Massive chromosomal aberrations are a signature of advanced cancer, although the factors promoting the pervasive incidence of these copy number alterations (CNAs) are poorly understood. Gatekeeper ...mutations, such as p53, contribute to aneuploidy, yet p53 mutant tumors do not always display CNAs. Uterine Corpus Endometrial Carcinoma (UCEC) offers a unique system to begin to evaluate why some cancers acquire high CNAs while others evolve another route to oncogenesis, since about half of p53 mutant UCEC tumors have a relatively flat CNA landscape and half have 20-90% of their genome altered in copy number.
We extracted copy number information from 68 UCEC genomes mutant in p53 by the GISTIC2 algorithm. GO term pathway analysis, via GOrilla, was used to identify suppressed pathways. Genes within these pathways were mapped for focal or wide distribution. Deletion hotspots were evaluated for temporal incidence.
Multiple pathways contributed to the development of pervasive CNAs, including developmental, metabolic, immunological, cell adhesion and cadmium response pathways. Surprisingly, cadmium response pathway genes are predicted as the earliest loss events within these tumors: in particular, the metallothionein genes involved in heavy metal sequestration. Loss of cadmium response genes were associated with copy number changes and poorer prognosis, contrasting with 'copy number flat' tumors which instead exhibited substantive mutation.
Metallothioneins are lost early in the development of high CNA endometrial cancer, providing a potential mechanism and biological rationale for increased incidence of endometrial cancer with cadmium exposure. Developmental and metabolic pathways are altered later in tumor progression.
Celotno besedilo
Dostopno za:
DOBA, IZUM, KILJ, NUK, PILJ, PNG, SAZU, SIK, UILJ, UKNU, UL, UM, UPUK
(1) Background: Increasing tongue and lip strength may help improve various speech and swallowing disorders, but it is unclear if instrumentalists who use these muscle groups for long periods of time ...have greater strength and endurance compared to controls. It is also unclear if instrumentalists can more accurately estimate various exercise intensities. The purpose of this study was to determine differences in lip and tongue strength and endurance between instrumentalists and non-instrumentalists (controls). A secondary purpose was to assess differences in ability to estimate various exercise intensities between the two groups. (2) Methods: Instrumentalists and controls’ maximum strength and endurance were measured using the IOPI Pro medical device. In addition, 40%, 60% and 80% of maximum strength were estimated in a randomized order. (3) Results: No significant differences were found between instrumentalists and controls in strength or endurance or the ability to estimate various intensities. Overall, participants were better at estimating tongue strength at moderate intensities and lip strength at higher intensities. (4) Conclusion: Tongue and lip strength and endurance and the ability to estimate exercise intensities are not impacted by years of instrumentalist training compared to healthy controls.
Identification of specific oncogenic gene changes has enabled the modern generation of targeted cancer therapeutics. In high-grade serous ovarian cancer (OV), the bulk of genetic changes is not ...somatic point mutations, but rather somatic copy-number alterations (SCNAs). The impact of SCNAs on tumour biology remains poorly understood. Here we build haploinsufficiency network analyses to identify which SCNA patterns are most disruptive in OV. Of all KEGG pathways (N=187), autophagy is the most significantly disrupted by coincident gene deletions. Compared with 20 other cancer types, OV is most severely disrupted in autophagy and in compensatory proteostasis pathways. Network analysis prioritizes MAP1LC3B (LC3) and BECN1 as most impactful. Knockdown of LC3 and BECN1 expression confers sensitivity to cells undergoing autophagic stress independent of platinum resistance status. The results support the use of pathway network tools to evaluate how the copy-number landscape of a tumour may guide therapy.
Note on edge irregular reflexive labelings of graphs Bača, Martin; Irfan, Muhammad; Ryan, Joe ...
AKCE International Journal of Graphs and Combinatorics,
August 2019, 8/1/2019, 2019-08-01, Letnik:
16, Številka:
2
Journal Article
Recenzirano
Odprti dostop
For a graph G, an edge labeling fe:E(G)→{1,2,…,ke} and a vertex labeling fv:V(G)→{0,2,4,…,2kv} are called total k-labeling, where k=max{ke,2kv}. The total k-labeling is called an edge irregular ...reflexivek-labeling of the graph G, if for every two different edges xy and x′y′ of G, one has wt(xy)=fv(x)+fe(xy)+fv(y)≠wt(x′y′)=fv(x′)+fe(x′y′)+fv(y′).The minimum k for which the graph G has an edge irregular reflexive k-labeling is called the reflexive edge strength of G.
In this paper we determine the exact value of the reflexive edge strength for cycles, Cartesian product of two cycles and for join graphs of the path and cycle with 2K2.
An important direction of informatics is devoted to the protection of privacy of confidential information while providing answers to aggregated queries that can be used for analysis of data. ...Protecting privacy is especially important when aggregated queries are used to combine personal information stored in several databases that belong to different owners or come from different sources. Malicious attackers may be able to infer confidential information even from aggregated numerical values returned as answers to queries over large collections of data. Formal proofs of security guarantees are important, because they can be used for implementing practical systems protecting privacy and providing answers to aggregated queries. The investigation of formal conditions which guarantee protection of private information against inference attacks originates from a fundamental result obtained by Chin and Ozsoyoglu in 1982 for linear queries. The present paper solves similar problems for two new classes of aggregated nonlinear queries. We obtain complete descriptions of conditions, which guarantee the protection of privacy of confidential information against certain possible inference attacks, if a collection of queries of this type are answered. Rigorous formal security proofs are given which guarantee that the conditions obtained ensure the preservation of privacy of confidential data. In addition, we give necessary and sufficient conditions for the protection of confidential information from special inference attacks aimed at achieving a group compromise.
The Fourth Industrial Revolution (Industry 4.0), with the help of cyber-physical systems (CPS), the Internet of Things (IoT), and Artificial Intelligence (AI), is transforming the way industrial ...setups are designed. Recent literature has provided insight about large firms gaining benefits from Industry 4.0, but many of these benefits do not translate to SMEs. The agent-oriented smart factory (AOSF) framework provides a solution to help bridge the gap between Industry 4.0 frameworks and SME-oriented setups by providing a general and high-level supply chain (SC) framework and an associated agent-oriented storage and retrieval (AOSR)-based warehouse management strategy. This paper presents the extended heuristics of the AOSR algorithm and details how it improves the performance efficiency in an SME-oriented warehouse. A detailed discussion on the thorough validation via scenario-based experimentation and test cases explain how AOSR yielded 60–148% improved performance metrics in certain key areas of a warehouse.
Celotno besedilo
Dostopno za:
CEKLJ, DOBA, IZUM, KILJ, NUK, PILJ, PNG, SAZU, UILJ, UKNU, UL, UM, UPUK
All graphs in this paper are nontrivial and connected simple graphs. For a set W = {s1,s2,...,sk} of verticesof G, the multiset representation of a vertex v of G with respect to W is r(v|W) = ...{d(v,s1),d(v,s2),...,d(v,sk)} whered(v,si) is the distance between of v and si. If the representation r(v|W)̸= r(u|W) for every pair of vertices u,v of a graph G, the W is called the resolving set of G, and the cardinality of a minimum resolving set is called the multiset dimension, denoted by md(G). A set W is a local resolving set of G if r(v|W) ̸= r(u|W) for every pair of adjacent vertices u,v of a graph G. The cardinality of a minimum local resolving set W is called local multiset dimension, denoted by µl(G). In our paper, we discuss the relationship between the multiset dimension and local multiset dimension of graphs and establish bounds of local multiset dimension for some families of graph.
► A new method for calculating the electrical conductivity of natural waters is presented. ► The method can be used to determine the transport number of major ions. ► The method can be used, in ...conjunction with charge balance, as a analytical QAQC method.
A new method is presented for calculating the electrical conductivity of a wide range of natural waters including acid mine waters, geothermal waters, seawater, dilute mountain waters, and river water impacted by municipal wastewater. The method has several advantages over previously published methods. New electrical conductivity measurements for electrolytes commonly found in natural waters provide a basis for improved calculation of ionic molal conductivities. In addition, the method is coupled to a geochemical speciation model that is used to calculate the speciated concentrations required for accurate conductivity calculations. The method can be used to calculate the electrical conductivity of most natural water compositions and is accurate over a large range of effective ionic strengths (0.0004–0.7
m), temperature (0–95
°C), pH (1.0–9.8), and conductivity (30–70,000
μS
cm
−1). For the wide range of natural waters tested in this study, transport numbers were calculated and the ions that contribute significantly to the specific conductance were identified as H
+ . Na
+, Ca
2+, Mg
2+,
NH
4
+
, K
+, Cl
−,
SO
4
2
-
,
HCO
3
-
,
CO
3
2
-
, F
−, Al
3+, Fe
2+,
NO
3
-
and
HSO
4
-
.
Transport numbers can also be used to better predict the concentrations of ions in natural waters. Another important application of the specific conductance method is checking the accuracy of water analyses by coupling charge imbalance and specific conductance imbalance. Either the major cation or anion concentrations for 50 different water samples were artificially adjusted and the constituent most likely in error was easily identified. Considering the importance of accurate chemical analyses, the ability to identify inaccurate determinations is critical.
Vertex irregular reflexive labeling of prisms and wheels Tanna, Dushyant; Ryan, Joe; Semaničová-Feňovčíková, Andrea ...
AKCE International Journal of Graphs and Combinatorics,
01/2020, Letnik:
ahead-of-print, Številka:
ahead-of-print
Journal Article
Recenzirano
Odprti dostop
For a graph G we define k-labeling ρ such that the edges of G are labeled with integers {1,2,…,ke} and the vertices of G are labeled with even integers {0,2,…,2kv}, where k=max{ke,2kv}. The labeling ...ρ is called a vertex irregular reflexivek-labeling if distinct vertices have distinct weights, where the vertex weight is defined as the sum of the label of that vertex and the labels of all edges incident this vertex. The smallest k for which such labeling exists is called the reflexive vertex strength of G.
In this paper, we give exact values of reflexive vertex strength for prisms, wheels, fan graphs and baskets.