DNA methylation is an epigenetic process that commonly occurs in genes’ promoters and results in the transcriptional silencing of genes. DNA methylation is a frequent event in bladder cancer, ...participating in tumor initiation and progression. Bladder cancer is a major health issue in patients suffering from neurogenic lower urinary tract dysfunction (NLUTD), although the pathogenetic mechanisms of the disease remain unclear. In this population, bladder cancer is characterized by aggressive histopathology, advanced stage during diagnosis, and high mortality rates. To assess the DNA methylation profiles of five genes’ promoters previously known to be associated with bladder cancer in bladder tissue of NLUTD patients, we conducted a prospective study recruiting NLUTD patients from the neuro-urology unit of a public teaching hospital. Cystoscopy combined with biopsy for bladder cancer screening was performed in all patients following written informed consent being obtained. Quantitative methylation-specific PCR was used to determine the methylation status of RASSF1, RARβ, DAPK, hTERT, and APC genes’ promoters in bladder tissue samples. Twenty-four patients suffering from mixed NLUTD etiology for a median duration of 10 (IQR: 12) years were recruited in this study. DNA hypermethylation was detected in at least one gene of the panel in all tissue samples. RAR-β was hypermethylated in 91.7% samples, RASSF and DAPK were hypermethylated in 83.3% samples, APC 37.5% samples, and TERT in none of the tissue samples. In 45.8% of the samples, three genes of the panel were hypermethylated, in 29.2% four genes were hypermethylated, and in 16.7% and in 8.3% of the samples, two and one gene were hypermethylated, respectively. The number of hypermethylated genes of the panel was significantly associated with recurrent UTIs (p = 0.0048). No other significant association was found between DNA hypermethylation or the number of hypermethylated genes and the clinical characteristics of the patients. Histopathological findings were normal in 8.3% of patients, while chronic inflammation was found in 83.3% of patients and squamous cell metaplasia in 16.7% of patients. In this study, we observed high rates of DNA hypermethylation of genes associated with bladder cancer in NLUTD patients, suggesting an epigenetic field effect and possible risk of bladder cancer development. Recurrent UTIs seem to be associated with increased DNA hypermethylation. Further research is needed to evaluate the impact of recurrent UTIs and chronic inflammation in DNA hypermethylation and bladder cancer etiopathogenesis in NLUTD patients.
Despite the significant benefits that the rise of Internet of Medical Things (IoMT) can bring into citizens' quality of life by enabling IoMT-based healthcare monitoring systems, there is an urgent ...need for novel security mechanisms to address the pressing security challenges of IoMT edge networks in an effective and efficient manner before they gain the trust of all involved stakeholders and reach their full potential in the market of next generation IoMT-based healthcare monitoring systems. In this context, blockchain technology has been foreseen by the industry and research community as a disruptive technology that can be integrated into novel security solutions for IoMT edge networks, as it can play a significant role in securing IoMT devices and resisting unauthorized access during data transmission (i.e., tamper-proof transmission of medical data). However, despite the fact that several blockchain-based security mechanisms have already been proposed in the literature for different types of IoT edge networks, there is a lack of blockchain-based security mechanisms for IoMT edge networks, and thus more effort is required to be put on the design and development of security mechanisms relying on blockchain technology for such networks. Towards this direction, the first step is the comprehensive understanding of the following two types of blockchain-based security mechanisms: (a) the very few existing ones specifically designed for IoMT edge networks, and (b) those designed for other types of IoT networks but could be possibly adopted in IoMT edge networks due to similar capabilities and technical characteristics. Therefore, in this paper, we review the state-of-the-art of the above two types of blockchain-based security mechanisms in order to provide a foundation for organizing research efforts towards the design and development of reliable blockchain-based countermeasures, addressing the pressing security challenges of IoMT edge networks in an effective and efficient manner.
While a growing body of literature looks at the associations between food parenting practices, and feeding styles, and child's weight status in developed countries, little is known for less developed ...countries, in general, and the Latin America and the Caribbean (LAC) region, in particular. This study systemically reviews and synthesizes existing evidence on the associations between child caregivers' food parenting practices and feeding styles and 2 to 12-year-old child weight status. Keywords were used to search in PubMed, Web of Science, PsycINFO, and Cumulative Index to Nursing and Allied Health Literature. Among the ten eligible articles, all of them reported significant associations between food parenting practices and feeding styles and child weight status. Existing studies have limitations, mainly related to cross-sectional convenience samples, which limit the generalization of the results. Additionally, small sample, heterogeneous feeding measures and weight related outcomes were other limitations. Future research is needed to understand caregiver-child interactions in the food situation and its link to child weight status in 2 to 12-year-old children in areas of LAC with diverse forms of malnutrition and contextual factors of countries.
A number of studies conducted with ethnically diverse, low-income samples have found that parents with indulgent feeding styles had children with a higher weight status. Indulgent parents are those ...who are responsive to their child's emotional states but have problems setting appropriate boundaries with their child. Because the processes through which styles impact child weight are poorly understood, the aim of this study was to observe differences in the emotional climate created by parents (including affect, tone of voice, and gestures) and behavioral feeding practices among those reporting different feeding styles on the Caregiver's Feeding Styles Questionnaire. A secondary aim was to examine differences on child weight status across the feeding styles.
Participants were 177 Head Start families from Houston, Texas (45% African-American; 55% Hispanic). Using an observational approach, the relationship between the observed emotional climate of the meal, behavioral feeding practices, and self-reported parent feeding styles were examined. Mean age of the children was 4.4 years (SD = 0.7) equally distributed across gender. Families were observed on 3 separate dinner occasions. Heights and weight were measured on the parents and children.
Parents with self-reported indulgent feeding styles made fewer demands on their children to eat during dinner and showed lower levels of negative affect and intrusiveness. Surprisingly, these parents also showed higher levels of emotional detachment with their children during dinner. Hispanic boys with indulgent parents had significantly higher BMI z scores compared to Hispanic boys in the other three feeding style groups. No other differences were found on child weight status.
Results suggest that the emotional climate created by indulgent parents during dinner and their lack of demands on their children to eat may play an important role in how young children become overweight. Numerous observed emotional climate and behavioral differences were found between the other self-reported feeding styles as well. Results suggest that parents' self-reported feeding styles may be a proxy for the emotional climate of the dinner meal, which may in turn influence the child's eating behaviors and weight status.
Phosphatase and tensin homologue deleted on chromosome 10 (PTEN) is a crucial tumor suppressor protein with frequent mutations and alterations. Although protein therapeutics are already integral to ...numerous medical fields, their potential remains nascent. This study aimed to investigate the impact of stable, unphosphorylated recombinant human full-length PTEN and its truncated variants, regarding their tumor suppression activity with multiwalled-carbon nanotubes (MW-CNTs) as vehicles for their delivery in breast cancer cells (T-47D, ZR-75-1, and MCF-7). The cloning, overexpression, and purification of PTEN variants were achieved from E. coli, followed by successful binding to CNTs. Cell incubation with protein-functionalized CNTs revealed that the full-length PTEN-CNTs significantly inhibited cancer cell growth and stimulated apoptosis in ZR-75-1 and MCF-7 cells, while truncated PTEN fragments on CNTs had a lesser effect. The N-terminal fragment, despite possessing the active site, did not have the same effect as the full length PTEN, emphasizing the necessity of interaction with the C2 domain in the C-terminal tail. Our findings highlight the efficacy of full-length PTEN in inhibiting cancer growth and inducing apoptosis through the alteration of the expression levels of key apoptotic markers. In addition, the utilization of carbon nanotubes as a potent PTEN protein delivery system provides valuable insights for future applications in in vivo models and clinical studies.
The home environment is a central and modifiable influence on the development of childhood obesity. Evidence supports the central role of parents in shaping problematic child eating behaviors and ...excess weight. Most studies of feeding emphasize parent-driven influences without taking into account the child's role in eating interactions. Few studies have addressed the bi-directional nature of feeding dynamics in studies of young children.
The goals of this study were: 1) to examine if parental feeding styles during preschool (4-5 years) predict child weight status at 7-9 years, and 2) to examine the direction of effects between parental feeding styles and child weight status over time. Participants were part of a larger longitudinal study of Hispanic Head Start families living in the West South Central United States. Data from mother/child dyads were collected at three time points: Time 1 (ages 4-5), Time 2 (ages 5 ½-6 ½), and at Time 3 (ages 7-9). Only data from the Times 1 and 3 were used in the current analyses. A total of 128 mothers and their children had data on all variables needed for the analyses. Assessments included parent-reported feeding styles, feeding practices, acculturation, child eating behaviors, and child height and weight. Hierarchical regression was used to examine the first aim; a cross-lagged panel analysis examined the second aim.
An indulgent parental feeding style at ages 4-5 was associated with increased child BMI z-score at ages 7-9. Indulgent feeding significantly contributed to child BMI z-score beyond demographics, baseline child BMI z-score, parental acculturation, and child eating behaviors. Regarding the direction of effects in parental feeding interactions, the cross-lagged analyses showed that both indulgent feeding style and authoritative feeding style at Time 1 positively predicted child BMI z-scores at Time 3. Child effects were significant as well. Child BMI z-score at Time 1 positively predicted indulgent feeding and negatively predicted authoritarian feeding at Time 3.
Indulgent feeding should be addressed in future family-focused childhood obesity initiatives focused on young children and their parents.
Over the past few years, we have witnessed the emergence of Internet of Things (IoT) and Industrial IoT networks that bring significant benefits to citizens, society, and industry. However, their ...heterogeneous and resource-constrained nature makes them vulnerable to a wide range of threats. Therefore, there is an urgent need for novel security mechanisms such as accurate and efficient anomaly-based intrusion detection systems (AIDSs) to be developed before these networks reach their full potential. Nevertheless, there is a lack of up-to-date, representative, and well-structured IoT/IIoT-specific datasets which are publicly available and constitute benchmark datasets for training and evaluating machine learning models used in AIDSs for IoT/IIoT networks. Contribution to filling this research gap is the main target of our recent research work and thus, we focus on the generation of new labelled IoT/IIoT-specific datasets by utilising the Cooja simulator. To the best of our knowledge, this is the first time that the Cooja simulator is used, in a systematic way, to generate comprehensive IoT/IIoT datasets. In this paper, we present the approach that we followed to generate an initial set of benign and malicious IoT/IIoT datasets. The generated IIoT-specific information was captured from the Contiki plugin "powertrace" and the Cooja tool "Radio messages".
Mobile user authentication acts as the first line of defense, establishing confidence in the claimed identity of a mobile user, which it typically does as a precondition to allowing access to ...resources in a mobile device. NIST states that password schemes and/or biometrics comprise the most conventional user authentication mechanisms for mobile devices. Nevertheless, recent studies point out that nowadays password-based user authentication is imposing several limitations in terms of security and usability; thus, it is no longer considered secure and convenient for the mobile users. These limitations stress the need for the development and implementation of more secure and usable user authentication methods. Alternatively, biometric-based user authentication has gained attention as a promising solution for enhancing mobile security without sacrificing usability. This category encompasses methods that utilize human physical traits (physiological biometrics) or unconscious behaviors (behavioral biometrics). In particular, risk-based continuous user authentication, relying on behavioral biometrics, appears to have the potential to increase the reliability of authentication without sacrificing usability. In this context, we firstly present fundamentals on risk-based continuous user authentication, relying on behavioral biometrics on mobile devices. Additionally, we present an extensive overview of existing quantitative risk estimation approaches (QREA) found in the literature. We do so not only for risk-based user authentication on mobile devices, but also for other security applications such as user authentication in web/cloud services, intrusion detection systems, etc., that could be possibly adopted in risk-based continuous user authentication solutions for smartphones. The target of this study is to provide a foundation for organizing research efforts toward the design and development of proper quantitative risk estimation approaches for the development of risk-based continuous user authentication solutions for smartphones. The reviewed quantitative risk estimation approaches have been divided into the following five main categories: (i) probabilistic approaches, (ii) machine learning-based approaches, (iii) fuzzy logic models, (iv) non-graph-based models, and (v) Monte Carlo simulation models. Our main findings are summarized in the table in the end of the manuscript.
The ability to control the wavefront of light is fundamental to focusing and redistribution of light, enabling many applications from imaging to spectroscopy. Wave interaction on highly nonlinear ...photorefractive materials is essentially the only established technology allowing the dynamic control of the wavefront of a light beam with another beam of light, but it is slow and requires large optical power. Here we report a proof-of-principle demonstration of a new technology for two-dimensional (2D) control of light with light based on the coherent interaction of optical beams on highly absorbing plasmonic metasurfaces. We illustrate this by performing 2D all-optical logical operations (AND, XOR and OR) and image processing. Our approach offers diffraction-limited resolution, potentially at arbitrarily-low intensity levels and with 100 THz bandwidth, thus promising new applications in space-division multiplexing, adaptive optics, image correction, processing and recognition, 2D binary optical data processing and reconfigurable optical devices.
Gallic acid (GA) and quercetin (QU) are two important bioactive molecules with increased biomedical interest. Cellulose acetate (CA) is a polymer derived from cellulose and is used in various ...applications. In this work, differential scanning calorimetry (DSC), thermogravimetric analysis (TGA) and Fourier transform infrared spectroscopy (FTIR) were used to study the thermal behavior of electrospun CA membranes loaded with quercetin or gallic acid. It was found that gallic acid and quercetin depress the thermochemical transition (simultaneous softening and decomposition) of CA, in a mechanism similar to that of the glass transition depression of amorphous polymers by plasticizers. The extensive hydrogen bonding, besides the well-known effect of constraining polymer’s softening by keeping macromolecules close to each other, has a secondary effect on the thermochemical transition, i.e., it weakens chemical bonds and, inevitably, facilitates decomposition. This second effect of hydrogen bonding can provide an explanation for an unexpected observation of this study: CA membranes loaded with quercetin or gallic acid soften at lower temperatures; however, at the same time, they decompose to a higher extent than pure CA. Besides optimization of CA processing, the fundamental understanding of the thermochemical transition depression could lead to the design of more sustainable processes for biomass recycling and conversion.