In recent years, several publications reported that nanoparticles larger than the kidney filtration threshold were found intact in the urine after being injected into laboratory mice. This ...theoretically should not be possible, as it is widely known that the kidneys prevent molecules larger than 6-8 nm from escaping into the urine. This is interesting because it implies that some nanoparticles can overcome the size limit for renal clearance. What kinds of nanoparticles can "bypass" the glomerular filtration barrier and cross into the urine? What physical and chemical characteristics are essential for nanoparticles to have this ability? And what are the biomolecular and cellular mechanisms that are involved? This review attempts to answer those questions and summarize known reports of renal-clearable large nanoparticles.
Heterogeneous mobile authentication is a crucial technique to securely retrieve the resource of e-healthcare cloud servers which are commonly implemented in a public key Infrastructure (PKI). ...Conventionally, a mobile data user can utilize a self-chosen password along with a portable device to request the access privilege of clouds. However, to validate the membership of users, a cloud server usually has to make use of a password table, which not only increases the burden of management, but also raises the possibility of information leakage. In this paper, we propose a secure heterogeneous mobile authentication and key agreement scheme for e-healthcare cloud systems. In our system structure, an e-healthcare cloud server of traditional PKIs does not have to store a password table. A legitimate data user only possesses a security token hardware and keeps an offline updatable password without using any private key. Our scheme is classified into the category of dynamic ID authentication techniques, since a data user is able to preserve his/her anonymity during authentication processes. We formally prove that the proposed mechanism fulfills the essential authenticated key exchange (AKE) security and owns lower computational costs. To further ensure the practical application security, an automatic security validation tool called AVISPA is also adopted to analyze possible attacks and pitfalls of our designed protocol.
Celotno besedilo
Dostopno za:
DOBA, IZUM, KILJ, NUK, PILJ, PNG, SAZU, SIK, UILJ, UKNU, UL, UM, UPUK
This study investigated associations between climate variables (average temperature and cumulative rainfall), and El Niño Southern Oscillation (ENSO) and dengue-like-illness (DLI) incidence in two ...provinces (Western and Guadalcanal Provinces) in Solomon Islands (SI).
Weekly DLI and meteorological data were obtained from the Ministry of Health and Medical Services SI and the Ministry of Environment, Climate Change, Disaster Management and Meteorology from 2015 to 2018, respectively. We used negative binomial generalized estimating equations to assess the effects of climate variables up to a lag of 2 months and ENSO on DLI incidence in SI.
We captured an upsurge in DLI trend between August 2016 and April 2017. We found the effects of average temperature on DLI in Guadalcanal Province at lag of one month (IRR: 2.186, 95% CI: 1.094-4.368). Rainfall had minor but consistent effect in all provinces. La Niña associated with increased DLI risks in Guadalcanal Province (IRR: 4.537, 95% CI: 2.042-10.083), whereas El Niño associated with risk reduction ranging from 72.8% to 76.7% in both provinces.
Owing to the effects of climate variability and ENSO on DLI, defining suitable and sustainable measures to control dengue transmission and enhancing community resilience against climate change in low- and middle-developed countries are important.
Celotno besedilo
Dostopno za:
DOBA, IZUM, KILJ, NUK, PILJ, PNG, SAZU, SIK, UILJ, UKNU, UL, UM, UPUK
The acute stress response mobilizes energy to meet situational demands and re-establish homeostasis. However, the underlying molecular cascades are unclear. Here, we use a brief swim exposure to ...trigger an acute stress response in mice, which transiently increases anxiety, without leading to lasting maladaptive changes. Using multiomic profiling, such as proteomics, phospho-proteomics, bulk mRNA-, single-nuclei mRNA-, small RNA-, and TRAP-sequencing, we characterize the acute stress-induced molecular events in the mouse hippocampus over time. Our results show the complexity and specificity of the response to acute stress, highlighting both the widespread changes in protein phosphorylation and gene transcription, and tightly regulated protein translation. The observed molecular events resolve efficiently within four hours after initiation of stress. We include an interactive app to explore the data, providing a molecular resource that can help us understand how acute stress impacts brain function in response to stress.
IoT-based data outsourcing services in clouds could be regarded as a new trend in recent years, as they could reduce the hardware and software cost for enterprises and obtain higher flexibility. To ...securely transfer an encrypted message in the cloud, a so-called proxy re-encryption scheme is a better alternative. In such schemes, a ciphertext designated for a data aggregation is able to be re-encrypted as one designated for another by a semi-trusted proxy without decryption. In this paper, we introduce a secure proxy re-encryption protocol for IoT-based data outsourcing services in clouds. The proposed scheme is provably secure assuming the hardness of the bilinear inverse Diffie-Hellman problem (BIDHP). In particular, our scheme is bidirectional and supports the functionality of multi-hop, which allows an uploaded ciphertext to be transformed into a different one multiple times. The ciphertext length of our method is independent of the number of involved IoT nodes. Specifically, the re-encryption process only takes one exponentiation computation which is around 54 ms when sharing the data with 100 IoT devices. For each IoT node, the decryption process only requires two exponentiation computations. When compared with a related protocol presented by Kim and Lee, the proposed one also exhibits lower computational costs.
Spinal epidural fibrosis is one of the typical features attributable to failed back surgery syndrome, with excessive scar development in the dura and nerve roots. The microRNA-29 family (miR-29s) has ...been found to act as a fibrogenesis-inhibitory factor that reduces fibrotic matrix overproduction in various tissues. However, the mechanistic basis of miRNA-29a underlying the overabundant fibrotic matrix synthesis in spinal epidural scars post-laminectomy remained elusive. This study revealed that miR-29a attenuated lumbar laminectomy-induced fibrogenic activity, and epidural fibrotic matrix formation was significantly lessened in the transgenic mice (miR-29aTg) as compared with wild-type mice (WT). Moreover, miR-29aTg limits laminectomy-induced damage and has also been demonstrated to detect walking patterns, footprint distribution, and moving activity. Immunohistochemistry staining of epidural tissue showed that miR-29aTg was a remarkably weak signal of IL-6, TGF-β1, and DNA methyltransferase marker, Dnmt3b, compared to the wild-type mice. Taken together, these results have further strengthened the evidence that miR-29a epigenetic regulation reduces fibrotic matrix formation and spinal epidural fibrotic activity in surgery scars to preserve the integrity of the spinal cord core. This study elucidates and highlights the molecular mechanisms that reduce the incidence of spinal epidural fibrosis, eliminating the risk of gait abnormalities and pain associated with laminectomy.
Preeclampsia (PE) remains one of the leading causes of maternal and perinatal morbidity and mortality. However, the exact pathophysiology of PE is still unclear. The recent widely accepted notion ...that successful pregnancy relies on maternal immunological adaptation is of utmost importance. Moreover, salt-inducible kinase 3 (SIK3) is an AMP-activated protein kinase-related kinase, and it has reported a novel regulator of energy and inflammation, and its expression related with some diseases. To explore whether SIK3 expression correlated with PE, we analyzed SIK3 gene expression and its association with PE through GEO datasets. We identified that SIK3 was significantly downregulated in PE across four datasets (
< 0.05), suggesting that SIK3 participated in the pathogenesis of PE. We initially demonstrated the significant downregulation of SIK3 in trophoblast cells of PE. SIK3 downregulation was positively correlated with the increased number of CD204(+) cells in in vivo and in vitro experiments. The increased number of CD204(+) cells could inhibit the migration and invasion of trophoblast cells. We then clarified the potential mechanism of PE with SIK3 downregulation: M2 skewing was triggered by trophoblast cells derived via the CCL24/CCR3 axis, leading to an increase in CD204(+) cells, a decrease in phagocytosis, and the production of IL-10 at the maternal-fetal interface of the placenta with PE. IL-10 further contributed to a reduction in the migration and invasion of trophoblast cells. It also established a feedback loop wherein trophoblast cells increased CCL24 production to maintain M2 dominance in the placental environments of PE.
In the fog computing architecture, a fog is a node closer to clients and responsible for responding to users' requests as well as forwarding messages to clouds. In some medical applications such as ...the remote healthcare, a sensor of patients will first send encrypted data of sensed information to a nearby fog such that the fog acting as a re-encryption proxy could generate a re-encrypted ciphertext designated for requested data users in the cloud. Specifically, a data user can request access to cloud ciphertexts by sending a query to the fog node that will forward this query to the corresponding data owner who preserves the right to grant or deny the permission to access his/her data. When the access request is granted, the fog node will obtain a unique re-encryption key for carrying out the re-encryption process. Although some previous concepts have been proposed to fulfill these application requirements, they either have known security flaws or incur higher computational complexity. In this work, we present an identity-based proxy re-encryption scheme on the basis of the fog computing architecture. Our identity-based mechanism uses public channels for key distribution and avoids the troublesome problem of key escrow. We also formally prove that the proposed protocol is secure in the IND-PrID-CPA notion. Furthermore, we show that our work exhibits better performance in terms of computational complexity.
Fog computing is viewed as an extended technique of cloud computing. In Internet of things–based collaborative fog computing systems, a fog node aggregating lots of data from Internet of things ...devices has to transmit the information to distributed cloud servers that will collaboratively verify it based on some predefined auditing policy. However, compromised fog nodes controlled by an adversary might inject bogus data to cheat or confuse remote servers. It also causes the waste of communication and computation resources. To further control the lifetime of signing capability for fog nodes, an appropriate mechanism is crucial. In this article, the author proposes a time-constrained strong multi-designated verifier signature scheme to meet the above requirement. In particular, a conventional non-delegatable strong multi-designated verifier signature scheme with low computation is first given. Based on its constructions, we show how to transform it into a time-constrained variant. The unforgeability of the proposed schemes is formally proved based on the famous elliptic curve discrete logarithm assumption. The security requirement of strong signer ambiguity for our substantial constructions is also analyzed by utilizing the intractable assumption of decisional Diffie–Hellman. Moreover, some comparisons in terms of the signature size and computational costs for involved entities among related mechanisms are made.
Neuropsychiatric disorders, such as schizophrenia (SZ) and autism spectrum disorder (ASD), are common, multi-factorial and multi-symptomatic disorders. Ample evidence implicates oxidative stress, ...deficient repair of oxidative DNA lesions and DNA damage in the development of these disorders. However, it remains unclear whether insufficient DNA repair and resulting DNA damage are causally connected to their aetiopathology, or if increased levels of DNA damage observed in patient tissues merely accumulate as a consequence of cellular dysfunction. To assess a potential causal role for deficient DNA repair in the development of these disorders, we behaviourally characterized a mouse model in which CaMKIIa-Cre-driven postnatal conditional knockout (KO) of the core base-excision repair (BER) protein XRCC1 leads to accumulation of unrepaired DNA damage in the forebrain. CaMKIIa-Cre expression caused specific deletion of XRCC1 in the dorsal dentate gyrus (DG), CA1 and CA2 and the amygdala and led to increased DNA damage therein. While motor coordination, cognition and social behaviour remained unchanged, XRCC1 KO in the forebrain caused increased anxiety-like behaviour in males, but not females, as assessed by the light-dark box and open field tests. Conversely, in females but not males, XRCC1 KO caused an increase in learned fear-related behaviour in a cued (Pavlovian) fear conditioning test and a contextual fear extinction test. The relative density of the GABA(A) receptor alpha 5 subunit (GABRA5) was reduced in the amygdala and the dorsal CA1 in XRCC1 KO females, whereas male XRCC1 KO animals exhibited a significant reduction of GABRA5 density in the CA3. Finally, assessment of fast-spiking, parvalbumin-positive (PV) GABAergic interneurons revealed a significant increase in the density of PV+ cells in the DG of male XRCC1 KO mice, while females remained unchanged. Our results suggest that accumulation of unrepaired DNA damage in the forebrain alters the GABAergic neurotransmitter system and causes behavioural deficits in relation to innate and learned anxiety in a sex-dependent manner. Moreover, the data uncover a previously unappreciated connection between BER deficiency, unrepaired DNA damage in the hippocampus and a sex-specific anxiety-like phenotype with implications for the aetiology and therapy of neuropsychiatric disorders.
Celotno besedilo
Dostopno za:
DOBA, IZUM, KILJ, NUK, PILJ, PNG, SAZU, SIK, UILJ, UKNU, UL, UM, UPUK