Breast cancer (BC) is a leading cause of cancer deaths in women in less developed countries and the second leading cause of cancer death in women in the U.S. In this study, we report the inhibition of E2-mediated mammary tumorigenesis by Cuminum cyminum (cumin) administered via the diet as cumin powder, as well as dried ethanolic extract. Groups of female ACI rats were given either an AIN-93M diet or a diet supplemented with cumin powder (5% and 7.5%, w/w) or dried ethanolic cumin extract (1%, w/w), and then challenged with subcutaneous E2 silastic implants (1.2 cm; 9 mg). The first appearance of a palpable mammary tumor was significantly delayed by both the cumin powder and extract. At the end of the study, the tumor incidence was 96% in the control group, whereas only 55% and 45% animals had palpable tumors in the cumin powder and extract groups, respectively. Significant reductions in tumor volume (660 ± 122 vs. 138 ± 49 and 75 ± 46 mm3) and tumor multiplicity (4.21 ± 0.43 vs. 1.16 ± 0.26 and 0.9 ± 0.29 tumors/animal) were also observed by the cumin powder and cumin extract groups, respectively. The cumin powder diet intervention dose- and time-dependently offset E2-related pituitary growth, and reduced the levels of circulating prolactin and the levels of PCNA in the mammary tissues. Mechanistically, the cumin powder diet resulted in a significant reversal of E2-associated modulation in ERα, CYP1A1 and CYP1B1. Further, the cumin powder diet reversed the expression levels of miRNAs (miR-182, miR-375, miR-127 and miR-206) that were highly modulated by E2 treatment. We analyzed the composition of the extract by GC/MS and established cymene and cuminaldehyde as major components, and further detected no signs of gross or systemic toxicity. Thus, cumin bioactives can significantly delay and prevent E2-mediated mammary tumorigenesis in a safe and effective manner, and warrant continued efforts to develop these clinically translatable spice bioactives as chemopreventives and therapeutics against BC. 相似文献
In this work, a Weiner-type nonlinear black box model was developed for capturing dynamics of open loop stable MIMO nonlinear systems with deterministic inputs. The linear dynamic component of the model was parameterized using orthogonal Laguerre filters while the nonlinear state output map was constructed either using quadratic polynomial functions or artificial neural networks. The properties of the resulting model, such as open loop stability and steady-state behavior, are discussed in detail. The identified Weiner-Laguerre model was further used to formulate a nonlinear model predictive control (NMPC) scheme. The efficacy of the proposed modeling and control scheme was demonstrated using two benchmark control problems: (a) a simulation study involving control of a continuously operated fermenter at its optimum (singular) operating point and (b) experimental verification involving control of pH at the critical point of a neutralization process. It was observed that the proposed Weiner-Laguerre model is able to capture both the dynamic and steady-state characteristics of the continuous fermenter as well as the neutralization process reasonably accurately over wide operating ranges. The proposed NMPC scheme achieved a smooth transition from a suboptimal operating point to the optimum (singular) operating point of the fermenter without causing large variation in manipulated inputs. The proposed NMPC scheme was also found to be robust in the face of moderate perturbation in the unmeasured disturbances. In the case of experimental verification using the neutralization process, the proposed control scheme was found to achieve much faster transition to a set point close to the critical point when compared to a conventional gain-scheduled PID controller. 相似文献
This paper introduces a binary neural network-based prediction algorithm incorporating both spatial and temporal characteristics into the prediction process. The algorithm is used to predict short-term traffic flow by combining information from multiple traffic sensors (spatial lag) and time series prediction (temporal lag). It extends previously developed Advanced Uncertain Reasoning Architecture (AURA) k-nearest neighbour (k-NN) techniques. Our task was to produce a fast and accurate traffic flow predictor. The AURA k-NN predictor is comparable to other machine learning techniques with respect to recall accuracy but is able to train and predict rapidly. We incorporated consistency evaluations to determine whether the AURA k-NN has an ideal algorithmic configuration or an ideal data configuration or whether the settings needed to be varied for each data set. The results agree with previous research in that settings must be bespoke for each data set. This configuration process requires rapid and scalable learning to allow the predictor to be set-up for new data. The fast processing abilities of the AURA k-NN ensure this combinatorial optimisation will be computationally feasible for real-world applications. We intend to use the predictor to proactively manage traffic by predicting traffic volumes to anticipate traffic network problems. 相似文献
A differentiation between free carboxyl and various lactone groups in different types of oxycelluloses was carried out based on the variation in their reaction rate with KI/KIO3 solution. For oxycelluloses prepared under acidic conditions, a large proportion of carboxyl groups are present in free form. Each oxycellulose was also studied after cation freeing as well as after blocking the free carboxyl groups by treatment with sodium chloride. Cation freeing was found to cause considerable lactonization of carboxyl groups; sodium chloride treatment blocked them only partially. 相似文献
This paper introduces a directional filter bank (DFB) for segmentation of NDE images containing directional information. The DFB is used to split an image into a desired number of sub-band images with each sub-band image containing features belonging only to a given angular range. The DFB is a two-channel decomposition employing the Quincunx sampling matrix and the diamond half band filter pair. The DFB is also designed to incorporate the property of perfect reconstruction or alias free reconstruction. Applications of the DFB towards segmenting C-scan images of fiber-reinforced composites, magnetic flux leakage (MFL) images of seamless tubes, IR images of solar cell panels and optical images for the computation of area coverage in a shot-peening process are discussed. 相似文献
Design of industrial annealing cycles requires recrystallization and grain growth studies, which are typically carried out
under isothermal laboratory condition. The kinetics coefficients of these phase transformations are obtained from such studies,
which are subsequently used in designing the industrial nonisothermal cycles using the additivity principles. However, the
strong heating rate effects on the grain growth kinetics necessitate such kinetics studies using industrial thermal profiles.
In the present work, the hot and cold spot cycles of an industrial batch annealing cycle for AIK grade steel have been simulated
in a programmable laboratory furnace. Subsequently, the effect of annealing temperature, soaking time, and heating rate on
the microstructural features, such as grain size distribution, grain shape anisotropy, and grain orientation, have been investigated
through extensive quantitative microscopy. The implications of these results on the design of industrial batch annealing cycles
have been discussed. 相似文献
Recent research suggests that social interactions in video games may lead to the development of community bonding and prosocial attitudes. Building on this line of research, a national survey of U.S. adults finds that gamers who develop ties with a community of fellow gamers possess gaming social capital, a new gaming‐related community construct that is shown to be a positive antecedent in predicting both face‐to‐face social capital and civic participation. 相似文献
In this paper, we establish a set of sufficient conditions for the controllability of damped second-order impulsive neutral integrodifferential systems with nonlocal initial conditions in Banach spaces. The approach used is the Sadovskii fixed point theorem combined with a noncompact condition on the cosine family of operators. An example is presented to illustrate the result. 相似文献
In General, Mobile Ad-Hoc Network (MANET) has limited energy resources, and it cannot recharge itself. This research goal focuses on building a power management scheme that saves energy in the MANET. Due to power instability, there is a chance that cluster heads fail and function incorrectly in cluster-based routing. As a result, instability occurs with the cluster heads while collecting data and communicating with others effectively. This work focuses on detecting the unstable cluster heads, which are replaced by other nodes implementing the envisaged self-configurable cluster mechanism. A self-configurable cluster mechanism with a k-means protocol approach is proposed to designate cluster heads effectively. The proposed k-means procedure is based on periodic irregular cluster head rotations or altering the number of clusters. We also propose a trust management mechanism in this research to detect and avoid MANET vulnerabilities. Because of the continuously changing topology and limited resources (power, bandwidth, computing), the trust management algorithm should only use local data. Consequently, compared to traditional protocols, the proposed approach with the k-means procedure and its experimental results show lower power usage and provide an optimal system for trust management.
Authentication is important to the security of user data in a mobile cloud environment. Because of the server’s user credentials, it is subject to attacks. To maintain data authentication, a novel authentication mechanism is proposed. It consists of three independent phases: Registration, login, and authentication and key agreement. The user registers with the Registration Center (RC) by producing a secret number that isn’t stored in the phone, which protects against privileged insider attacks. The user and server generate a nonce for dynamic user identity and agree on a session secret key for safe communication. The passwords are not stored on the computer or provided in plain text, they are resistant to replay, guessing, and stolen verification attacks. The suggested protocol uses a one-way hash function and XOR operations, with the client having remote access to a large number of servers over a secure communication channel. Concentrates on HMAC and SHA3 for Collision Free Hashing and to overcome length extension attacks. HMACs are substantially less affected by collisions than their underlying hashing algorithms alone. So adding an HMAC to an MD5 or SHA hash would make it substantially more difficult to break via a rainbow table. 相似文献