Electrochemical splitting of water is an attractive way to produce hydrogen fuel as a clean and renewable energy source. However, a major challenge is to accelerate the sluggish kinetics of the ...anodic half‐cell reaction where oxygen evolution reaction (OER) takes place. Here, a seamlessly conductive 3D architecture is reported with a carbon‐shelled Ni‐Co nanowire network as a highly efficient OER electrocatalyst. Highly porous and granular Ni‐Co nanowires are first grown on a carbon fiber woven fabric utilizing a cost‐effective hydrothermal method and then conductive carbon shell is coated on the Ni‐Co nanowires via glucose carbonization and annealing processes. The conductive carbon layer surrounding the nanowires is introduced to provide a continuous pathway for facile electron transport throughout the whole of the integrated 3D catalyst. This 3D hierarchical structure provides several synergistic effects and beneficial functions including a large number of active sites, easy accessibility of water, fast electron transport, rapid release of oxygen gas, enhanced electrochemical durability, and stronger structural integrity, resulting in a remarkable OER activity that delivers an overpotential of 302 mV with a Tafel slope of 43.6 mV dec−1 at a current density of 10 mA cm−2 in an alkaline medium electrolyte (1 m KOH).
An integrated 3D architecture composed of Ni‐Co based nanowires grown on a carbon fiber fabric with conductive carbon shell is developed as electrocatalysts for water oxidation. The conductive carbon shell surrounding the porous Ni‐Co nanowires is introduced to provide a continuous pathway for facile electron transport throughout the whole of the integrated catalyst, leading to high performance in oxygen evolution.
Cyclin‐dependent kinase 12 (CDK12) has emerged as an effective therapeutic target due to its ability to regulate DNA damage repair in human cancers, but little is known about the role of CDK12 in ...driving tumorigenesis. Here, we demonstrate that CDK12 promotes tumor initiation as a novel regulator of cancer stem cells (CSCs) and induces anti‐HER2 therapy resistance in human breast cancer. High CDK12 expression caused by concurrent amplification of CDK12 and HER2 in breast cancer patients is associated with disease recurrence and poor survival. CDK12 induces self‐renewal of breast CSCs and in vivo tumor‐initiating ability, and also reduces susceptibility to trastuzumab. Furthermore, CDK12 kinase activity inhibition facilitates anticancer efficacy of trastuzumab in HER2+ tumors, and mice bearing trastuzumab‐resistant HER2+ tumor show sensitivity to an inhibitor of CDK12. Mechanistically, the catalytic activity of CDK12 is required for the expression of genes involved in the activation of ErbB‐PI3K‐AKT or WNT‐signaling cascades. These results suggest that CDK12 is a major oncogenic driver and an actionable target for HER2+ breast cancer to replace or augment current anti‐HER2 therapies.
Synopsis
CDK12, a RNA polymerase II kinase, promotes breast cancer stem cell‐like properties mediated by WNT and ErbB‐PI3K signaling. Targeting CDK12 improves trastuzumab therapy in breast cancers characterised by HER2/CDK12 co‐amplification.
CDK12 amplification induces tumor initiation and progression, and mediates trastuzumab resistance.
CDK12 is required for transcriptional upregulation of genes involved in ErbB‐PI3K and WNT pathway activation.
CDK12 inhibition alone or in combination with trastuzumab therapy has anti‐tumor activity against HER2+ breast cancers.
CDK12, a RNA polymerase II kinase, promotes breast cancer stem cell‐like properties mediated by WNT and ErbB‐PI3K signaling. Targeting CDK12 improves trastuzumab therapy in breast cancers characterised by HER2/CDK12 co‐amplification.
A study investigated the fundamental aspects of energy dissipation in friction, focusing on length scale and the use of atomic force microscopy, quartz crystal microblance and tribometers to examine ...nanoscale friction research.
How titanium dioxide cleans itself Park, Jeong Young
Science (American Association for the Advancement of Science),
2018-Aug-24, 2018-08-24, 20180824, Letnik:
361, Številka:
6404
Journal Article
Recenzirano
Adsorption of hydrophobic molecules explains titanium dioxide self-cleaning properties
Titanium dioxide (TiO
2
) is a white pigment that is widely used in paints, medicine, paper, sunscreens, and ...toothpaste. Other applications include photocatalysts and solar cell coatings (
1
). TiO
2
coatings appear to have self-cleaning properties: When exposed to sunlight, TiO
2
reacts with water to generate hydroxyl radicals, which break down organic molecules and microbes adsorbed on the surface. When it rains, water spreads out on the hydrophilic TiO
2
coating and washes away dust and dirt. On page 786 of this issue, Balajka
et al.
(
2
) use atomic-scale probes and spectroscopy to characterize the molecular-scale self-cleaning mechanism of TiO
2
surfaces.
Internet of Things (IoT) technology provides the basic infrastructure for a hyper connected society where all things are connected and exchange information through the Internet. IoT technology is ...fused with 5G and artificial intelligence (AI) technologies for use various fields such as the smart city and smart factory. As the demand for IoT technology increases, security threats against IoT infrastructure, applications, and devices have also increased. A variety of studies have been conducted on the detection of IoT malware to avoid the threats posed by malicious code. While existing models may accurately detect malicious IoT code identified through static analysis, detecting the new and variant IoT malware quickly being generated may become challenging. This paper proposes a dynamic analysis for IoT malware detection (DAIMD) to reduce damage to IoT devices by detecting both well-known IoT malware and new and variant IoT malware evolved intelligently. The DAIMD scheme learns IoT malware using the convolution neural network (CNN) model and analyzes IoT malware dynamically in nested cloud environment. DAIMD performs dynamic analysis on IoT malware in a nested cloud environment to extract behaviors related to memory, network, virtual file system, process, and system call. By converting the extracted and analyzed behavior data into images, the behavior images of IoT malware are classified and trained in the Convolution Neural Network (CNN). DAIMD can minimize the infection damage of IoT devices from malware by visualizing and learning the vast amount of behavior data generated through dynamic analysis.
We aimed to identify whether neutrophil-to-lymphocyte ratio (NLR) and platelet-to-lymphocyte ratio (PLR) are more useful predictors after initial intention to treat than at the time of diagnosis.
We ...collected the medical data of 533 patients. The results of the peripheral blood sampling before the primary treatments were labeled as initial cohort, and those obtained between 24 and 36 months after initial treatment were defined as the 2nd cohort. Delayed metastasis has been defined as distant metastasis 2 years after treatment, and survival outcome was estimated and compared across groups.
Median follow-up duration was 74 months (24-162 months), and 53 patients experienced delayed metastasis. In univariate analysis, metastasis-free survival, patient age at diagnosis, tumor size, axillary lymph node metastasis, HER-2 status, initial NLR and PLR, and 2nd NLR and PLR were found to be significantly associated with delayed metastasis. However, in multivariate analysis, only the 2nd NLR and PLR were found to be significantly associated with delayed metastasis, excluding initial NLR and PLR. Metastasis-free survival was analyzed through the pattern changes of NLR or PLR. The results revealed that patients with continued low NLR and PLR values at pre- and post-treatment (low initial values and 2nd values) showed a significantly better prognosis than those with a change in value or continued high NLR and PLR.
We identified that patients with persistent high NLR and PLR after initial treatment have significant worse prognosis in terms of late metastasis. Therefore, these results suggest that NLR and PLR are more useful in predicting prognosis post-treatment.
A silk nanofiber‐networked bio‐triboelectric generator (Silk Bio‐TEG) is developed using an eco‐friendly and sustainable silk biomaterial with strong hydrogen bonding between peptide blocks. The ...electrospun Silk Bio‐TEG shows highly durable and reliable energy harvesting performances due to its notably high surface‐to‐volume ratio, mechanically super‐strong silk fibers, and fracture tolerant behavior of nanofiber‐networks.
In patients with acute myocardial infarction receiving potent antiplatelet therapy, the bleeding risk remains high during the maintenance phase. We sought data on a uniform unguided de-escalation ...strategy of dual antiplatelet therapy (DAPT) from ticagrelor to clopidogrel after acute myocardial infarction.
In this open-label, assessor-masked, multicentre, non-inferiority, randomised trial (TALOS-AMI), patients at 32 institutes in South Korea with acute myocardial infarction receiving aspirin and ticagrelor without major ischaemic or bleeding events during the first month after index percutaneous coronary intervention (PCI) were randomly assigned in a 1:1 ratio to a de-escalation (clopidogrel plus aspirin) or active control (ticagrelor plus aspirin) group. Unguided de-escalation without a loading dose of clopidogrel was adopted when switching from ticagrelor to clopidogrel. The primary endpoint was a composite of cardiovascular death, myocardial infarction, stroke, or bleeding type 2, 3, or 5 according to Bleeding Academic Research Consortium (BARC) criteria from 1 to 12 months. A non-inferiority test was done to assess the safety and efficacy of de-escalation DAPT compared with standard treatment. The hazard ratio (HR) for de-escalation versus active control group in a stratified Cox proportional hazards model was assessed for non-inferiority by means of an HR margin of 1·34, which equates to an absolute difference of 3·0% in the intention-to-treat population and, if significant, a superiority test was done subsequently. To ensure statistical robustness, additional analyses were also done in the per-protocol population. This trial is registered at ClinicalTrials.gov, NCT02018055.
From Feb 26, 2014, to Dec 31, 2018, from 2901 patients screened, 2697 patients were randomly assigned: 1349 patients to de-escalation and 1348 to active control groups. At 12 months, the primary endpoints occurred in 59 (4·6%) in the de-escalation group and 104 (8·2%) patients in the active control group (pnon-inferiority<0·001; HR 0·55 95% CI 0·40–0·76, psuperiority=0·0001). There was no significant difference in composite of cardiovascular death, myocardial infarction, or stroke between de-escalation (2·1%) and the active control group (3·1%; HR 0·69; 95% CI 0·42–1·14, p=0·15). Composite of BARC 2, 3, or 5 bleeding occurred less frequently in the de-escalation group (3·0% vs 5·6%, HR 0·52; 95% CI 0·35–0·77, p=0·0012).
In stabilised patients with acute myocardial infarction after index PCI, a uniform unguided de-escalation strategy significantly reduced the risk of net clinical events up to 12 months, mainly by reducing the bleeding events.
ChongKunDang Pharm, Medtronic, Abbott, and Boston Scientific.
•Security issues and challenges in social network service are studied.•We discuss different security and privacy threats in social network service.•This paper presents several possible defense ...solutions to secure social network service.•A novel research direction for security of social network service is presented.
Social networks are very popular in today's world. Millions of people use various forms of social networks as they allow individuals to connect with friends and family, and share private information. However, issues related to maintaining the privacy and security of a user's information can occur, especially when the user's uploaded content is multimedia, such as photos, videos, and audios. Uploaded multimedia content carries information that can be transmitted virally and almost instantaneously within a social networking site and beyond. In this paper, we present a comprehensive survey of different security and privacy threats that target every user of social networking sites. In addition, we separately focus on various threats that arise due to the sharing of multimedia content within a social networking site. We also discuss current state-of- the-art defense solutions that can protect social network users from these threats. We then present future direction and discuss some easy-to-apply response techniques to achieve the goal of a trustworthy and secure social network ecosystem.