1,012 research outputs found
A Single-Arm, Proof-Of-Concept Trial of Lopimune (Lopinavir/Ritonavir) as a Treatment for HPV-Related Pre-Invasive Cervical Disease
BACKGROUND:
Cervical cancer is the most common female malignancy in the developing nations and the third most common cancer in women globally. An effective, inexpensive and self-applied topical treatment would be an ideal solution for treatment of screen-detected, pre-invasive cervical disease in low resource settings.
METHODS:
Between 01/03/2013 and 01/08/2013, women attending Kenyatta National Hospital's Family Planning and Gynaecology Outpatients clinics were tested for HIV, HPV (Cervista®) and liquid based cervical cytology (LBC -ThinPrep®). HIV negative women diagnosed as high-risk HPV positive with high grade squamous intraepithelial lesions (HSIL) were examined by colposcopy and given a 2 week course of 1 capsule of Lopimune (CIPLA) twice daily, to be self-applied as a vaginal pessary. Colposcopy, HPV testing and LBC were repeated at 4 and 12 weeks post-start of treatment with a final punch biopsy at 3 months for histology. Primary outcome measures were acceptability of treatment with efficacy as a secondary consideration.
RESULTS:
A total of 23 women with HSIL were treated with Lopimune during which time no adverse reactions were reported. A maximum concentration of 10 ng/ml of lopinavir was detected in patient plasma 1 week after starting treatment. HPV was no longer detected in 12/23 (52.2%, 95%CI: 30.6-73.2%). Post-treatment cytology at 12 weeks on women with HSIL, showed 14/22 (63.6%, 95%CI: 40.6-82.8%) had no dysplasia and 4/22 (18.2%, 95%CI: 9.9-65.1%) were now low grade demonstrating a combined positive response in 81.8% of women of which 77.8% was confirmed by histology. These data are supported by colposcopic images, which show regression of cervical lesions.
CONCLUSIONS:
These results demonstrate the potential of Lopimune as a self-applied therapy for HPV infection and related cervical lesions. Since there were no serious adverse events or detectable post-treatment morbidity, this study indicates that further trials are clearly justified to define optimal regimes and the overall benefit of this therapy.
TRIAL REGISTRATION:
ISRCTN Registry 48776874
Quantum resource estimates for computing elliptic curve discrete logarithms
We give precise quantum resource estimates for Shor's algorithm to compute
discrete logarithms on elliptic curves over prime fields. The estimates are
derived from a simulation of a Toffoli gate network for controlled elliptic
curve point addition, implemented within the framework of the quantum computing
software tool suite LIQ. We determine circuit implementations for
reversible modular arithmetic, including modular addition, multiplication and
inversion, as well as reversible elliptic curve point addition. We conclude
that elliptic curve discrete logarithms on an elliptic curve defined over an
-bit prime field can be computed on a quantum computer with at most qubits using a quantum circuit of at most Toffoli gates. We are able to classically simulate the
Toffoli networks corresponding to the controlled elliptic curve point addition
as the core piece of Shor's algorithm for the NIST standard curves P-192,
P-224, P-256, P-384 and P-521. Our approach allows gate-level comparisons to
recent resource estimates for Shor's factoring algorithm. The results also
support estimates given earlier by Proos and Zalka and indicate that, for
current parameters at comparable classical security levels, the number of
qubits required to tackle elliptic curves is less than for attacking RSA,
suggesting that indeed ECC is an easier target than RSA.Comment: 24 pages, 2 tables, 11 figures. v2: typos fixed and reference added.
ASIACRYPT 201
Low-Weight Primes for Lightweight Elliptic Curve Cryptography on 8-bit AVR Processors
Small 8-bit RISC processors and micro-controllers based on the AVR instruction set architecture are widely used in the embedded domain with applications ranging from smartcards over control systems to wireless sensor nodes. Many of these applications require asymmetric encryption or authentication, which has spurred a body of research into implementation aspects of Elliptic Curve Cryptography (ECC) on the AVR platform. In this paper, we study the suitability of a special class of finite fields, the so-called Optimal Prime Fields (OPFs), for a "lightweight" implementation of ECC with a view towards high performance and security. An OPF is a finite field Fp defined by a prime of the form p = u*2^k + v, whereby both u and v are "small" (in relation to 2^k) so that they fit into one or two registers of an AVR processor. OPFs have a low Hamming weight, which allows for a very efficient implementation of the modular reduction since only the non-zero words of p need to be processed. We describe a special variant of Montgomery multiplication for OPFs that does not execute any input-dependent conditional statements (e.g. branch instructions) and is, hence, resistant against certain side-channel attacks. When executed on an Atmel ATmega processor, a multiplication in a 160-bit OPF takes just 3237 cycles, which compares favorably with other implementations of 160-bit modular multiplication on an 8-bit processor. We also describe a performance-optimized and a security-optimized implementation of elliptic curve scalar multiplication over OPFs. The former uses a GLV curve and executes in 4.19M cycles (over a 160-bit OPF), while the latter is based on a Montgomery curve and has an execution time of approximately 5.93M cycles. Both results improve the state-of-the-art in lightweight ECC on 8-bit processors
The formation of professional identity in medical students: considerations for educators
<b>Context</b> Medical education is about more than acquiring an appropriate level of knowledge and developing relevant skills. To practice medicine students need to develop a professional identity – ways of being and relating in professional contexts.<p></p>
<b>Objectives</b> This article conceptualises the processes underlying the formation and maintenance of medical students’ professional identity drawing on concepts from social psychology.<p></p>
<b>Implications</b> A multi-dimensional model of identity and identity formation, along with the concepts of identity capital and multiple identities, are presented. The implications for educators are discussed.<p></p>
<b>Conclusions</b> Identity formation is mainly social and relational in nature. Educators, and the wider medical society, need to utilise and maximise the opportunities that exist in the various relational settings students experience. Education in its broadest sense is about the transformation of the self into new ways of thinking and relating. Helping students form, and successfully integrate their professional selves into their multiple identities, is a fundamental of medical education
Complex exon-intron marking by histone modifications is not determined solely by nucleosome distribution
It has recently been shown that nucleosome distribution, histone modifications and RNA polymerase II (Pol II) occupancy show preferential association with exons (“exon-intron marking”), linking chromatin structure and function to co-transcriptional splicing in a variety of eukaryotes. Previous ChIP-sequencing studies suggested that these marking patterns reflect the nucleosomal landscape. By analyzing ChIP-chip datasets across the human genome in three cell types, we have found that this marking system is far more complex than previously observed. We show here that a range of histone modifications and Pol II are preferentially associated with exons. However, there is noticeable cell-type specificity in the degree of exon marking by histone modifications and, surprisingly, this is also reflected in some histone modifications patterns showing biases towards introns. Exon-intron marking is laid down in the absence of transcription on silent genes, with some marking biases changing or becoming reversed for genes expressed at different levels. Furthermore, the relationship of this marking system with splicing is not simple, with only some histone modifications reflecting exon usage/inclusion, while others mirror patterns of exon exclusion. By examining nucleosomal distributions in all three cell types, we demonstrate that these histone modification patterns cannot solely be accounted for by differences in nucleosome levels between exons and introns. In addition, because of inherent differences between ChIP-chip array and ChIP-sequencing approaches, these platforms report different nucleosome distribution patterns across the human genome. Our findings confound existing views and point to active cellular mechanisms which dynamically regulate histone modification levels and account for exon-intron marking. We believe that these histone modification patterns provide links between chromatin accessibility, Pol II movement and co-transcriptional splicing
Erythrocyte sedimentation rate as a marker of inflammation and ongoing coagulation in stroke and transient ischaemic attack
No abstract.
South African Medical Journal Vol. 95 (8) 2005: 607-61
Disparities and risks of sexually transmissible infections among men who have sex with men in China: a meta-analysis and data synthesis.
BACKGROUND: Sexually transmitted infections (STIs), including Hepatitis B and C virus, are emerging public health risks in China, especially among men who have sex with men (MSM). This study aims to assess the magnitude and risks of STIs among Chinese MSM. METHODS: Chinese and English peer-reviewed articles were searched in five electronic databases from January 2000 to February 2013. Pooled prevalence estimates for each STI infection were calculated using meta-analysis. Infection risks of STIs in MSM, HIV-positive MSM and male sex workers (MSW) were obtained. This review followed the PRISMA guidelines and was registered in PROSPERO. RESULTS: Eighty-eight articles (11 in English and 77 in Chinese) investigating 35,203 MSM in 28 provinces were included in this review. The prevalence levels of STIs among MSM were 6.3% (95% CI: 3.5-11.0%) for chlamydia, 1.5% (0.7-2.9%) for genital wart, 1.9% (1.3-2.7%) for gonorrhoea, 8.9% (7.8-10.2%) for hepatitis B (HBV), 1.2% (1.0-1.6%) for hepatitis C (HCV), 66.3% (57.4-74.1%) for human papillomavirus (HPV), 10.6% (6.2-17.6%) for herpes simplex virus (HSV-2) and 4.3% (3.2-5.8%) for Ureaplasma urealyticum. HIV-positive MSM have consistently higher odds of all these infections than the broader MSM population. As a subgroup of MSM, MSW were 2.5 (1.4-4.7), 5.7 (2.7-12.3), and 2.2 (1.4-3.7) times more likely to be infected with chlamydia, gonorrhoea and HCV than the broader MSM population, respectively. CONCLUSION: Prevalence levels of STIs among MSW were significantly higher than the broader MSM population. Co-infection of HIV and STIs were prevalent among Chinese MSM. Integration of HIV and STIs healthcare and surveillance systems is essential in providing effective HIV/STIs preventive measures and treatments. TRIAL REGISTRATION: PROSPERO NO: CRD42013003721
Reciprocity as a foundation of financial economics
This paper argues that the subsistence of the fundamental theorem of contemporary financial mathematics is the ethical concept ‘reciprocity’. The argument is based on identifying an equivalence between the contemporary, and ostensibly ‘value neutral’, Fundamental Theory of Asset Pricing with theories of mathematical probability that emerged in the seventeenth century in the context of the ethical assessment of commercial contracts in a framework of Aristotelian ethics. This observation, the main claim of the paper, is justified on the basis of results from the Ultimatum Game and is analysed within a framework of Pragmatic philosophy. The analysis leads to the explanatory hypothesis that markets are centres of communicative action with reciprocity as a rule of discourse. The purpose of the paper is to reorientate financial economics to emphasise the objectives of cooperation and social cohesion and to this end, we offer specific policy advice
Design and Reliability Performance Evaluation of Network Coding Schemes for Lossy Wireless Networks
This thesis investigates lossy wireless networks, which are wireless communication networks consisting of lossy wireless links, where the packet transmission via a lossy wireless link is successful with a certain value of probability. In particular, this thesis analyses all-to-all broadcast in lossy wireless networks, where every node has a native packet to transmit to all other nodes in the network. A challenge of all-to-all broadcast in lossy wireless networks is the reliability, which is defined as the probability that every node in the network successfully obtains a copy of the native packets of all other nodes. In this thesis, two novel network coding schemes are proposed, which are the neighbour network coding scheme and the random neighbour network coding scheme. In the two proposed network coding schemes, a node may perform a bit-wise exclusive or (XOR) operation to combine the native packet of itself and the native packet of its neighbour, called the coding neighbour, into an XOR coded packet. The reliability of all-to-all broadcast under both the proposed network coding schemes is investigated analytically using Markov chains. It is shown that the reliability of all-to-all broadcast can be improved considerably by employing the proposed network coding schemes, compared with non-coded networks with the same link conditions, i.e. same probabilities of successful packet transmission via wireless channels. Further, the proposed schemes take the link conditions of each node into account to maximise the reliability of a given network. To be more precise, the first scheme proposes the optimal coding neighbour selection method while the second scheme introduces a tuning parameter to control the probability that a node performs network coding at each transmission. The observation that channel condition can have a significant impact on the performance of network coding schemes is expected to be applicable to other network coding schemes for lossy wireless networks
A Family of Lightweight Twisted Edwards Curves for the Internet of Things
We introduce a set of four twisted Edwards curves that satisfy common security requirements and allow for fast implementations of scalar multiplication on 8, 16, and 32-bit processors. Our curves are defined by an equation of the form -x^2 + y^2 = 1 + dx^2y^2 over a prime field Fp, where d is a small non-square modulo p. The underlying prime fields are based on "pseudo-Mersenne" primes given by p = 2^k - c and have in common that p is congruent to 5 modulo 8, k is a multiple of 32 minus 1, and c is at most eight bits long. Due to these common features, our primes facilitate a parameterized implementation of the low-level arithmetic so that one and the same arithmetic function is able to process operands of different length. Each of the twisted Edwards curves we introduce in this paper is birationally equivalent to a Montgomery curve of the form -(A+2)y^2 = x^3 + Ax^2 + x where 4/(A+2) is small. Even though this contrasts with the usual practice of choosing A such that (A+2)/4 is small, we show that the Montgomery form of our curves allows for an equally efficient implementation of point doubling as Curve25519. The four curves we put forward roughly match the common security levels of 80, 96, 112 and 128 bits. In addition, their Weierstraß representations are isomorphic to curves of the form y^2 = x^3 - 3x + b so as to facilitate inter-operability with TinyECC and other legacy software
- …
