1,830 research outputs found
Effects of detraining on functional fitness and lymphocyte subsets in postmenopausal females
Introduction: Aging leads to declines of functional fitness and regular exercise has been recognized to be beneficial for keeping health and preventing degenerative diseases in older adults. Limited evidences connect the relationships among detraining, functional fitness, immunosenescence, and vascular integrity in aged individuals. Thus, the aims of this study was to inspect: How training and detraining influence functional fitness, mobilization of circulating leukocytes and lymphocyte subsets? Method: Twenty-two female volunteers aged 50 to 65 years were recruited as participants in this study. Participants were assigned into training group (TG, n=13) and control group (CG, n=9). The participants in TG were asked to attend exercise program, including aerobic exercise at 70% HRR for 60 min twice per week and resistance training at 60-70% 1RM, 3 sets and 9 exercises for 60 min per week for 16 weeks and subsequently avoid exercise for 6 weeks to investigate detraining effects. CG were asked to stay in their regular lifestyles. A six-items measurement of functional fitness and resting (at fasting status) venous blood samples were collected at before training program (Pre-training), 8th week of training (Mid-training), after training program (Post-training), and 6th week of detraining 6 weeks (Detraining). Blood cell counts (WBC, RBC, HCT, LYM) were measured using an automated cell counter and lymphocyte subsets (CD4, CD8, CD19, CD56) were analyzed by flow cytometry. Data were analyzed by descriptive statistic, mixed two-factors (time × group) measures ANOVA or ACOVA and the significance was set at pResult: Functional fitness of TG was not significantly improved following the training program although it was significantly better than CG in Pre-training. Blood cell counts were not changed and all in normal range. A significant difference in CD19 counts were observed between TG and CG (71.23±32.05 vs. 116.45±67.95 103/mL) in Post-training. CD19 counts in TG were increased at Detraining compared with Mid-training and Post-training (138.08±50.22 vs. 74.92±31.20, 71.23±32.05 103/mL). No alterations in quantity and percentage of CD4, CD8, and CD56 were observed in this study. Conclusion: Findings of this study suggest that both a 16-week moderate exercise program and a 6-week detraining did not significantly change the functional fitness and lymphocyte subsets in postmenopausal females
On the Impossibility of Post-Quantum Black-Box Zero-Knowledge in Constant Rounds
We investigate the existence of constant-round post-quantum black-box
zero-knowledge protocols for . As a main result, we show that
there is no constant-round post-quantum black-box zero-knowledge argument for
unless . As constant-round
black-box zero-knowledge arguments for exist in the classical
setting, our main result points out a fundamental difference between
post-quantum and classical zero-knowledge protocols. Combining previous
results, we conclude that unless ,
constant-round post-quantum zero-knowledge protocols for exist if
and only if we use non-black-box techniques or relax certain security
requirements such as relaxing standard zero-knowledge to
-zero-knowledge. Additionally, we also prove that three-round and
public-coin constant-round post-quantum black-box -zero-knowledge
arguments for do not exist unless .Comment: 46 page
A Black-Box Approach to Post-Quantum Zero-Knowledge in Constant Rounds
In a recent seminal work, Bitansky and Shmueli (STOC \u2720) gave the first construction of a constant round zero-knowledge argument for NP secure against quantum attacks.
However, their construction has several drawbacks compared to the classical counterparts.
Specifically, their construction only achieves computational soundness, requires strong assumptions of quantum hardness of learning with errors (QLWE assumption) and the existence of quantum fully homomorphic encryption (QFHE), and relies on non-black-box simulation.
In this paper, we resolve these issues at the cost of weakening the notion of zero-knowledge to what is called -zero-knowledge.
Concretely, we construct the following protocols:
- We construct a constant round interactive proof for NP that satisfies statistical soundness and black-box -zero-knowledge against quantum attacks assuming the existence of collapsing hash functions, which is a quantum counterpart of collision-resistant hash functions.
Interestingly, this construction is just an adapted version of the classical protocol by Goldreich and Kahan (JoC \u2796) though the proof of -zero-knowledge property against quantum adversaries requires novel ideas.
- We construct a constant round interactive argument for NP that satisfies computational soundness and black-box -zero-knowledge against quantum attacks only assuming the existence of post-quantum one-way functions.
At the heart of our results is a new quantum rewinding technique that enables a simulator to extract a committed message of a malicious verifier while simulating verifier\u27s internal state in an appropriate sense
Classical Verification of Quantum Computations with Efficient Verifier
In this paper, we extend the protocol of classical verification of quantum computations (CVQC) recently proposed by Mahadev to make the verification efficient. Our result is obtained in the following three steps:
- We show that parallel repetition of Mahadev\u27s protocol has negligible soundness error. This gives the first constant round CVQC protocol with negligible soundness error. In this part, we only assume the quantum hardness of the learning with error (LWE) problem similar to Mahadev\u27s work.
- We construct a two-round CVQC protocol in the quantum random oracle model (QROM) where a cryptographic hash function is idealized to be a random function. This is obtained by applying the Fiat-Shamir transform to the parallel repetition version of Mahadev\u27s protocol.
-We construct a two-round CVQC protocol with an efficient verifier in the CRS+QRO model where both prover and verifier can access a (classical) common reference string generated by a trusted third party in addition to quantum access to QRO. Specifically, the verifier can verify a computation in time where is the security parameter. For proving soundness, we assume that a standard model instantiation of our two-round protocol with a concrete hash function (say, SHA-3) is sound and the existence of post-quantum indistinguishability obfuscation and post-quantum fully homomorphic encryption in addition to the quantum hardness of the LWE problem
Metabolic risk factors, exercise capacity and inflammation in postmenopausal women
Session presented on: Tuesday, July 23, 2013:
Purpose: The purposes of this study were to investigate metabolic risks factors, exercise capacity, and inflammation state in postmenopausal women; and to evaluate the effect of a supervised aerobic exercise training program on these characteristics.
Methods: This study was a prospective, randomized control trail. Forty-six postmenopausal women completed the study: 23 in the exercise, 23 in the control groups. Subjects in the exercise group participated in 30 minutes of moderate-intensity treadmill exercise (60% to 70% of their maximal heart rate performed from exercise testing), three times each week for 12 weeks. Data on metabolic components (blood pressure, blood lipid profile, fasting blood sugar, and waist circumference), serum IL-6 levels, and exercise capacity were analyzed at baseline and the 12th weeks. The metabolic syndrome (MS) score was calculated as the sum of the metabolic components present in each subject. The Generalized Estimating Equation was used to analyze the change in study variables between the two groups.
Results: After controlling for age and body mass index, the intervention effect on MS score and exercise capacity in the exercise group were significantly more than the control group at the end of the 12th weeks (Z= 2.72, p \u3c 0.05 and Z = 3.93, p \u3c 0.001 respectively). Significant declines in the level of serum IL-6 was also observed in the exercise group compared with their counterparts on completion of the study (p \u3c0.05).
Conclusion: Regular exercise can play a role of improving exercise capacity and metabolic risk factors in postmenopausal women. The result would help to facilitate the application of physical exercise in women health
Measuring cash flow and overdraft for fuzzy project networks with overlapping activities
Overlapping activities with imprecise durations to accelerate schedules has an impact on scheduling a construction project. The project may need to be rescheduled to suit the available overdraft limitation rather than to adopt the least total cost schedule. However, past research has seldom conducted a risk analysis on the project cash flow and overdraft requirements for projects with overlapping activities in a fuzzy environment. This research uses fuzzy DSM-based scheduling and proposes an algorithm to calculate the cash flow and overdraft at different risk levels. A numerical example is illustrated to demonstrate the algorithm’s effectiveness
Genomic, Pathway Network, and Immunologic Features Distinguishing Squamous Carcinomas
This integrated, multiplatform PanCancer Atlas study co-mapped and identified distinguishing
molecular features of squamous cell carcinomas (SCCs) from five sites associated with smokin
Pan-Cancer Analysis of lncRNA Regulation Supports Their Targeting of Cancer Genes in Each Tumor Context
Long noncoding RNAs (lncRNAs) are commonly dys-regulated in tumors, but only a handful are known toplay pathophysiological roles in cancer. We inferredlncRNAs that dysregulate cancer pathways, onco-genes, and tumor suppressors (cancer genes) bymodeling their effects on the activity of transcriptionfactors, RNA-binding proteins, and microRNAs in5,185 TCGA tumors and 1,019 ENCODE assays.Our predictions included hundreds of candidateonco- and tumor-suppressor lncRNAs (cancerlncRNAs) whose somatic alterations account for thedysregulation of dozens of cancer genes and path-ways in each of 14 tumor contexts. To demonstrateproof of concept, we showed that perturbations tar-geting OIP5-AS1 (an inferred tumor suppressor) andTUG1 and WT1-AS (inferred onco-lncRNAs) dysre-gulated cancer genes and altered proliferation ofbreast and gynecologic cancer cells. Our analysis in-dicates that, although most lncRNAs are dysregu-lated in a tumor-specific manner, some, includingOIP5-AS1, TUG1, NEAT1, MEG3, and TSIX, synergis-tically dysregulate cancer pathways in multiple tumorcontexts
- …
