasmic reticulum (ER is poorly characterized. We report that oxysterol-binding protein-related protein 1L (ORP1L is necessary for this stage of cholesterol export. CRISPR-mediated knockout of ORP1L in HeLa and HEK293 cells reduced esterification of cholesterol to the level in NPC1 knockout cells, and it increased the expression of sterol-regulated genes and de novo cholesterol synthesis, indicative of a block in cholesterol transport to the ER. In the absence of this transport pathway, cholesterol-enriched LELs accumulated in the Golgi/perinuclear region. Cholesterol delivery to the ER required the sterol-, phosphatidylinositol 4-phosphate-, and vesicle-associated membrane protein-associated protein (VAP-binding activities of ORP1L, as well as NPC1 expression. These results suggest that ORP1L-dependent membrane contacts between LELs and the ER coordinate cholesterol transfer with the retrograde movement of endo-lysosomal vesicles.

  18. A Clustering K-Anonymity Privacy-Preserving Method for Wearable IoT Devices

    Directory of Open Access Journals (Sweden)

    Fang Liu

    2018-01-01

    Full Text Available Wearable technology is one of the greatest applications of the Internet of Things. The popularity of wearable devices has led to a massive scale of personal (user-specific data. Generally, data holders (manufacturers of wearable devices are willing to share these data with others to get benefits. However, significant privacy concerns would arise when sharing the data with the third party in an improper manner. In this paper, we first propose a specific threat model about the data sharing process of wearable devices’ data. Then we propose a K-anonymity method based on clustering to preserve privacy of wearable IoT devices’ data and guarantee the usability of the collected data. Experiment results demonstrate the effectiveness of the proposed method.

  19. Maintaining confidentiality in prospective studies: anonymous repeated measurements via email (ARME) procedure.

    Science.gov (United States)

    Carli, Vladimir; Hadlaczky, Gergö; Wasserman, Camilla; Stingelin-Giles, Nicola; Reiter-Theil, Stella; Wasserman, Danuta

    2012-02-01

    Respecting and protecting the confidentiality of data and the privacy of individuals regarding the information that they have given as participants in a research project is a cornerstone of complying with accepted research standards. However, in longitudinal studies, establishing and maintaining privacy is often challenging because of the necessity of repeated contact with participants. A novel internet-based solution is introduced here, which maintains privacy while at the same time ensures linkage of data to individual participants in a repeated measures design. With the use of the anonymous repeated measurements via email (ARME) procedure, two separate one-way communication systems are established through ad hoc email accounts and a secure study website. Strengths and limitations of the approach are discussed.

  20. Sources of dietary protein in relation to blood pressure in a general Dutch population

    NARCIS (Netherlands)

    Altorf-van der Kuil, W.; Engberink, M.F.; Vedder, M.M.; Boer, J.M.A.; Verschuren, W.M.M.; Geleijnse, J.M.

    2012-01-01

    Background - Little is known about the relation of different dietary protein types with blood pressure (BP). We examined whether intake of total, plant, animal, dairy, meat, and grain protein was related to BP in a cross sectional cohort of 20,820 Dutch adults, aged 20–65 y and not using

  1. Simple Algorithms for Distributed Leader Election in Anonymous Synchronous Rings and Complete Networks Inspired by Neural Development in Fruit Flies.

    Science.gov (United States)

    Xu, Lei; Jeavons, Peter

    2015-11-01

    Leader election in anonymous rings and complete networks is a very practical problem in distributed computing. Previous algorithms for this problem are generally designed for a classical message passing model where complex messages are exchanged. However, the need to send and receive complex messages makes such algorithms less practical for some real applications. We present some simple synchronous algorithms for distributed leader election in anonymous rings and complete networks that are inspired by the development of the neural system of the fruit fly. Our leader election algorithms all assume that only one-bit messages are broadcast by nodes in the network and processors are only able to distinguish between silence and the arrival of one or more messages. These restrictions allow implementations to use a simpler message-passing architecture. Even with these harsh restrictions our algorithms are shown to achieve good time and message complexity both analytically and experimentally.

  2. Clinical spectrum and diagnostic value of antibodies against the potassium channel-related protein complex☆

    Science.gov (United States)

    Montojo, M.T.; Petit-Pedrol, M.; Graus, F.; Dalmau, J.

    2016-01-01

    Introduction Antibodies against a protein complex that includes voltage-gated potassium channels (VGKC) have been reported in patients with limbic encephalitis, peripheral nerve hyperexcitability, Morvan's syndrome, and a large variety of neurological syndromes. Review summary In this article, a review is presented of the syndromes associated with antibodies against VGKC-related proteins and the main antigens of this protein complex, the proteins LGI1 (leucine rich glioma inactivated protein 1) and Caspr2 (contactin-associated protein-like 2). The conceptual problems and clinical implications of the description of antibodies against VGKC-related proteins other than LGI1 and Caspr2 are also discussed. Although initial studies indicated the occurrence of antibodies against VGKC, recent investigations have shown that the main antigens are a neuronal secreted protein known as LGI1 which modulates synaptic excitability, and a protein called Caspr2 located on the cell surface and processes of neurons of different brain regions, and at the juxtaparanodal region of myelinated axons. While antibodies against LGI1 preferentially associate with classical limbic encephalitis, antibodies against Caspr2 associate with a wider spectrum of symptoms, including Morvan's syndrome, peripheral nerve hyperexcitability or neuromyotonia, and limbic or more extensive encephalitis. In addition there are reports of patients with antibodies against VGKC-related proteins that are different from LGI1 or Caspr2. In these cases, the identity and location of the antigens are unknown, the syndrome association is not specific, and the response to treatment uncertain. Conclusions The discovery of antigens such as LGI1 and Caspr2 has resulted in a clinical and molecular definition of the broad group of diseases previously attributed to antibodies against VGKC. Considering the literature that describes the presence of antibodies against VGKC other than LGI1 and Caspr2 proteins, we propose a practical

  3. Proteomic analysis identifies insulin-like growth factor-binding protein-related protein-1 as a podocyte product.

    Science.gov (United States)

    Matsumoto, Takayuki; Hess, Sonja; Kajiyama, Hiroshi; Sakairi, Toru; Saleem, Moin A; Mathieson, Peter W; Nojima, Yoshihisa; Kopp, Jeffrey B

    2010-10-01

    The podocyte secretory proteome may influence the phenotype of adjacent podocytes, endothelial cells, parietal epithelial cells, and tubular epithelial cells but has not been systematically characterized. We have initiated studies to characterize this proteome, with the goal of further understanding the podocyte cell biology. We cultured differentiated conditionally immortalized human podocytes and subjected the proteins in conditioned medium to mass spectrometry. At a false discovery rate of factor-binding protein-related protein-1 (IGFBP-rP1), was expressed in mRNA and protein of cultured podocytes. In addition, transforming growth factor-β1 stimulation increased IGFBP-rP1 in conditioned medium. We analyzed IGFBP-rP1 glomerular expression in a mouse model of human immunodeficiency virus-associated nephropathy. IGFBP-rP1 was absent from podocytes of normal mice and was expressed in podocytes and pseudocrescents of transgenic mice, where it was coexpressed with desmin, a podocyte injury marker. We conclude that IGFBP-rP1 may be a product of injured podocytes. Further analysis of the podocyte secretory proteome may identify biomarkers of podocyte injury.

  4. From anonymity to "open doors": IRB responses to tensions with researchers.

    Science.gov (United States)

    Klitzman, Robert

    2012-07-03

    Tensions between IRBs and researchers in the US and elsewhere have increased, and may affect whether, how, and to what degree researchers comply with ethical guidelines. Yet whether, how, when, and why IRBs respond to these conflicts have received little systematic attention. I contacted 60 US IRBs (every fourth one in the list of the top 240 institutions by NIH funding), and interviewed leaders from 34 (response rate = 55%) and an additional 12 members and administrators. IRBs often try to respond to tensions with researchers and improve relationships in several ways, but range widely in how, when, and to what degree (e.g., in formal and informal structure, content, and tone of interactions). IRBs varied from open and accessible to more distant and anonymous, and in the amount and type of "PR work" and outreach they do. Many boards seek to improve the quantity, quality, and helpfulness of communication with PIs, but differ in how. IRBs range in meetings from open to closed, and may have clinics and newsletters. Memos can vary in helpfulness and tone (e.g., using "charm"). IRBs range considerably, too, in the degrees to which they seek to educate PIs, showing them the underlying ethical principles. But these efforts take time and resources, and IRBs thus vary in degrees of responses to PI complaints. This study, the first to explore the mechanisms through which IRBs respond to tensions and interactions with PIs, suggests that these committees seek to respond to conflicts with PIs in varying ways - both formal and informal, involving both the form and content of communications. This study has important implications for future practice, research, and policy, suggesting needs for increased attention to not only what IRBs communicate to PIs, but how (i.e., the tone and the nature of interactions). IRBs can potentially improve relationships with PIs in several ways: using more "open doors" rather than anonymity, engaging in outreach (e.g., through clinics), enhancing

  5. Amyloid-related biomarkers and axonal damage proteins in parkinsonian syndromes

    DEFF Research Database (Denmark)

    Bech, Sara; Hjermind, Lena E; Salvesen, Lisette

    2012-01-01

    Clinical differentiation between parkinsonian syndromes (PS) remains a challenge despite well-established clinical diagnostic criteria. Specific diagnostic biomarkers have yet to be identified, though in recent years, studies have been published on the aid of certain brain related proteins (BRP) ...

  6. Major vault protein/lung resistance-related protein (MVP/LRP) expression in nervous system tumors.

    Science.gov (United States)

    Sasaki, Tsutomu; Hankins, Gerald R; Helm, Gregory A

    2002-01-01

    Lung resistance-related protein (LRP) was identified as the major vault protein (MVP), the main component of multimeric vault particles. It functions as a transport-associated protein that can be associated with multidrug resistance. In previous studies, expression of MVP/LRP has been documented in tumors of various types. In general, good correlations have been reported for expression of MVP/LRP and decreased sensitivity to chemotherapy and poor prognosis. MVP/LRP expression has been documented in glioblastomas, but its expression in nervous system tumors in general has not been well characterized. Immunohistochemistry using anti-human MVP/LRP antibody (LRP-56) was performed on formalin-fixed, paraffin-embedded archival tissue from 69 primary central nervous system tumors. Expression of MVP/LRP was observed in 81.2% (56/69) of primary nervous system tumors, including astrocytomas (11/13), oligodendrogliomas (1/2), oligoastrocytomas (5/5), ependymoma (1/1), meningiomas (35/45), schwannomas (2/2), and neurofibroma (1/1). Various degrees and distributions of immunoreactivity to MVP/ LRP were observed. Neither the presence nor the degree of immunoreactivity to MVP/LRP showed any correlation with either tumor grade or the presence of brain invasion.

  7. Distinct spatiotemporal expression of ISM1 during mouse and chick development

    OpenAIRE

    Os?rio, Liliana; Wu, Xuewei; Zhou, Zhongjun

    2014-01-01

    Isthmin 1 (ISM1) constitutes the founder of a new family of secreted proteins characterized by the presence of 2 functional domains: thrombospondin type 1 repeat (TSR1) and adhesion-associated domain in MUC4 and other proteins (AMOP). ISM1 was identified in the frog embryo as a member of the FGF8 synexpression group due to its expression in the brain midbrain-hindbrain boundary (MHB) or isthmus. In zebrafish, ISM1 was described as a WNT- and NODAL-regulated gene. The function of ISM1 remains ...

  8. High Dietary Protein Intake and Protein-Related Acid Load on Bone Health.

    Science.gov (United States)

    Cao, Jay J

    2017-12-01

    Consumption of high-protein diets is increasingly popular due to the benefits of protein on preserving lean mass and controlling appetite and satiety. The paper is to review recent clinical research assessing dietary protein on calcium metabolism and bone health. Epidemiological studies show that long-term, high-protein intake is positively associated with bone mineral density and reduced risk of bone fracture incidence. Short-term interventional studies demonstrate that a high-protein diet does not negatively affect calcium homeostasis. Existing evidence supports that the negative effects of the acid load of protein on urinary calcium excretion are offset by the beneficial skeletal effects of high-protein intake. Future research should focus on the role and the degree of contribution of other dietary and physiological factors, such as intake of fruits and vegetables, in reducing the acid load and further enhancing the anabolic effects of protein on the musculoskeletal system.

  9. Clinical spectrum and diagnostic value of antibodies against the potassium channel related protein complex.

    Science.gov (United States)

    Montojo, M T; Petit-Pedrol, M; Graus, F; Dalmau, J

    2015-06-01

    Antibodies against a protein complex that includes voltage-gated potassium channels (VGKC) have been reported in patients with limbic encephalitis, peripheral nerve hyperexcitability, Morvan's syndrome, and a large variety of neurological syndromes. In this article, a review is presented of the syndromes associated with antibodies against VGKC-related proteins and the main antigens of this protein complex, the proteins LGI1 (leucine rich glioma inactivated protein 1) and Caspr2 (contactin-associated protein-like 2). The conceptual problems and clinical implications of the description of antibodies against VGKC-related proteins other than LGI1 and Caspr2 are also discussed. Although initial studies indicated the occurrence of antibodies against VGKC, recent investigations have shown that the main antigens are a neuronal secreted protein known as LGI1 which modulates synaptic excitability, and a protein called Caspr2 located on the cell surface and processes of neurons of different brain regions, and at the juxtaparanodal region of myelinated axons. While antibodies against LGI1 preferentially associate with classical limbic encephalitis, antibodies against Caspr2 associate with a wider spectrum of symptoms, including Morvan's syndrome, peripheral nerve hyperexcitability or neuromyotonia, and limbic or more extensive encephalitis. In addition there are reports of patients with antibodies against VGKC-related proteins that are different from LGI1 or Caspr2. In these cases, the identity and location of the antigens are unknown, the syndrome association is not specific, and the response to treatment uncertain. The discovery of antigens such as LGI1 and Caspr2 has resulted in a clinical and molecular definition of the broad group of diseases previously attributed to antibodies against VGKC. Considering the literature that describes the presence of antibodies against VGKC other than LGI1 and Caspr2 proteins, we propose a practical algorithm for the diagnosis and treatment

  10. Age-related carbonylation of fibrocartilage structural proteins drives tissue degenerative modification.

    Science.gov (United States)

    Scharf, Brian; Clement, Cristina C; Yodmuang, Supansa; Urbanska, Aleksandra M; Suadicani, Sylvia O; Aphkhazava, David; Thi, Mia M; Perino, Giorgio; Hardin, John A; Cobelli, Neil; Vunjak-Novakovic, Gordana; Santambrogio, Laura

    2013-07-25

    Aging-related oxidative stress has been linked to degenerative modifications in different organs and tissues. Using redox proteomic analysis and illustrative tandem mass spectrometry mapping, we demonstrate oxidative posttranslational modifications in structural proteins of intervertebral discs (IVDs) isolated from aging mice. Increased protein carbonylation was associated with protein fragmentation and aggregation. Complementing these findings, a significant loss of elasticity and increased stiffness was measured in fibrocartilage from aging mice. Studies using circular dichroism and intrinsic tryptophan fluorescence revealed a significant loss of secondary and tertiary structures of purified collagens following oxidation. Collagen unfolding and oxidation promoted both nonenzymatic and enzymatic degradation. Importantly, induction of oxidative modification in healthy fibrocartilage recapitulated the biochemical and biophysical modifications observed in the aging IVD. Together, these results suggest that protein carbonylation, glycation, and lipoxidation could be early events in promoting IVD degenerative changes. Copyright © 2013 Elsevier Ltd. All rights reserved.

  11. The etiology of human age-related cataract. Proteins don't last forever.

    Science.gov (United States)

    Truscott, Roger J W; Friedrich, Michael G

    2016-01-01

    It is probable that the great majority of human cataract results from the spontaneous decomposition of long-lived macromolecules in the human lens. Breakdown/reaction of long-lived proteins is of primary importance and recent proteomic analysis has enabled the identification of the particular crystallins, and their exact sites of amino acid modification. Analysis of proteins from cataractous lenses revealed that there are sites on some structural proteins that show a consistently greater degree of deterioration than age-matched normal lenses. The most abundant posttranslational modification of aged lens proteins is racemization. Deamidation, truncation and crosslinking, each arising from the spontaneous breakdown of susceptible amino acids within proteins, are also present. Fundamental to an understanding of nuclear cataract etiology, it is proposed that once a certain degree of modification at key sites occurs, that protein-protein interactions are disrupted and lens opacification ensues. Since long-lived proteins are now recognized to be present in many other sites of the body, such as the brain, the information gleaned from detailed analyses of degraded proteins from aged lenses will apply more widely to other age-related human diseases. This article is part of a Special Issue entitled Crystallin Biochemistry in Health and Disease. Copyright © 2015 Elsevier B.V. All rights reserved.

  12. The multiligand α2-macroglobulin receptor/low density lipoprotein receptor-related protein

    DEFF Research Database (Denmark)

    Gliemann, Jørgen; Nykjær, Anders; Petersen, Claus Munck

    1994-01-01

    The fusion of separate lines of research has greatly helped in elucidating the function of the giant members of the low density lipoprotein (LDL) receptor (LDLR) supergene family. The cDNA encoding a large protein structurally closely related to LDLR, and hence named LDLR-related protein (LRP......), was cloned by Herz et al. in 1988.'Evidence was provided demonstrating that LRP can function as a receptor for chylomicron remnants@-migrating very low density lipoproteins (P-VLDL) rich in apolipoprotein E (apoE)?' The a2-macroglobulin (a2M) receptor (a2MR) was purified from rat livep and human p l a~e n t...... from the observation that affinity-purified a2MR/LRP contains a 40-kDa5.8 or 39-kDa6.' protein, designated a2MRAP, in addition to the a2MFULRP a- and P-chains. cDNA cloning" disclosed the 323-residue protein as both the human homologue of mouse heparin binding protein 44 (see reference 11) and...

  13. Structure of autophagy-related protein Atg8 from the silkworm Bombyx mori

    International Nuclear Information System (INIS)

    Hu, Chen; Zhang, Xuan; Teng, Yan-Bin; Hu, Hai-Xi; Li, Wei-Fang

    2010-01-01

    The crystal structure of autophagy-related protein Atg8 from the silkworm B. mori has two additional helices at the N-terminus before the expected ubiquitin fold. Autophagy-related protein Atg8 is ubiquitous in all eukaryotes. It is involved in the Atg8–PE ubiquitin-like conjugation system, which is essential for autophagosome formation. The structures of Atg8 from different species are very similar and share a ubiquitin-fold domain at the C-terminus. In the 2.40 Å crystal structure of Atg8 from the silkworm Bombyx mori reported here, the ubiquitin fold at the C-terminus is preceded by two additional helices at the N-terminus

  14. ECM Proteins Glycosylation and Relation to Diabetes

    Science.gov (United States)

    Pernodet, Nadine; Bloomberg, Ayla; Sood, Vandana; Slutsky, Lenny; Ge, Shouren; Clark, Richard; Rafailovich, Miriam

    2004-03-01

    The chemical modification and crosslinking of proteins by sugar glycosylation contribute to the aging of tissue proteins, and acceleration of this reaction during hyperglycemia is implicated in the pathogenesis of diabetic complications, such as disorder of the wound healing. Advanced glycation endproducts (AGEs) formation and protein crosslinking are irreversible processes that alter the structural and functional properties of proteins, lipid components and nucleic acids. And the mechanism, by which it happens, is not clear. Fibrinogen and fibronectin are plasma proteins, which play a major role in human wound healing. Fibrinogen converts to an insoluble fibrin "gel" following a cut, which eventually forms a clot to prevent blood loss, to direct cell adhesion and migration for forming scars. Fibronectin is a critical protein for cell adhesion and migration in wound healing. The effects of glucose on the binding of these plasma proteins from the extra cellular matrix (ECM) were followed at different concentrations by atomic force microscopy and lateral force modulation to measure the mechanical response of the samples. Glucose solutions (1, 2, and 3mg/mL) were incubated with the protein (100 mg/ml) and silicon (Si) substrates spun with sulfonated polystyrene (SPS) 28% for five days. Data showed that not only the organization of the protein on the surface was affected but also its mechanical properties. At 3 mg/mL glucose, Fn fibers were observed to be harder than those of the control, in good agreement with our hypothesis that glycosylation hardens tissues by crosslinking of proteins in the ECM and might cause fibers to break more easily.

  15. Consequences of occupational food-related hand dermatoses with a focus on protein contact dermatitis

    DEFF Research Database (Denmark)

    Vester, Lotte; Thyssen, Jacob P; Menné, Torkil

    2012-01-01

    Background. Protein contact dermatitis is a frequent disorder among hand eczema patients who have occupational food contact. Knowledge about the consequences of having protein contact dermatitis is lacking. Objectives. To investigate the consequences of having occupational skin disease on the hands...... resulting from food handling, with a focus on protein contact dermatitis. Material and methods. One hundred and seventy-eight patients who were identified as having skin disease related to occupational food exposure and who answered a questionnaire concerning the consequences of their skin disease were......%, respectively, of the patients with other occupational food-related hand dermatoses (p = 0.02). Sixty-two per cent and 43%, respectively, had to change job because of skin problems (p = 0.02). Atopic dermatitis was equally common in the two groups. Conclusion. We found that the patients with protein contact...

  16. Peritoneal fluid reduces angiogenesis-related microRNA expression in cell cultures of endometrial and endometriotic tissues from women with endometriosis.

    Directory of Open Access Journals (Sweden)

    Aitana Braza-Boïls

    Full Text Available UNLABELLED: Endometriosis, defined as the presence of endometrium outside the uterus, is one of the most frequent gynecological diseases. It has been suggested that modifications of both endometrial and peritoneal factors could be implicated in this disease. Endometriosis is a multifactorial disease in which angiogenesis and proteolysis are dysregulated. MicroRNAs (miRNAs are small non-coding RNAs that regulate the protein expression and may be the main regulators of angiogenesis. Our hypothesis is that peritoneal fluid from women with endometriosis could modify the expression of several miRNAs that regulate angiogenesis and proteolysis in the endometriosis development. The objective of this study has been to evaluate the influence of endometriotic peritoneal fluid on the expression of six miRNAs related to angiogenesis, as well as several angiogenic and proteolytic factors in endometrial and endometriotic cell cultures from women with endometriosis compared with women without endometriosis. METHODS: Endometrial and endometriotic cells were cultured and treated with endometriotic and control peritoneal fluid pools. We have studied the expression of six miRNAs (miR-16, -17-5p, -20a, -125a, -221, and -222 by RT-PCR and protein and mRNA levels of vascular endothelial growth factor-A, thrombospondin-1, urokinase plasminogen activator and plasminogen activator inhibitor-1 by ELISA and qRT-PCR respectively. RESULTS: Control and endometriotic peritoneal fluid pools induced a significant reduction of all miRNAs levels in endometrial and endometriotic cell cultures. Moreover, both peritoneal fluids induced a significant increase in VEGF-A, uPA and PAI-1 protein levels in all cell cultures without significant increase in mRNA levels. Endometrial cell cultures from patients treated with endometriotic peritoneal fluid showed lower expression of miRNAs and higher expression of VEGF-A protein levels than cultures from controls. In conclusion , this "in vitro

  17. Patient Perspectives on Sharing Anonymized Personal Health Data Using a Digital System for Dynamic Consent and Research Feedback: A Qualitative Study.

    Science.gov (United States)

    Spencer, Karen; Sanders, Caroline; Whitley, Edgar A; Lund, David; Kaye, Jane; Dixon, William Gregory

    2016-04-15

    Electronic health records are widely acknowledged to provide an important opportunity to anonymize patient-level health care data and collate across populations to support research. Nonetheless, in the wake of public and policy concerns about security and inappropriate use of data, conventional approaches toward data governance may no longer be sufficient to respect and protect individual privacy. One proposed solution to improve transparency and public trust is known as Dynamic Consent, which uses information technology to facilitate a more explicit and accessible opportunity to opt out. In this case, patients can tailor preferences about whom they share their data with and can change their preferences reliably at any time. Furthermore, electronic systems provide opportunities for informing patients about data recipients and the results of research to which their data have contributed. To explore patient perspectives on the use of anonymized health care data for research purposes. To evaluate patient perceptions of a Dynamic Consent model and electronic system to enable and implement ongoing communication and collaboration between patients and researchers. A total of 26 qualitative interviews and three focus groups were conducted that included a video presentation explaining the reuse of anonymized electronic patient records for research. Slides and tablet devices were used to introduce the Dynamic Consent system for discussion. A total of 35 patients with chronic rheumatic disease with varying levels of illness and social deprivation were recruited from a rheumatology outpatient clinic; 5 participants were recruited from a patient and public involvement health research network. Patients were supportive of sharing their anonymized electronic patient record for research, but noted a lack of transparency and awareness around the use of data, making it difficult to secure public trust. While there were general concerns about detrimental consequences of data falling

  18. [Structure analysis of disease-related proteins using vibrational spectroscopy].

    Science.gov (United States)

    Hiramatsu, Hirotsugu

    2014-01-01

    Analyses of the structure and properties of identified pathogenic proteins are important for elucidating the molecular basis of diseases and in drug discovery research. Vibrational spectroscopy has advantages over other techniques in terms of sensitivity of detection of structural changes. Spectral analysis, however, is complicated because the spectrum involves a substantial amount of information. This article includes examples of structural analysis of disease-related proteins using vibrational spectroscopy in combination with additional techniques that facilitate data acquisition and analysis. Residue-specific conformation analysis of an amyloid fibril was conducted using IR absorption spectroscopy in combination with (13)C-isotope labeling, linear dichroism measurement, and analysis of amide I band features. We reveal a pH-dependent property of the interacting segment of an amyloidogenic protein, β2-microglobulin, which causes dialysis-related amyloidosis. We also reveal the molecular mechanisms underlying pH-dependent sugar-binding activity of human galectin-1, which is involved in cell adhesion, using spectroscopic techniques including UV resonance Raman spectroscopy. The decreased activity at acidic pH was attributed to a conformational change in the sugar-binding pocket caused by protonation of His52 (pKa 6.3) and the cation-π interaction between Trp68 and the protonated His44 (pKa 5.7). In addition, we show that the peak positions of the Raman bands of the C4=C5 stretching mode at approximately 1600 cm(-1) and the Nπ-C2-Nτ bending mode at approximately 1405 cm(-1) serve as markers of the His side-chain structure. The Raman signal was enhanced 12 fold using a vertical flow apparatus.

  19. Becoming a morther by non-anonymous egg donation: secrecy and the relationship between egg recipient, egg donor and egg donation child

    NARCIS (Netherlands)

    Berkel, D.A.M. van; Candido, A.; Pijffers, W.H.

    The object of the study was to investigate secrecy in non-anonymous egg donation, to explore some characteristics of this kind of egg donation arrangement and the relationship of the recipient with her non-genetic child. Forty-four egg recipients and 62 IVF patients with a child conceived through

  20. The Primary Role of Fibrinogen-Related Proteins in Invertebrates Is Defense, Not Coagulation

    Science.gov (United States)

    Hanington, Patrick C.; Zhang, Si-Ming

    2010-01-01

    In vertebrates, the conversion of fibrinogen into fibrin is an essential process that underlies the establishment of the supporting protein framework required for coagulation. In invertebrates, fibrinogen-domain-containing proteins play a role in the defense response generated against pathogens; however, they do not function in coagulation, suggesting that this role has been recently acquired. Molecules containing fibrinogen motifs have been identified in numerous invertebrate organisms, and most of these molecules known to date have been linked to defense. Moreover, recent genome projects of invertebrate animals have revealed surprisingly high numbers of fibrinogen-like loci in their genomes, suggesting important and perhaps diverse functions of fibrinogen-like proteins in invertebrates. The ancestral role of molecules containing fibrinogen-related domains (FReDs) with immunity is the focus of this review, with emphasis on specific FReDs called fibrinogen-related proteins (FREPs) identified from the schistosome-transmitting mollusc Biomphalaria glabrata. Herein, we outline the range of invertebrate organisms FREPs can be found in, and detail the roles these molecules play in defense and protection against infection. PMID:21063081

  1. Domain fusion analysis by applying relational algebra to protein sequence and domain databases.

    Science.gov (United States)

    Truong, Kevin; Ikura, Mitsuhiko

    2003-05-06

    Domain fusion analysis is a useful method to predict functionally linked proteins that may be involved in direct protein-protein interactions or in the same metabolic or signaling pathway. As separate domain databases like BLOCKS, PROSITE, Pfam, SMART, PRINTS-S, ProDom, TIGRFAMs, and amalgamated domain databases like InterPro continue to grow in size and quality, a computational method to perform domain fusion analysis that leverages on these efforts will become increasingly powerful. This paper proposes a computational method employing relational algebra to find domain fusions in protein sequence databases. The feasibility of this method was illustrated on the SWISS-PROT+TrEMBL sequence database using domain predictions from the Pfam HMM (hidden Markov model) database. We identified 235 and 189 putative functionally linked protein partners in H. sapiens and S. cerevisiae, respectively. From scientific literature, we were able to confirm many of these functional linkages, while the remainder offer testable experimental hypothesis. Results can be viewed at http://calcium.uhnres.utoronto.ca/pi. As the analysis can be computed quickly on any relational database that supports standard SQL (structured query language), it can be dynamically updated along with the sequence and domain databases, thereby improving the quality of predictions over time.

  2. PACSY, a relational database management system for protein structure and chemical shift analysis.

    Science.gov (United States)

    Lee, Woonghee; Yu, Wookyung; Kim, Suhkmann; Chang, Iksoo; Lee, Weontae; Markley, John L

    2012-10-01

    PACSY (Protein structure And Chemical Shift NMR spectroscopY) is a relational database management system that integrates information from the Protein Data Bank, the Biological Magnetic Resonance Data Bank, and the Structural Classification of Proteins database. PACSY provides three-dimensional coordinates and chemical shifts of atoms along with derived information such as torsion angles, solvent accessible surface areas, and hydrophobicity scales. PACSY consists of six relational table types linked to one another for coherence by key identification numbers. Database queries are enabled by advanced search functions supported by an RDBMS server such as MySQL or PostgreSQL. PACSY enables users to search for combinations of information from different database sources in support of their research. Two software packages, PACSY Maker for database creation and PACSY Analyzer for database analysis, are available from http://pacsy.nmrfam.wisc.edu.

  3. PACSY, a relational database management system for protein structure and chemical shift analysis

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Woonghee, E-mail: whlee@nmrfam.wisc.edu [University of Wisconsin-Madison, National Magnetic Resonance Facility at Madison, and Biochemistry Department (United States); Yu, Wookyung [Center for Proteome Biophysics, Pusan National University, Department of Physics (Korea, Republic of); Kim, Suhkmann [Pusan National University, Department of Chemistry and Chemistry Institute for Functional Materials (Korea, Republic of); Chang, Iksoo [Center for Proteome Biophysics, Pusan National University, Department of Physics (Korea, Republic of); Lee, Weontae, E-mail: wlee@spin.yonsei.ac.kr [Yonsei University, Structural Biochemistry and Molecular Biophysics Laboratory, Department of Biochemistry (Korea, Republic of); Markley, John L., E-mail: markley@nmrfam.wisc.edu [University of Wisconsin-Madison, National Magnetic Resonance Facility at Madison, and Biochemistry Department (United States)

    2012-10-15

    PACSY (Protein structure And Chemical Shift NMR spectroscopY) is a relational database management system that integrates information from the Protein Data Bank, the Biological Magnetic Resonance Data Bank, and the Structural Classification of Proteins database. PACSY provides three-dimensional coordinates and chemical shifts of atoms along with derived information such as torsion angles, solvent accessible surface areas, and hydrophobicity scales. PACSY consists of six relational table types linked to one another for coherence by key identification numbers. Database queries are enabled by advanced search functions supported by an RDBMS server such as MySQL or PostgreSQL. PACSY enables users to search for combinations of information from different database sources in support of their research. Two software packages, PACSY Maker for database creation and PACSY Analyzer for database analysis, are available from http://pacsy.nmrfam.wisc.eduhttp://pacsy.nmrfam.wisc.edu.

  4. PACSY, a relational database management system for protein structure and chemical shift analysis

    Science.gov (United States)

    Lee, Woonghee; Yu, Wookyung; Kim, Suhkmann; Chang, Iksoo

    2012-01-01

    PACSY (Protein structure And Chemical Shift NMR spectroscopY) is a relational database management system that integrates information from the Protein Data Bank, the Biological Magnetic Resonance Data Bank, and the Structural Classification of Proteins database. PACSY provides three-dimensional coordinates and chemical shifts of atoms along with derived information such as torsion angles, solvent accessible surface areas, and hydrophobicity scales. PACSY consists of six relational table types linked to one another for coherence by key identification numbers. Database queries are enabled by advanced search functions supported by an RDBMS server such as MySQL or PostgreSQL. PACSY enables users to search for combinations of information from different database sources in support of their research. Two software packages, PACSY Maker for database creation and PACSY Analyzer for database analysis, are available from http://pacsy.nmrfam.wisc.edu. PMID:22903636

  5. PACSY, a relational database management system for protein structure and chemical shift analysis

    International Nuclear Information System (INIS)

    Lee, Woonghee; Yu, Wookyung; Kim, Suhkmann; Chang, Iksoo; Lee, Weontae; Markley, John L.

    2012-01-01

    PACSY (Protein structure And Chemical Shift NMR spectroscopY) is a relational database management system that integrates information from the Protein Data Bank, the Biological Magnetic Resonance Data Bank, and the Structural Classification of Proteins database. PACSY provides three-dimensional coordinates and chemical shifts of atoms along with derived information such as torsion angles, solvent accessible surface areas, and hydrophobicity scales. PACSY consists of six relational table types linked to one another for coherence by key identification numbers. Database queries are enabled by advanced search functions supported by an RDBMS server such as MySQL or PostgreSQL. PACSY enables users to search for combinations of information from different database sources in support of their research. Two software packages, PACSY Maker for database creation and PACSY Analyzer for database analysis, are available from http://pacsy.nmrfam.wisc.eduhttp://pacsy.nmrfam.wisc.edu.

  6. Influence of bone morphogenetic protein-2 on the extracellular matrix, material properties, and gene expression of long-term articular chondrocyte cultures: loss of chondrocyte stability.

    Science.gov (United States)

    Krawczak, David A; Westendorf, Jennifer J; Carlson, Cathy S; Lewis, Jack L

    2009-06-01

    The aim of this study was to determine the effects of bone morphogenetic protein-2 (BMP-2) on articular chondrocyte tissues grown as monolayers in vitro for up to 8 weeks. Articular chondrocytes were isolated from New Zealand White rabbits and plated in monolayer cultures. The cultures were supplemented with 100 ng/mL of BMP-2 for up to 8 weeks and the extracellular matrix (ECM) composition, material properties, and messenger RNA (mRNA) expression were analyzed. mRNA expression of cartilage-specific genes, type II collagen, and aggrecan showed that BMP-2 enhanced chondrocyte stability for up to 3 weeks. After 3 weeks in culture, there was substantially more type I collagen expression and more osteopontin and runt-related transcription factor 2 expression in 5- and 8-week cultures treated with BMP-2 than in controls. Additionally, matrix metalloproteinase-13 and ADAMTS-5 (A disintegrin-like and metalloproteinase with thrombospondin 5) were upregulated in 5- and 8-week cultures treated with BMP-2, coinciding with a loss of ECM density, collagen, and proteoglycan. Eight-week tissue stimulated with BMP-2 was more fragile and tore more easily when removed from the culture dish as compared to controls, suggesting temporal limitations to the effectiveness of BMP-2 in monolayer systems and perhaps other models to enhance the generation of a cartilage-like tissue for tissue engineering purposes.

  7. Identifying seasonal mobility profiles from anonymized and aggregated mobile phone data. Application in food security.

    Science.gov (United States)

    Zufiria, Pedro J; Pastor-Escuredo, David; Úbeda-Medina, Luis; Hernandez-Medina, Miguel A; Barriales-Valbuena, Iker; Morales, Alfredo J; Jacques, Damien C; Nkwambi, Wilfred; Diop, M Bamba; Quinn, John; Hidalgo-Sanchís, Paula; Luengo-Oroz, Miguel

    2018-01-01

    We propose a framework for the systematic analysis of mobile phone data to identify relevant mobility profiles in a population. The proposed framework allows finding distinct human mobility profiles based on the digital trace of mobile phone users characterized by a Matrix of Individual Trajectories (IT-Matrix). This matrix gathers a consistent and regularized description of individual trajectories that enables multi-scale representations along time and space, which can be used to extract aggregated indicators such as a dynamic multi-scale population count. Unsupervised clustering of individual trajectories generates mobility profiles (clusters of similar individual trajectories) which characterize relevant group behaviors preserving optimal aggregation levels for detailed and privacy-secured mobility characterization. The application of the proposed framework is illustrated by analyzing fully anonymized data on human mobility from mobile phones in Senegal at the arrondissement level over a calendar year. The analysis of monthly mobility patterns at the livelihood zone resolution resulted in the discovery and characterization of seasonal mobility profiles related with economic activities, agricultural calendars and rainfalls. The use of these mobility profiles could support the timely identification of mobility changes in vulnerable populations in response to external shocks (such as natural disasters, civil conflicts or sudden increases of food prices) to monitor food security.

  8. Identifying seasonal mobility profiles from anonymized and aggregated mobile phone data. Application in food security.

    Directory of Open Access Journals (Sweden)

    Pedro J Zufiria

    Full Text Available We propose a framework for the systematic analysis of mobile phone data to identify relevant mobility profiles in a population. The proposed framework allows finding distinct human mobility profiles based on the digital trace of mobile phone users characterized by a Matrix of Individual Trajectories (IT-Matrix. This matrix gathers a consistent and regularized description of individual trajectories that enables multi-scale representations along time and space, which can be used to extract aggregated indicators such as a dynamic multi-scale population count. Unsupervised clustering of individual trajectories generates mobility profiles (clusters of similar individual trajectories which characterize relevant group behaviors preserving optimal aggregation levels for detailed and privacy-secured mobility characterization. The application of the proposed framework is illustrated by analyzing fully anonymized data on human mobility from mobile phones in Senegal at the arrondissement level over a calendar year. The analysis of monthly mobility patterns at the livelihood zone resolution resulted in the discovery and characterization of seasonal mobility profiles related with economic activities, agricultural calendars and rainfalls. The use of these mobility profiles could support the timely identification of mobility changes in vulnerable populations in response to external shocks (such as natural disasters, civil conflicts or sudden increases of food prices to monitor food security.

  9. The role of higher protein diets in weight control and obesity-related comorbidities

    DEFF Research Database (Denmark)

    Astrup, Arne; Raben, Anne; Geiker, Nina

    2015-01-01

    The importance of the relative dietary content of protein, carbohydrate and the type of carbohydrate (that is, glycemic index (GI)) for weight control under ad libitum conditions has been controversial owing to the lack of large scale studies with high diet adherence. The Diet, Obesity and Genes...... (DioGenes) European multicentre trial examined the importance of a slight increase in dietary protein content, reduction in carbohydrate and the importance of choosing low (LGI) vs high GI (HGI) carbohydrates for weight control in 932 obese families. Only the adults underwent a diet of 800 kcal per day...... for 8 weeks, and after losing ~11kg they were randomized to one of five energy ad libitum diets for 6 months. The diets differed in protein content and GI. The high-protein (HP) diet groups consumed 5.4% points more energy from protein than the normal protein (NP) groups, and the LGI diet groups...

  10. From anonymity to “open doors”: IRB responses to tensions with researchers

    Directory of Open Access Journals (Sweden)

    Klitzman Robert

    2012-07-01

    Full Text Available Abstract Background Tensions between IRBs and researchers in the US and elsewhere have increased, and may affect whether, how, and to what degree researchers comply with ethical guidelines. Yet whether, how, when, and why IRBs respond to these conflicts have received little systematic attention. Findings I contacted 60 US IRBs (every fourth one in the list of the top 240 institutions by NIH funding, and interviewed leaders from 34 (response rate = 55% and an additional 12 members and administrators. IRBs often try to respond to tensions with researchers and improve relationships in several ways, but range widely in how, when, and to what degree (e.g., in formal and informal structure, content, and tone of interactions. IRBs varied from open and accessible to more distant and anonymous, and in the amount and type of “PR work” and outreach they do. Many boards seek to improve the quantity, quality, and helpfulness of communication with PIs, but differ in how. IRBs range in meetings from open to closed, and may have clinics and newsletters. Memos can vary in helpfulness and tone (e.g., using “charm”. IRBs range considerably, too, in the degrees to which they seek to educate PIs, showing them the underlying ethical principles. But these efforts take time and resources, and IRBs thus vary in degrees of responses to PI complaints. Conclusions This study, the first to explore the mechanisms through which IRBs respond to tensions and interactions with PIs, suggests that these committees seek to respond to conflicts with PIs in varying ways – both formal and informal, involving both the form and content of communications. This study has important implications for future practice, research, and policy, suggesting needs for increased attention to not only what IRBs communicate to PIs, but how (i.e., the tone and the nature of interactions. IRBs can potentially improve relationships with PIs in several ways: using more “open doors” rather

  11. Postmortem Changes in Pork Muscle Protein Phosphorylation in Relation to the RN Genotype

    DEFF Research Database (Denmark)

    Lametsch, René; Larsen, Martin Røssel; Essén-Gustavsson, Birgitta

    2011-01-01

    Postmortem changes in pork muscle protein phosphorylation in relation to the RN(-) genotype were investigated using one-dimensional gel electrophoresis and a phosphor specific staining. The phosphorylation levels of several protein bands were found to be affected by the RN(-) genotype and to change...... of phosphorylation of these key enzymes during the postmortem metabolism. The results illustrate that the protein phosphorylation level of the muscle proteins could be interpreted as a global metabolic fingerprint containing information about the activity status of the enzymes in the postmortem metabolism....... during postmortem development. Glycogen phosphorylase, phosphofructokinase, and pyruvate kinase were found in protein bands affected by the RN(-) genotype, and the phosphorylation profile indicates that part of the increased rate and extended pH decline of the RN(-) genotype could be a consequence...

  12. Anonymity Preserving Routing In Location Privacy Schemes In Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    R Regin

    2015-12-01

    Full Text Available Location privacy measures need to be developed to prevent the opponent from determining the physical locations of source sensors and sinks. An opponent can easily intercept network traffic due to the use of a broadcast medium for routing packets and get detailed information such as packet transmission time and frequency to perform traffic analysis and infer the locations of monitored objects and data sinks. On the other hand, sensors usually have limited processing speed and energy supplies. It is very expensive to apply traditional anonymous communication techniques for hiding the communication between sensor nodes and sinks. The existing source-location privacy protects the location of monitored objects to increase the number of messages sent by the source before the object is located by the attacker. The flooding technique has the source node send each packet through numerous paths to a sink making it difficult for an opponent to trace the source. The locations of sinks can be protected from a local eavesdropper by hashing the ID field in the packet header. But opponent can track sinks by carrying out time correlation and rate monitoring attacks. Besides protection some source nodes are transferring relatively large amounts of data in existing system. As a result, these nodes run out of battery faster due to improper position of nodes and sinks. Thus in the proposed system the sinks should be located as optimally as possible to reduce traffic flow and energy consumption for sensor nodes. Hence Sink placement problem is resolved for minimizing the delay as well as maximizing the lifetime of a WSN. Thus proposed system is efficient in terms of overhead and functionality when compared to existing system.

  13. Differences between Human and Rodent Plasmacytoid Dendritic Cells May Explain the Pathogenic Disparity of Hantavirus Infection

    Science.gov (United States)

    2016-06-01

    temp with blocking buffer (5% non- fat dry milk in PBS, pH 7.4 and 0.5% Tween 20). Membranes were then washed three times in washing buffer (PBS pH...per chip. To maximize high-quality alignments for read alignment, gene identification, and quantification, the raw sequence reads were trimmed to...involve virus-induced hyperinflammatory immune responses. Thrombospondin-1 (THBS1) is a large homotrimeric protein that plays a putative role in

  14. Proteomic analysis of pregnancy-related proteins from pig uterus endometrium during pregnancy

    Directory of Open Access Journals (Sweden)

    Kang Sunghyun

    2011-07-01

    Full Text Available Abstract Many important molecular events associated with implantation and development occur within the female reproductive tract, especially within the uterus endometrium, during pregnancy periods. The endometrium includes the mucosal lining of the uterus, which provides a suitable site for implantation and development of a fertilized egg and fetus. To date, the molecular cascades in the uterus endometrium during pregnancy periods in pigs have not been elucidated fully. In this study, we compared the functional regulated proteins in the endometrium during pregnancy periods with those in non-pregnant conditions and investigated changes in expression patterns during pregnancy (days 40, 70, and 93 using two-dimensional gel electrophoresis (2-DE and western blotting. The functional regulated proteins were identified and discovered from differentially expressed proteins in the uterus endometrium during pregnancy. We discovered 820 protein spots in a proteomic analysis of uterus endometrium tissues with 2-DE gels. We identified 63 of the 98 proteins regulated differentially among non-pregnant and pregnant tissues (matched and unmatched spots. Interestingly, 10 of these 63 proteins are development-, cytoskeleton- and chaperon-related proteins such as transferrin, protein DJ-1, transgelin, galectin-1, septin 2, stathmin 1, cofilin 1, fascin 1, heat shock protein (HSP 90β and HSP 27. The specific expression patterns of these proteins in the endometrium during pregnancy were confirmed by western blotting. Our results suggest that the expressions of these genes involved in endometrium function and endometrium development from early to late gestation are associated with the regulation of endometrium development for maintaining pregnancy.

  15. Equilibrium fluctuation relations for voltage coupling in membrane proteins.

    Science.gov (United States)

    Kim, Ilsoo; Warshel, Arieh

    2015-11-01

    A general theoretical framework is developed to account for the effects of an external potential on the energetics of membrane proteins. The framework is based on the free energy relation between two (forward/backward) probability densities, which was recently generalized to non-equilibrium processes, culminating in the work-fluctuation theorem. Starting from the probability densities of the conformational states along the "voltage coupling" reaction coordinate, we investigate several interconnected free energy relations between these two conformational states, considering voltage activation of ion channels. The free energy difference between the two conformational states at zero (depolarization) membrane potential (i.e., known as the chemical component of free energy change in ion channels) is shown to be equivalent to the free energy difference between the two "equilibrium" (resting and activated) conformational states along the one-dimensional voltage couplin reaction coordinate. Furthermore, the requirement that the application of linear response approximation to the free energy functionals of voltage coupling should satisfy the general free energy relations, yields a novel closed-form expression for the gating charge in terms of other basic properties of ion channels. This connection is familiar in statistical mechanics, known as the equilibrium fluctuation-response relation. The theory is illustrated by considering the coupling of a unit charge to the external voltage in the two sites near the surface of membrane, representing the activated and resting states. This is done using a coarse-graining (CG) model of membrane proteins, which includes the membrane, the electrolytes and the electrodes. The CG model yields Marcus-type voltage dependent free energy parabolas for the response of the electrostatic environment (electrolytes etc.) to the transition from the initial to the final configuratinal states, leading to equilibrium free energy difference and free

  16. Intrinsic fluorescence of protein in turbid media using empirical relation based on Monte Carlo lookup table

    Science.gov (United States)

    Einstein, Gnanatheepam; Udayakumar, Kanniyappan; Aruna, Prakasarao; Ganesan, Singaravelu

    2017-03-01

    Fluorescence of Protein has been widely used in diagnostic oncology for characterizing cellular metabolism. However, the intensity of fluorescence emission is affected due to the absorbers and scatterers in tissue, which may lead to error in estimating exact protein content in tissue. Extraction of intrinsic fluorescence from measured fluorescence has been achieved by different methods. Among them, Monte Carlo based method yields the highest accuracy for extracting intrinsic fluorescence. In this work, we have attempted to generate a lookup table for Monte Carlo simulation of fluorescence emission by protein. Furthermore, we fitted the generated lookup table using an empirical relation. The empirical relation between measured and intrinsic fluorescence is validated using tissue phantom experiments. The proposed relation can be used for estimating intrinsic fluorescence of protein for real-time diagnostic applications and thereby improving the clinical interpretation of fluorescence spectroscopic data.

  17. Glycated Lysine Residues: A Marker for Non-Enzymatic Protein Glycation in Age-Related Diseases

    OpenAIRE

    Ansari, Nadeem A.; Moinuddin,; Ali, Rashid

    2011-01-01

    Nonenzymatic glycosylation or glycation of macromolecules, especially proteins leading to their oxidation, play an important role in diseases. Glycation of proteins primarily results in the formation of an early stage and stable Amadori-lysine product which undergo further irreversible chemical reactions to form advanced glycation endproducts (AGEs). This review focuses these products in lysine rich proteins such as collagen and human serum albumin for their role in aging and age-related dise...

  18. Underreporting of energy, protein and potassium intake in relation to body mass index

    NARCIS (Netherlands)

    Heerstrass, D W; Ocké, M C; Bueno De Mesquita, H Bas; Peeters, P.H.; Seidell, J C

    BACKGROUND: Differential underreporting of dietary intake by subgroups of body mass index (BMI) will confound associations between dietary intake and BMI-related diseases. We estimated the magnitude of BMI-related underreporting for energy, protein, and potassium intake for the Dutch cohorts of the

  19. Distribution of language-related Cntnap2 protein in neural circuits critical for vocal learning.

    Science.gov (United States)

    Condro, Michael C; White, Stephanie A

    2014-01-01

    Variants of the contactin associated protein-like 2 (Cntnap2) gene are risk factors for language-related disorders including autism spectrum disorder, specific language impairment, and stuttering. Songbirds are useful models for study of human speech disorders due to their shared capacity for vocal learning, which relies on similar cortico-basal ganglia circuitry and genetic factors. Here we investigate Cntnap2 protein expression in the brain of the zebra finch, a songbird species in which males, but not females, learn their courtship songs. We hypothesize that Cntnap2 has overlapping functions in vocal learning species, and expect to find protein expression in song-related areas of the zebra finch brain. We further expect that the distribution of this membrane-bound protein may not completely mirror its mRNA distribution due to the distinct subcellular localization of the two molecular species. We find that Cntnap2 protein is enriched in several song control regions relative to surrounding tissues, particularly within the adult male, but not female, robust nucleus of the arcopallium (RA), a cortical song control region analogous to human layer 5 primary motor cortex. The onset of this sexually dimorphic expression coincides with the onset of sensorimotor learning in developing males. Enrichment in male RA appears due to expression in projection neurons within the nucleus, as well as to additional expression in nerve terminals of cortical projections to RA from the lateral magnocellular nucleus of the nidopallium. Cntnap2 protein expression in zebra finch brain supports the hypothesis that this molecule affects neural connectivity critical for vocal learning across taxonomic classes. Copyright © 2013 Wiley Periodicals, Inc.

  20. Patient Perspectives on Sharing Anonymized Personal Health Data Using a Digital System for Dynamic Consent and Research Feedback: A Qualitative Study

    Science.gov (United States)

    Whitley, Edgar A; Lund, David; Kaye, Jane

    2016-01-01

    Background Electronic health records are widely acknowledged to provide an important opportunity to anonymize patient-level health care data and collate across populations to support research. Nonetheless, in the wake of public and policy concerns about security and inappropriate use of data, conventional approaches toward data governance may no longer be sufficient to respect and protect individual privacy. One proposed solution to improve transparency and public trust is known as Dynamic Consent, which uses information technology to facilitate a more explicit and accessible opportunity to opt out. In this case, patients can tailor preferences about whom they share their data with and can change their preferences reliably at any time. Furthermore, electronic systems provide opportunities for informing patients about data recipients and the results of research to which their data have contributed. Objective To explore patient perspectives on the use of anonymized health care data for research purposes. To evaluate patient perceptions of a Dynamic Consent model and electronic system to enable and implement ongoing communication and collaboration between patients and researchers. Methods A total of 26 qualitative interviews and three focus groups were conducted that included a video presentation explaining the reuse of anonymized electronic patient records for research. Slides and tablet devices were used to introduce the Dynamic Consent system for discussion. A total of 35 patients with chronic rheumatic disease with varying levels of illness and social deprivation were recruited from a rheumatology outpatient clinic; 5 participants were recruited from a patient and public involvement health research network. Results Patients were supportive of sharing their anonymized electronic patient record for research, but noted a lack of transparency and awareness around the use of data, making it difficult to secure public trust. While there were general concerns about