65 results on '"Stephen Tang"'
Search Results
2. Targeted DNA integration in human cells without double-strand breaks using CRISPR RNA-guided transposases
- Author
-
George D. Lampe, Rebeca T. King, Tyler S. Halpin-Healy, Sanne E. Klompe, Marcus I. Hogan, Phuc Leo H. Vo, Stephen Tang, Alejandro Chavez, and Samuel H. Sternberg
- Subjects
Article - Abstract
Traditional genome-editing reagents such as CRISPR-Cas9 achieve targeted DNA modification by introducing double-strand breaks (DSBs), thereby stimulating localized DNA repair by endogenous cellular repair factors. While highly effective at generating heterogenous knockout mutations, this approach suffers from undesirable byproducts and an inability to control product purity. Here we develop a system in human cells for programmable, DSB-free DNA integration using Type I CRISPR-associated transposons (CASTs). To adapt our previously described CAST systems, we optimized DNA targeting by the QCascade complex through a comprehensive assessment of protein design, and we developed potent transcriptional activators by exploiting the multi-valent recruitment of the AAA+ ATPase, TnsC, to genomic sites targeted by QCascade. After initial detection of plasmid-based transposition, we screened 15 homologous CAST systems from a wide range of bacterial hosts, identified a CAST homolog fromPseudoalteromonasthat exhibited improved activity, and increased integration efficiencies through parameter optimization. We further discovered that bacterial ClpX enhances genomic integration by multiple orders of magnitude, and we propose that this critical accessory factor functions to drive active disassembly of the post-transposition CAST complex, akin to its demonstrated role in Mu transposition. Our work highlights the ability to functionally reconstitute complex, multi-component machineries in human cells, and establishes a strong foundation to realize the full potential of CRISPR-associated transposons for human genome engineering.
- Published
- 2023
3. A Psd-95 Peptidomimetic Mitigates Neurological Deficits in a Mouse Model of Angelman Syndrome
- Author
-
John Marshall, Kara A. Lau, xin yang, Mengia-Seraina Rioult-Pedotti, Stephen Tang, Mark Appleman, Jianan Zhang, Yuyang Tian, Caitlin Marino, Mudi Yao, Qin Jiang, Ayumi C. Tsuda, Alvin Huang, and Cong Cao
- Published
- 2023
- Full Text
- View/download PDF
4. PO-03-164 FEASIBILITY OF GADOLINIUM CONTRAST FLUOROSCOPY TO FACILITATE WATCHMAN FLX IMPLANTATION USING INTRACARDIAC ECHOCARDIOGRAPHY
- Author
-
Dorothy Peng, Sarina A. van der Zee, Stephen Tang, and Shephal K. Doshi
- Subjects
Physiology (medical) ,Cardiology and Cardiovascular Medicine - Published
- 2023
- Full Text
- View/download PDF
5. Endocardial ablation at the mitral valve vestibule and its surroundings for the treatment of arrhythmias linked to the greater cardiac vasculature
- Author
-
Maged F. Nageh and Stephen Tang
- Subjects
Electrocardiography ,Vena Cava, Superior ,Catheter Ablation ,Tachycardia, Ventricular ,Humans ,Mitral Valve ,General Medicine ,Cardiology and Cardiovascular Medicine ,Pericardium ,Ventricular Premature Complexes ,Endocardium ,Accessory Atrioventricular Bundle - Abstract
The role of the epicardial vasculature in supraventricular and ventricular arrhythmias was described in clinical studies as well as its treatment by intravascular point ablation or alcohol injection. We report on a case series of patients with different arrhythmias linked to an epicardial site of origin with evidence supporting transmural extensions that were targeted for ablation with successful outcomes.The records of patients who has catheter ablation for Supraventricular or Ventricular arrhythmias between 2015 and 2020 was searched for patients with (1) arrhythmias linked to the epicardial vasculature and (2) findings to support an endocardial connection to the epicardial vasculature by activation mapping, pace mapping, or differential pacing, and (3) were successfully ablated via an endocardial approach only.From the data searched, we identified five patients with the following arrhythmias left ventricular summit ectopy, peri-mitral atrial flutter, preexcitation with inducible atrioventricular reentry tachycardia (AVRT), and a concealed left side accessory pathway with inducible AVRT that were linked to the following vessels: Great Cardiac vein, persistent left superior vena cava, left coronary cusp, and left ventricular outflow tract. Endocardial connections were supported by a combination of electro anatomical activation mapping, pace-mapping, and differential pacing. Endocardial ablations performed in all patients were successful without complications.This report highlights a subset of patients with arrhythmias linked to the greater cardiac vascular system that can be safely and effectively ablated endocardially, given the limitations and possible complications of epicardial ablation within or in the proximity of the epicardial vasculature.
- Published
- 2022
6. Ethical misconduct by new Australian lawyers: prevalence and prevention
- Author
-
Vivien Holmes, Stephen Tang, and Tony Foley
- Subjects
050502 law ,Misconduct ,State (polity) ,Strategy and Management ,media_common.quotation_subject ,Political science ,05 social sciences ,050501 criminology ,Criminology ,Law ,0505 law ,media_common - Abstract
This paper examines the ethical behaviour of new lawyers from two contrasting points of view. First, we review the prevalence and type of ethical misconduct by lawyers in the Australian state of Vi...
- Published
- 2020
- Full Text
- View/download PDF
7. Extending EDF for Soft Real-Time Scheduling on Unrelated Multiprocessors
- Author
-
Stephen Tang, Sergey Voronov, and James H. Anderson
- Published
- 2021
- Full Text
- View/download PDF
8. AI Meets Real-Time: Addressing Real-World Complexities in Graph Response-Time Analysis
- Author
-
Sergey Voronov, Stephen Tang, Tanya Amert, and James H. Anderson
- Published
- 2021
- Full Text
- View/download PDF
9. PO-700-02 FEASIBILITY AND SAFETY OF INTRACARDIAC ECHOCARDIOGRAPHY-GUIDED IMPLANTATION OF THE WATCHMAN-FLX LEFT ATRIAL APPENDAGE CLOSURE DEVICE WITHOUT PRE-PROCEDURAL IMAGING: A MULTI-NATIONAL REGISTRY
- Author
-
Emmanuel Ekanem, Mohit Turagam, Petr Neuzil, Shephal K. Doshi, Miguel Valderrabano, Pavel Hala, Stephen Tang, Daniel Musikantow, Joshua Lampert, Abhishek Maan, Daniel N. Pugliese, Jonathan Gandhi, Marc A. Miller, Jacob S. Koruth, William Whang, Marie-Noelle S. Langan, Srinivas R. Dukkipati, and Vivek Y. Reddy
- Subjects
Physiology (medical) ,Cardiology and Cardiovascular Medicine - Published
- 2022
- Full Text
- View/download PDF
10. The use of antimicrobial photodynamic therapy in the successful management of a nonsurgical complex type II Dens Invaginatus
- Author
-
Tiago Braga, Stephen Tang, Rodrigo Rodrigues Amaral, Nelson Ferreira de Figueiredo, and Victor Couto Figueiredo
- Subjects
medicine.medical_specialty ,Cone beam computed tomography ,Root canal ,medicine.medical_treatment ,Biophysics ,Dentistry ,Photodynamic therapy ,Dermatology ,Dens invaginatus ,Anti-Infective Agents ,medicine ,Dentin ,Humans ,Pharmacology (medical) ,Photosensitizing Agents ,business.industry ,Cone-Beam Computed Tomography ,Endodontics ,Antimicrobial ,medicine.disease ,Dens in Dente ,medicine.anatomical_structure ,Oncology ,Photochemotherapy ,Adjunctive treatment ,business - Abstract
Because of its complex root canal morphology, dens invaginatus (DI) is a developmental anomaly that represents an endodontic challenge to complete cleaning, shaping, and disinfecting the root canal system. The present case report describes the use of antimicrobial photodynamic therapy as an adjunctive treatment in the successful management of nonsurgical complex type II DI in a left maxillary lateral incisor with thin and fragile dentin walls associated with periradicular lesion.
- Published
- 2021
11. Simultaneous Multithreading in Mixed-Criticality Real-Time Systems
- Author
-
Jingyuan Chen, James H. Anderson, F. Donelson Smith, Joshua Bakita, Sims Hill Osborne, Stephen Tang, and Shareef Ahmed
- Subjects
Multi-core processor ,Mixed criticality ,Computer science ,CPU cache ,Multithreading ,Benchmark (computing) ,Context (language use) ,Parallel computing ,Cache ,Simultaneous multithreading - Abstract
Simultaneous multithreading (SMT) enables enhanced computing capacity by allowing multiple tasks to execute concurrently on the same computing core. Despite its benefits, its use has been largely eschewed in work on real-time systems due to concerns that tasks running on the same core may adversely interfere with each other. In this paper, the safety of using SMT in a mixed-criticality multicore context is considered in detail. To this end, a prior open-source framework called MC2 (mixedcriticality on multicore), which provides features for mitigating cache and memory interference, was re-implemented to support SMT on an SMT-capable multicore platform. The creation of this new, configurable $\mathrm{M}\mathrm{C}^{2}$ variant entailed producing the first operating-system implementations of several recently proposed real-time SMT schedulers and tying them together within a mixed-criticality context. These schedulers introduce new spatialisolation challenges, which required introducing isolation at both the L2 and L3 cache levels. The efficacy of the resulting $\mathrm{M}\mathrm{C}^{2}$ variant is demonstrated via three experimental efforts. The first involved obtaining execution data using a wide range of benchmark suites, including TACLeBench, DIS, SD-VBS, and synthetic microbenchmarks. The second involved conducting a large-scale overhead-aware schedulability study, parameterized by the collected benchmark data, to elucidate schedulability tradeoffs. The third involved experiments involving case-study task systems. In the schedulability study, the use of SMT proved capable of increasing platform capacity by an average factor of 1.32. In the case-study experiments, deadline misses of highly critical tasks were never observed.
- Published
- 2021
- Full Text
- View/download PDF
12. Integrative Clinical and Molecular Characterization of Translocation Renal Cell Carcinoma
- Author
-
Sabina Signoretti, Laure Hirsch, Adam S. Feldman, Thomas Denize, Xin Gao, Jiao Li, Jihye Park, Gwo-Shu Mary Lee, Emma R. Garner, Chris Labaki, Daniel Y.C. Heng, Ananthan Sadagopan, Ziad Bakouny, Catherine J. Wu, David F. McDermott, Bradley Alexander McGregor, Vidyalakshmi Sethunath, Eliezer M. Van Allen, Filipe Lf Carvalho, Natalie I. Vokes, Steven L. Chang, Shaan Dudani, Shatha AbuHammad, Toni K. Choueiri, Stephen Tang, Chun-Loo Gan, Praful Ravi, Nebiyou Y. Metaferia, Michelle S. Hirsch, Emily Walton, David A. Braun, Rizwan Haq, Destiny West, Srinivas R. Viswanathan, Gabrielle Bouchard, Alma Imamovic, Cora A. Ricker, John A. Steinharter, and Jackson Nyman
- Subjects
Immunophenotyping ,Somatic cell ,business.industry ,Renal cell carcinoma ,medicine ,Cancer research ,Chromosomal translocation ,medicine.disease ,business ,Kidney cancer ,CD8 ,Clear cell ,Immune checkpoint - Abstract
Translocation renal cell carcinoma (tRCC) is an aggressive and poorly-characterized subtype of kidney cancer driven by MiT/TFE gene fusions. Here, we define the landmarks of tRCC through an integrative analysis of 152 tRCC patients identified across multiple genomic, clinical trial, and retrospective cohorts. Most tRCCs harbor few somatic alterations apart from MiT/TFE fusions and homozygous deletions at chromosome 9p21.3 (19.2% of cases). Transcriptionally, tRCCs display a heightened NRF2-driven antioxidant response that is associated with resistance to many targeted therapies. Consistently, we find that outcomes for tRCC patients treated with vascular endothelial growth factor receptor inhibitors (VEGFR-TKI) are worse than those treated with immune checkpoint inhibition (ICI). Multiparametric immunofluorescence confirmed the presence of CD8 + tumor-infiltrating T cells compatible with a clinical benefit from ICI and revealed an exhaustion immunophenotype distinct from clear cell RCC. Our findings comprehensively define the clinical and molecular features of tRCC and may inspire new therapeutic hypotheses.
- Published
- 2021
- Full Text
- View/download PDF
13. On the Defectiveness of SCHED_DEADLINE w.r.t. Tardiness and Affinities, and a Partial Fix
- Author
-
Luca Abeni, James H. Anderson, and Stephen Tang
- Subjects
Mathematical optimization ,Computer science ,Tardiness ,Bounded function ,Code (cryptography) ,SCHED_DEADLINE ,Linux kernel ,Admission control ,Special case ,Affinities - Abstract
SCHED_DEADLINE (DL for short) is an Earliest-Deadline-First (EDF) scheduler included in the Linux kernel. A question motivated by DL is how EDF should be implemented in the presence of CPU affinities to maintain optimal bounded tardiness guarantees. Recent works have shown that under arbitrary affinities, DL does not maintain such guarantees. Such works have also shown that repairing DL to maintain these guarantees would likely require an impractical overhaul of the existing code. In this work, we show that for the special case where affinities are semi-partitioned, DL can be modified to maintain tardiness guarantees with minor changes. We also draw attention to the fact that admission control is already broken in several respects in the existing DL implementation.
- Published
- 2021
- Full Text
- View/download PDF
14. Integrative molecular characterization of sarcomatoid and rhabdoid renal cell carcinoma
- Author
-
Xin Gao, Maxine Sun, Sabina Signoretti, Michael B. Atkins, Catherine J. Wu, Shaan Dudani, Thai H. Ho, Michelle S. Hirsch, Bradley Alexander McGregor, Ziad Bakouny, John A. Steinharter, Daniel Y.C. Heng, Miriam Sant'Angelo, Sylvan C. Baca, Eliezer M. Van Allen, David A. Braun, Lauren C. Harshman, Stephen Tang, Alice Bosma-Moody, Ronan Flippot, Pier Vitale Nuzzo, Kevin Bi, Amin Nassar, Yue Hou, Sarah Abou Alaiwi, Mark Pomerantz, Natalie I. Vokes, W. Marston Linehan, Megan Wind-Rotolo, Laure Hirsch, Giannicola Genovese, David F. McDermott, Jackson Nyman, Juliet Forman, Wanling Xie, Toni K. Choueiri, Jacob E. Berchuck, Jihye Park, Wenting Pan, Sabrina Y. Camp, Meng Xiao He, Gabrielle Bouchard, Xiao X. Wei, Matthew L. Freedman, Gwo-Shu Mary Lee, Petra Ross-Macdonald, Maura Sticco-Ivins, Sachet A. Shukla, Steven L. Chang, Leigh Ellis, Abdallah Flaifel, Srinivas R. Viswanathan, and Miriam Ficial
- Subjects
0301 basic medicine ,Transcription, Genetic ,Programmed Cell Death 1 Receptor ,General Physics and Astronomy ,medicine.disease_cause ,B7-H1 Antigen ,Antineoplastic Agents, Immunological ,0302 clinical medicine ,Renal cell carcinoma ,CDKN2A ,Cancer genomics ,CTLA-4 Antigen ,Immune Checkpoint Inhibitors ,BAP1 ,Mutation ,Multidisciplinary ,High-Throughput Nucleotide Sequencing ,Phenotype ,Kidney Neoplasms ,Gene Expression Regulation, Neoplastic ,030220 oncology & carcinogenesis ,Tumour immunology ,Ubiquitin Thiolesterase ,Signal Transduction ,Science ,Tumour heterogeneity ,Antigen presentation ,Biology ,General Biochemistry, Genetics and Molecular Biology ,Article ,Proto-Oncogene Proteins c-myc ,03 medical and health sciences ,medicine ,Carcinoma ,Biomarkers, Tumor ,Humans ,Carcinoma, Renal Cell ,Cyclin-Dependent Kinase Inhibitor p16 ,Rhabdoid Tumor ,Retrospective Studies ,Gene Expression Profiling ,Tumor Suppressor Proteins ,General Chemistry ,Immune Checkpoint Proteins ,medicine.disease ,Survival Analysis ,Gene expression profiling ,030104 developmental biology ,Cancer research ,Immunization - Abstract
Sarcomatoid and rhabdoid (S/R) renal cell carcinoma (RCC) are highly aggressive tumors with limited molecular and clinical characterization. Emerging evidence suggests immune checkpoint inhibitors (ICI) are particularly effective for these tumors, although the biological basis for this property is largely unknown. Here, we evaluate multiple clinical trial and real-world cohorts of S/R RCC to characterize their molecular features, clinical outcomes, and immunologic characteristics. We find that S/R RCC tumors harbor distinctive molecular features that may account for their aggressive behavior, including BAP1 mutations, CDKN2A deletions, and increased expression of MYC transcriptional programs. We show that these tumors are highly responsive to ICI and that they exhibit an immune-inflamed phenotype characterized by immune activation, increased cytotoxic immune infiltration, upregulation of antigen presentation machinery genes, and PD-L1 expression. Our findings build on prior work and shed light on the molecular drivers of aggressivity and responsiveness to ICI of S/R RCC., Sarcomatoid and rhabdoid tumours are highly aggressive forms of renal cell carcinoma that are also responsive to immunotherapy. In this study, the authors perform a comprehensive molecular characterization of these tumours discovering an enrichment of specific alterations and an inflamed phenotype.
- Published
- 2021
15. PO-655-08 LEFT ATRIAL APPENDAGE CLOSURE USING 4D INTRACARDIAC ULTRASOUND IMAGING FROM THE CORONARY SINUS, A NOVEL APPROACH
- Author
-
Shephal K. Doshi, Iwanari Kawamura, Stephen Tang, Mohit K. Turagam, Sarina A. van der Zee, Srinivas R. Dukkipati, and Vivek Y. Reddy
- Subjects
Physiology (medical) ,Cardiology and Cardiovascular Medicine - Published
- 2022
- Full Text
- View/download PDF
16. B-PO02-155 FIRST REPORTED EXPERIENCE OF SAME DAY DISCHARGE AFTER IMPLANTATION OF THE WATCHMAN FLX DEVICE
- Author
-
Stephen Tang, Shephal K. Doshi, and Sarina A. Van der Zee
- Subjects
medicine.medical_specialty ,business.industry ,Physiology (medical) ,medicine ,Cardiology and Cardiovascular Medicine ,business ,Surgery ,Same day discharge - Published
- 2021
- Full Text
- View/download PDF
17. Towards Practical Multiprocessor EDF with Affinities
- Author
-
Stephen Tang and James H. Anderson
- Subjects
Class (computer programming) ,Kernel (linear algebra) ,Computer science ,Processor scheduling ,Context (language use) ,Multiprocessing ,Parallel computing ,Affinities ,Scheduling (computing) - Abstract
A gap exists between the theory of EDF scheduling on identical multiprocessors with arbitrary processor affinities (APA) and practical EDF scheduling as embodied by the SCHED_DEADLINE (SD) scheduler in Linux. This is because the EDF variant proposed in theory for APA, called Strong APA EDF, introduces affinity-related complexities that are not applicable under global EDF, the original target of SD. SD instead treats affinities as a secondary concern. It is shown herein that this treatment comes at the price of causing SD to be fundamentally broken with regard to soft real-time (SRT)-optimality with APA. This result resolves a longstanding open question regarding this matter. It also suggests that Strong APA EDF, which has been proven to be SRT-optimal, is necessary for practical EDF scheduling with APA. However, non-preemptive sections are typically required in practice, and prior work on Strong APA EDF is limited to fully preemptive systems. In this paper, this prior work is extended for the first time to deal with non-preemptivity, which introduces non-trivial nuances with APA. As a byproduct of considering non-preemptivity, it is shown that the SRT-optimality of EDF in this context carries over to a significantly expanded class of schedulers.
- Published
- 2020
- Full Text
- View/download PDF
18. A Randomised Control Trial for measuring Student Engagement through the Internet of Things and Serious Games
- Author
-
John M. Henry, Stephen Tang, Subhas Chandra Mukhopadhyay, and Moi Hoon Yap
- Subjects
Multimedia ,Computer science ,05 social sciences ,Control (management) ,020206 networking & telecommunications ,Student engagement ,02 engineering and technology ,computer.software_genre ,Popularity ,Computer Science Applications ,Domain (software engineering) ,Software framework ,Artificial Intelligence ,Hardware and Architecture ,Virtual machine ,Management of Technology and Innovation ,Middleware ,0502 economics and business ,0202 electrical engineering, electronic engineering, information engineering ,Computer Science (miscellaneous) ,Engineering (miscellaneous) ,computer ,050203 business & management ,Software ,Information Systems - Abstract
The combination of the Internet of Things (IoT) with Serious Games is an academic domain of research increasing in popularity. Combining Serious Games with the interconnected hardware and middleware driven ecosystem of IoT develops data-driven games that source data from the local or extended physical environment to progress in the virtual environment of gaming, better-informing players through the game experience. The following paper presents the evaluation of a software framework defined for combining Serious Games and IoT, achieved using a semester-long experiment with a randomised control trial. The study aimed to produce an effective method of measuring student engagement using sensor-based information and a game environment but not improve the level of student engagement with their related academic programme. The results of the empirical experiment provide perceived evidences in the measure of engagement when compared to academic performance. The experiment results are not statistically significant due to the small sample size and the empirical nature of the work. The findings of this paper validate the effectiveness of a software framework for combining Serious Games and IoT and encourages new real-world applications of Smart Serious Games that include healthcare, education, simulation and others.
- Published
- 2020
19. A genome-scale CRISPR screen reveals PRMT1 as a critical regulator of androgen receptor signaling in prostate cancer
- Author
-
Stephen Tang, Vidyalakshmi Sethunath, Nebiyou Y. Metaferia, Marina F. Nogueira, Daniel S. Gallant, Emma R. Garner, Lauren A. Lairson, Christopher M. Penney, Jiao Li, Maya K. Gelbard, Sarah Abou Alaiwi, Ji-Heui Seo, Justin H. Hwang, Craig A. Strathdee, Sylvan C. Baca, Shatha AbuHammad, Xiaoyang Zhang, John G. Doench, William C. Hahn, David Y. Takeda, Matthew L. Freedman, Peter S. Choi, and Srinivas R. Viswanathan
- Subjects
Male ,Protein-Arginine N-Methyltransferases ,Prostate ,Prostatic Neoplasms ,Androgen Antagonists ,General Biochemistry, Genetics and Molecular Biology ,Article ,Gene Expression Regulation, Neoplastic ,Repressor Proteins ,Prostatic Neoplasms, Castration-Resistant ,Receptors, Androgen ,Cell Line, Tumor ,Humans ,Signal Transduction - Abstract
Androgen receptor (AR) signaling is the central driver of prostate cancer across disease states. While androgen deprivation therapy (ADT) is effective in the initial treatment of prostate cancer, resistance to ADT or to next-generation androgen pathway inhibitors invariably arises, most commonly through the re-activation of the AR axis. Thus, orthogonal approaches to inhibit AR signaling in advanced prostate cancer are essential. Here, via genome-scale CRISPR-Cas9 screening, we identify protein arginine methyltransferase 1 (PRMT1) as a critical mediator of AR expression and signaling. PRMT1 regulates the recruitment of AR to genomic target sites and the inhibition of PRMT1 impairs AR binding at lineage-specific enhancers, leading to decreased expression of key oncogenes, including AR itself. In addition, AR-driven prostate cancer cells are uniquely susceptible to combined AR and PRMT1 inhibition. Our findings implicate PRMT1 as a key regulator of AR output and provide a preclinical framework for co-targeting of AR and PRMT1 in advanced prostate cancer.
- Published
- 2020
20. A genome-scale CRISPR screen reveals PRMT1 as a critical regulator of androgen receptor signaling in prostate cancer
- Author
-
Srinivas R. Viswanathan, Jiao Li, David Y. Takeda, John G. Doench, William C. Hahn, Xiaoyang Zhang, Sylvan C. Baca, Marina F. Nogueira, Craig A. Strathdee, Matthew L. Freedman, Stephen Tang, Sarah Abou Alaiwi, Maya K. Gelbard, Shatha AbuHammad, Nebiyou Y. Metaferia, Peter S. Choi, Ji-Heui Seo, and Justin H. Hwang
- Subjects
Androgen deprivation therapy ,Androgen receptor ,Prostate cancer ,medicine.drug_class ,Cas9 ,Cancer research ,medicine ,Regulator ,CRISPR ,Biology ,Androgen ,medicine.disease ,Enhancer - Abstract
Androgen receptor (AR) signaling is the central driver of prostate cancer across disease states. While androgen deprivation therapy (ADT) is effective in the initial treatment of prostate cancer, resistance to ADT or to next-generation androgen pathway inhibitors invariably arises, most commonly through re-activation of the AR axis. Thus, orthogonal approaches to inhibit AR signaling in advanced prostate cancer are essential. Here, via genome-scale CRISPR/Cas9 screening, we identify protein arginine methyltransferase 1 (PRMT1) as a critical mediator of AR expression and signaling. PRMT1 regulates recruitment of AR to genomic target sites and inhibition of PRMT1 impairs AR binding at lineage-specific enhancers, leading to decreased expression of key oncogenes, including AR itself. Additionally, AR-driven prostate cancer cells are uniquely susceptible to combined AR and PRMT1 inhibition. Our findings implicate PRMT1 as a key regulator of AR output and provide a preclinical framework for co-targeting of AR and PRMT1 in advanced prostate cancer.
- Published
- 2020
- Full Text
- View/download PDF
21. Integrative Molecular Characterization of Sarcomatoid and Rhabdoid Renal Cell Carcinoma Reveals Determinants of Poor Prognosis and Response to Immune Checkpoint Inhibitors
- Author
-
Alice Bosma-Moody, Mark Pomerantz, Laure Hirsch, Giannicola Genovese, Maura Sticco-Ivins, Sabrina Y. Camp, Meng Xiao He, Miriam Ficial, Jihye Park, Matthew L. Freedman, Ziad Bakouny, Michael B. Atkins, Eliezer M. Van Allen, Sabina Signoretti, Michelle S. Hirsch, Kevin Bi, Amin Nassar, Stephen Tang, Pier Vitale Nuzzo, Gabrielle Bouchard, Natalie I. Vokes, Daniel Y.C. Heng, Megan Wind-Rotolo, Miriam Sant'Angelo, Bradley Alexander McGregor, Xiao X. Wei, Steven L. Chang, Gwo-Shu Mary Lee, Abdallah Flaifel, Srinivas R. Viswanathan, David A. Braun, John A. Steinharter, Toni K. Choueiri, Catherine J. Wu, Yue Hou, Sachet A. Shukla, Shaan Dudani, David F. McDermott, W. Marston Linehan, Petra Ross-Macdonald, Leigh Ellis, Lauren C. Harshman, Xin Gao, Sarah Abou Alaiwi, Juliet Forman, Wanling Xie, Thai H. Ho, Jackson Nyman, Wenting Pan, Maxine Sun, Ronan Flippot, and Jacob E. Berchuck
- Subjects
BAP1 ,Downregulation and upregulation ,Renal cell carcinoma ,CDKN2A ,Antigen presentation ,medicine ,Cancer research ,Cytotoxic T cell ,Biology ,medicine.disease ,Gene ,Phenotype - Abstract
Sarcomatoid and rhabdoid (S/R) renal cell carcinoma (RCC) are highly aggressive tumors with limited molecular and clinical characterization. Emerging evidence suggests immune checkpoint inhibitors (ICI) are particularly effective for these tumors1–3, although the biological basis for this property is largely unknown. Here, we evaluate multiple clinical trial and real-world cohorts of S/R RCC to characterize their molecular features, clinical outcomes, and immunologic characteristics. We find that S/R RCC tumors harbor distinctive molecular features that may account for their aggressive behavior, including BAP1 mutations, CDKN2A deletions, and increased expression of MYC transcriptional programs. We show that these tumors are highly responsive to ICI and that they exhibit an immune-inflamed phenotype characterized by immune activation, increased cytotoxic immune infiltration, upregulation of antigen presentation machinery genes, and PD-L1 expression. Our findings shed light on the molecular drivers of aggressivity and responsiveness to immune checkpoint inhibitors of S/R RCC tumors.
- Published
- 2020
- Full Text
- View/download PDF
22. Integrative clinical and molecular characterization of translocation renal cell carcinoma
- Author
-
Ziad Bakouny, Ananthan Sadagopan, Praful Ravi, Nebiyou Y. Metaferia, Jiao Li, Shatha AbuHammad, Stephen Tang, Thomas Denize, Emma R. Garner, Xin Gao, David A. Braun, Laure Hirsch, John A. Steinharter, Gabrielle Bouchard, Emily Walton, Destiny West, Chris Labaki, Shaan Dudani, Chun-Loo Gan, Vidyalakshmi Sethunath, Filipe L.F. Carvalho, Alma Imamovic, Cora Ricker, Natalie I. Vokes, Jackson Nyman, Jacob E. Berchuck, Jihye Park, Michelle S. Hirsch, Rizwan Haq, Gwo-Shu Mary Lee, Bradley A. McGregor, Steven L. Chang, Adam S. Feldman, Catherine J. Wu, David F. McDermott, Daniel Y.C. Heng, Sabina Signoretti, Eliezer M. Van Allen, Toni K. Choueiri, and Srinivas R. Viswanathan
- Subjects
Microphthalmia-Associated Transcription Factor ,Vascular Endothelial Growth Factor Receptor-1 ,Oncogene Proteins, Fusion ,Basic Helix-Loop-Helix Leucine Zipper Transcription Factors ,CD8-Positive T-Lymphocytes ,Kidney Neoplasms ,Article ,General Biochemistry, Genetics and Molecular Biology ,Gene Expression Regulation, Neoplastic ,Biomarkers, Tumor ,Humans ,Gene Fusion ,Carcinoma, Renal Cell ,Immune Checkpoint Inhibitors ,Protein Kinase Inhibitors - Abstract
Translocation renal cell carcinoma (tRCC) is a poorly-characterized subtype of kidney cancer driven by MiT/TFE gene fusions. Here, we define the landmarks of tRCC through an integrative analysis of 152 patients with tRCC identified across genomic, clinical trial, and retrospective cohorts. Most tRCCs harbor few somatic alterations apart from MiT/TFE fusions and homozygous deletions at chromosome 9p21.3 (19.2% of cases). Transcriptionally, tRCCs display a heightened NRF2-driven antioxidant response that is associated with resistance to targeted therapies. Consistently, we find that outcomes for patients with tRCC treated with vascular endothelial growth factor receptor inhibitors (VEGFR-TKI) are worse than those treated with immune checkpoint inhibition (ICI). Using multiparametric immunofluorescence, we find that the tumors are infiltrated with CD8(+) T cells, though the T cells harbor an exhaustion immunophenotype distinct from that of clear cell RCC. Our findings comprehensively define the clinical and molecular features of tRCC and may inspire new therapeutic hypotheses.
- Published
- 2022
- Full Text
- View/download PDF
23. Determined to be professional, ethical and well
- Author
-
Anneka Ferguson and Stephen Tang
- Subjects
Psychology - Published
- 2019
- Full Text
- View/download PDF
24. Genome-scale genetic screening identifies PRMT1 as a critical vulnerability in castration-resistant prostate cancer
- Author
-
Maya K. Gelbard, Ji-Heui Seo, Shatha AbuHammad, John G. Doench, Peter S. Choi, Jiao Li, Xiaoyang Zhang, Sylvan C. Baca, Justin H. Hwang, Craig A. Strathdee, Stephen Tang, Matthew L. Freedman, S. Abou Alaiwi, D. Takeda, Nebiyou Y. Metaferia, Srinivas R. Viswanathan, William C. Hahn, and Marina F. Nogueira
- Subjects
Oncology ,Cancer Research ,medicine.medical_specialty ,Prostate cancer ,Internal medicine ,medicine ,Genome scale ,Vulnerability ,Biology ,Castration resistant ,medicine.disease - Published
- 2020
- Full Text
- View/download PDF
25. A 3-D security modeling platform for social IoT environments
- Author
-
Bo Zhou, Stephen Tang, Qi Shi, Qiang Yang, Jun Qi, Curtis L. Maines, and Po Yang
- Subjects
Process (engineering) ,Computer science ,020208 electrical & electronic engineering ,020207 software engineering ,02 engineering and technology ,Ontology (information science) ,Notation ,Computer security ,computer.software_genre ,Human-Computer Interaction ,Business Process Model and Notation ,Unified Modeling Language ,Modeling and Simulation ,0202 electrical engineering, electronic engineering, information engineering ,Task analysis ,Key (cryptography) ,Dimension (data warehouse) ,computer ,Social Sciences (miscellaneous) ,computer.programming_language - Abstract
Social Internet-of-Things (SIoT) environment comprises not only smart devices but also the humans who interact with these IoT devices. The benefits of such system are overshadowed due to the cyber security issues. A novel approach is required to understand the security implication under such a dynamic environment while taking both the social and technical aspects into consideration. This paper addressed such challenges and proposed a 3-D security modeling platform that can capture and model the security requirements in the SIoT environment. The modeling process is graphical notation based and works as a security extension to the Business Process Model and Notation. Still, it utilizes the latest 3-D game technology; thus, the security extensions are generated through the third dimension. Consequently, the introduction of security extensions will not increase the complexity of the original SIoT scenario, while keeping all the key information on the same platform. Together with the proposed security ontology, these comprehensive security notations created a unique platform that aims at addressing the ever complicated security issues in the SIoT environment.
- Published
- 2018
26. Supporting I/O and IPC via Fine-Grained OS Isolation for Mixed-Criticality Real-Time Tasks
- Author
-
Nathan Otterness, Donald E. Porter, James H. Anderson, F. Donelson Smith, Namhoon Kim, and Stephen Tang
- Subjects
010302 applied physics ,Mixed criticality ,Multi-core processor ,Control and Optimization ,Computer Networks and Communications ,Computer science ,Distributed computing ,Context (language use) ,02 engineering and technology ,Interference (wave propagation) ,computer.software_genre ,01 natural sciences ,Computer Science Applications ,020202 computer hardware & architecture ,Inter-process communication ,Data sharing ,Control and Systems Engineering ,Modeling and Simulation ,0103 physical sciences ,0202 electrical engineering, electronic engineering, information engineering ,Key (cryptography) ,Isolation (database systems) ,Electrical and Electronic Engineering ,computer ,Dram memory - Abstract
Efforts towards hosting safety-critical, real-time applications on multicore platforms have been stymied by a problem dubbed the “one-out-of-m” problem: due to excessive analysis pessimism, the overall capacity of an m-core platform can easily be reduced to roughly just one core. The predominant approach for addressing this problem introduces hardware-isolation techniques that ameliorate contention experienced by tasks when accessing shared hardware components, such as DRAM memory or caches. Unfortunately, in work on such techniques, the operating system (OS), which is a key source of potential interference, has been largely ignored. Most real-time OSs do facilitate the use of a coarse-grained partitioning strategy to separate the OS from user-level tasks. However, such a strategy by itself fails to address any data sharing between the OS and tasks, such as when OS services are required for interprocess communication (IPC) or I/O. This paper presents techniques for lessening the impacts of such sharing, specifically in the context of $${\textsf {MC}}^{\textsf {2}}$$ , a hardware-isolation framework designed for mixed-criticality systems. Additionally, it presents the results from micro-benchmark experiments and a large-scale schedulability study conducted to evaluate the efficacy of the proposed techniques and also to elucidate sharing vs. isolation tradeoffs involving the OS. This is the first paper to systematically consider such tradeoffs and consequent impacts of OS-induced sharing on the one-out-of-m problem.
- Published
- 2018
- Full Text
- View/download PDF
27. A Hybrid Hierarchical Framework for Free Weight Exercise Recognition and Intensity Measurement with Accelerometer and ECG Data Fusion
- Author
-
Jun Qi, Po Yang, Martin Hanneghan, Atif Waraich, and Stephen Tang
- Subjects
Adult ,0301 basic medicine ,Support Vector Machine ,Computer science ,business.industry ,Feature extraction ,Inference ,020206 networking & telecommunications ,Pattern recognition ,02 engineering and technology ,Sensor fusion ,Accelerometer ,Markov Chains ,Intensity (physics) ,Support vector machine ,Electrocardiography ,03 medical and health sciences ,030104 developmental biology ,Accelerometry ,0202 electrical engineering, electronic engineering, information engineering ,Humans ,Artificial intelligence ,Hidden Markov model ,business ,Exercise - Abstract
Accurate recognition and effective monitoring of physical activities (PA) in daily life is a goal of many healthcare fields. Existing PA recognition approaches are mostly designed for specific scenarios and often lack extensibility for application in other areas, thereby limiting their usefulness. In this paper, we present a hybrid hierarchical framework that successfully combines two of the main specific-sensor-based PA methods into an effective hybrid solution for general weight exercise applications. The fusion solution separates free weight and non-free weight activities and then further classifies free weight exercises, whilst measuring quantities of repetitions and sets, thus providing a measure of intensity. By fusing accelerometer and electrocardiogram (ECG) data, a One Class Support Vector Machine (OC-SVM) and a Hidden Markov Model (HMM) are applied for exercise recognition and we use semantic inference for determining the intensity of the exercise. The results are based on data from 10 healthy subjects (age: 30 ± 5; BMI: 25 ± 5.5 kg/m^2; body fat: 20.5 ± 5.4), which shows good accuracy in exercise recognition and intensity measurement. This framework can be extended to support additional types of PA recognition in complex applications.
- Published
- 2018
- Full Text
- View/download PDF
28. A framework for the integration of serious games and the Internet of Things (IoT)
- Author
-
John M. Henry, Martin Hanneghan, Chris Carter, and Stephen Tang
- Subjects
QA75 ,Multimedia ,business.industry ,Computer science ,Event (computing) ,020208 electrical & electronic engineering ,05 social sciences ,ComputingMilieux_PERSONALCOMPUTING ,050301 education ,Student engagement ,02 engineering and technology ,Serious game ,Network topology ,computer.software_genre ,Server ,Middleware (distributed applications) ,0202 electrical engineering, electronic engineering, information engineering ,Systems architecture ,Internet of Things ,business ,0503 education ,computer - Abstract
Serious Games and the Internet of Things are research topics of high interest. The integration of these two domains has the potential for innovative new applications. This paper presents a framework for the combination of Serious Games and the Internet of Things. In addition, we present the system architecture for a Smart Serious Game ( SSG ) developed for measuring student engagement, and define the difference between an event driven game and an SSG. This paper also includes the updated data algorithms for representing student engagement as game points, based on further consideration on our previous publication.
- Published
- 2018
29. A Framework for the Visualisation of Cyber Security Requirements and Its Application in BPMN
- Author
-
Stephen Tang, Curtis L. Maines, Bo Zhou, and Qi Shi
- Subjects
Focus (computing) ,business.industry ,Business process ,Computer science ,Information technology ,020207 software engineering ,02 engineering and technology ,Computer security ,computer.software_genre ,Visualization ,Business Process Model and Notation ,020204 information systems ,Component (UML) ,0202 electrical engineering, electronic engineering, information engineering ,business ,computer ,Cognitive load - Abstract
Security requirements is the fundamental component in designing and defending IT systems against cyber attacks. Still in reality they are every so often to be overlooked due to the lack of expertise and technical approach to capture and model these requirements in an effective way. It is not helped by the fact that many companies, especially SMEs, tend to focus on the functionality of their business processes first, before considering security as an afterthought. New extensions for modelling cyber security requirements in Business Process Model and Notation (BPMN) have been proposed in the past to address this issue. In this chapter, we analyse existing extensions and identify the notational issues present within each of them. We discuss how there is yet no single extension which represents a comprehensive range of cyber security concepts. Consequently, a new framework is proposed that can be used to extend, visualise and verify cyber security requirements in not only BPMN, but any other existing modelling language. We investigate a new approach to modelling security and propose a solution that overcomes current issues whilst still providing functionality to include all concepts potentially modellable in BPMN related to cyber security. The framework utilises a “what you see is what you get” approach to allow intuitive modelling of rather complicated security concepts. It increases human understanding of the security requirements whilst minimising the cognitive load. We detail how we implemented our solution along with the novel approach our application takes to current challenges.
- Published
- 2018
- Full Text
- View/download PDF
30. Supporting mode changes while providing hardware isolation in mixed-criticality multicore systems
- Author
-
Donald E. Porter, James H. Anderson, F. Donelson Smith, Namhoon Kim, Stephen Tang, Nathan Otterness, and Micaiah Chisholm
- Subjects
010302 applied physics ,Metrical task system ,Mixed criticality ,Multi-core processor ,business.industry ,Computer science ,Context (computing) ,02 engineering and technology ,01 natural sciences ,020202 computer hardware & architecture ,Task (computing) ,Mode (computer interface) ,0103 physical sciences ,0202 electrical engineering, electronic engineering, information engineering ,Isolation (database systems) ,business ,Set (psychology) ,Computer hardware - Abstract
When hosting real-time applications on multicore platforms, interference from shared hardware resources can significantly increase task execution times. Most proposed approaches for lessening interference rely on mechanisms for providing hardware isolation to tasks. However, one limitation of most prior work on such mechanisms is that only static task systems have been considered that never change at runtime. In reality, safety-critical applications often transition among different functional modes, each defined by a distinct set of running tasks. In a given mode, only tasks from that mode execute, yet tasks from all modes consume memory space, and this creates additional constraints affecting hardware-isolation techniques. This paper shows how to address such constraints in the context of an existing real-time resource-allocation framework called MC2 (mixed-criticality on multicore). In MC2, hardware-isolation techniques are employed in conjunction with criticality-aware task-provisioning assumptions that enable hardware resources to be utilized more efficiently.
- Published
- 2017
- Full Text
- View/download PDF
31. Australian Legal Practice: Ethical Climate and Ethical Climate Change
- Author
-
Margie Rowe, Tony Foley, Vivien Holmes, and Stephen Tang
- Subjects
Environmental science ,Ethical climate ,Legal practice ,Environmental planning - Published
- 2017
- Full Text
- View/download PDF
32. Multiple density maps information fusion for effectively assessing intensity pattern of lifelogging physical activity
- Author
-
Stephen Tang, Po Yang, Martin Hanneghan, and Jun Qi
- Subjects
business.industry ,Computer science ,Cognitive Neuroscience ,Automatic identification and data capture ,Physical activity ,Health technology ,Wearable computer ,020206 networking & telecommunications ,02 engineering and technology ,Lifelog ,Machine learning ,computer.software_genre ,Computer Science Applications ,QA76 ,Artificial Intelligence ,Health care ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Artificial intelligence ,business ,computer ,Mobile device ,Wearable technology - Abstract
Physical activity (PA) measurement is a crucial task in healthcare technology aimed at monitoring the progression and treatment of many chronic diseases. Traditional lifelogging PA measures require relatively high cost and can only be conducted in controlled or semi-controlled environments, though they exhibit remarkable precision of PA monitoring outcomes. Recent advancement of commercial wearable devices and smartphones for recording one’s lifelogging PA has popularized data capture in uncontrolled environments. However, due to diverse life patterns and heterogeneity of connected devices as well as the PA recognition accuracy, lifelogging PA data measured by wearable devices and mobile phones contains much uncertainty thereby limiting their adoption for healthcare studies. To improve the feasibility of PA tracking datasets from commercial wearable/mobile devices, this paper proposes a lifelogging PA intensity pattern decision making approach for lifelong PA measures. The method is to firstly remove some irregular uncertainties (IU) via an Ellipse fitting model, and then construct a series of monthly based hour-day density map images for representing PA intensity patterns with regular uncertainties (RU) on each month. Finally it explores Dempster-Shafer theory of evidence fusing information from these density map images for generating a decision making model of a final personal lifelogging PA intensity pattern. The approach has significantly reduced the uncertainties and incompleteness of datasets from third party devices. Two case studies on a mobile personalized healthcare platform MHA [1] connecting the mobile app Moves are carried out. The results indicate that the proposed approach can improve effectiveness of PA tracking devices or apps for various types of people who frequently use them as a healthcare indicator.
- Published
- 2017
33. Risk factors for preoperative periventricular leukomalacia in term neonates with hypoplastic left heart syndrome are patient related
- Author
-
J. William Gaynor, Daniel J. Licht, Susan M. Durning, Donna A. Goff, Arastoo Vossough, Susan C. Nicolson, Jonathan J. Rome, David M. Shera, Thomas L. Spray, Natasha Lavin, Stephen Tang, and Lisa M. Montenegro
- Subjects
Male ,Pulmonary and Respiratory Medicine ,medicine.medical_specialty ,Pediatrics ,Leukomalacia, Periventricular ,Prenatal diagnosis ,Article ,Hypoplastic left heart syndrome ,Risk Factors ,Internal medicine ,Hypoplastic Left Heart Syndrome ,medicine ,Humans ,Prospective Studies ,Aortic atresia ,Prospective cohort study ,Periventricular leukomalacia ,medicine.diagnostic_test ,business.industry ,Infant, Newborn ,Magnetic resonance imaging ,Blood flow ,medicine.disease ,Preoperative Period ,Cohort ,Cardiology ,Female ,Surgery ,Cardiology and Cardiovascular Medicine ,business - Abstract
Background Preoperative brain injury is common in neonates with complex congenital heart disease. Increasing evidence suggests a complex interaction of prenatal and postnatal risk factors for development of brain white matter injury, called periventricular leukomalacia (PVL), in neonates with complex congenital heart disease. To date, there remains a limited understanding of the risk factors contributing to preoperative PVL in hypoplastic left heart syndrome (HLHS). Methods Neonates with HLHS or HLHS variants from 3 prospective magnetic resonance imaging studies (2003-2010) were selected for this cohort. Preoperative brain magnetic resonance imaging was performed the morning of the surgery. Stepwise multilogistic regression of patient characteristics, mode of delivery (cesarean section vs vaginal), time of diagnosis (prenatal vs postnatal), HLHS subtypes, brain total maturation score, time to surgery, individual averaged daily preoperative blood gases, and complete blood cell count values was used to determine significant associations. Results A total of 57 neonates with HLHS were born at 38.7 ± 2.3 weeks; 86% (49/57) had a prenatal diagnosis, with 31% (18/57) delivered by cesarean section. HLHS with aortic atresia (AA) was common in this cohort, 71% (41/57). Preoperative PVL was identified in 19% (11/57). Male patients with AA ( P = .004) were at higher risk for PVL. Lower total brain maturation score was also identified as a strong predictor for preoperative PVL ( P = .005). Conclusions In neonates with HLHS, nonmodifiable patient-related factors, including male sex with AA (lack of antegrade blood flow) and lower total brain maturation score, placed neonates at the greatest risk for preoperative white matter injury.
- Published
- 2014
- Full Text
- View/download PDF
34. Inside-out insulation failure of a defibrillator lead with abrasion-resistant coating
- Author
-
Ali Khoynezhad, Stephen Tang, Charles D. Swerdlow, and Robert M. Kass
- Subjects
medicine.medical_specialty ,medicine.medical_treatment ,Ventricular tachycardia ,Electrocardiography ,QRS complex ,Coated Materials, Biocompatible ,Physiology (medical) ,Internal medicine ,medicine ,Humans ,Device Removal ,Aged ,Heart Failure ,Ejection fraction ,medicine.diagnostic_test ,Left bundle branch block ,business.industry ,Stroke Volume ,medicine.disease ,Implantable cardioverter-defibrillator ,Defibrillators, Implantable ,Heart failure ,Antitachycardia Pacing ,Cardiology ,Equipment Failure ,Female ,Cardiology and Cardiovascular Medicine ,business ,Follow-Up Studies - Abstract
Clinical report A 78-year-old woman had a cardiac resynchronization implantable cardioverter-defibrillator implanted in January 2008 for nonischemic cardiomyopathy with New York Heart Association class III heart failure, left ventricular ejection fraction 22%, and left bundle branch block. A St Jude Medical Model 7121 Durata right ventricular lead (St Jude Medical, St Paul, MN) and a Medtronic Model D224TRK Consulta generator (Medtronic, Minneapolis, MN) were implanted. Three months later, ejection fraction improved to 47% and heart failure improved to class I. In July 2010, a combination of recent short intervals ≤140 ms and rapid, repetitive oversensing triggered the Lead Integrity Alert. Interrogation showed an inappropriate detection of ventricular tachycardia treated with antitachycardia pacing. Stored electrograms showed nonphysiological signals, some of which occurred synchronously with the cardiac cycle, timing with the T wave. Pacing threshold was 1.0 V, the R wave was stable at 10 mV, and both pacing and high-voltage impedances were within nominal ranges. However, the weekly minimum pacing impedance decreased by approximately 150 Ω (from 470 to 320 Ω) in February 2010. Differential real-time and telemetry Holter recordings isolated the nonphysiological signals to the cable to the ring electrode rather than the helix to the tip electrode (Figure 1A). Corresponding recordings from shock channels determined that simultaneous nonphysiological signals were present on the distal coil, but not the proximal coil. Additional diagnostic steps excluded other causes of oversensing. Initially, the patient declined lead replacement. But when frequent oversensing caused the percentage of biventricular pacing to decrease below 90% in late 2012, lead replacement was recommended to preserve resynchronization. Cinefluoroscopy (Figure 1B) showed no exteriorized cables or mechanical lead-lead interaction.
- Published
- 2013
- Full Text
- View/download PDF
35. Adding a Third Dimension to BPMN as a Means of Representing Cyber Security Requirements
- Author
-
Qi Shi, Stephen Tang, Curtis L. Maines, and Bo Zhou
- Subjects
Computer science ,020207 software engineering ,02 engineering and technology ,Extension (predicate logic) ,Computer security model ,USable ,Computer security ,computer.software_genre ,Domain (software engineering) ,Business Process Model and Notation ,Order (exchange) ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Dimension (data warehouse) ,Representation (mathematics) ,computer - Abstract
Every so often a paper is published presenting a new extension for modelling cyber security requirements in Business Process Model and Notation (BPMN). The frequent production of new extensions by experts belies the need for a richer and more usable representation of security requirements in BPMN processes. In this paper, we present our work considering an analysis of existing extensions and identify the notational issues present within each of them. We discuss how there is as yet no single extension which represents a comprehensive range of cyber security concepts. Consequently there is no adequate solution for accurately specifying cyber security requirements within BPMN. In order to address this, we investigate a new approach to modelling security and propose a solution which aims to overcome current issues whilst still providing functionality to include all concepts potentially modellable in BPMN related to cyber security. We explain how our solution takes a novel approach to current challenges that is both effective and with adequate coverage of the cyber security domain.
- Published
- 2016
- Full Text
- View/download PDF
36. Serious Gaming for Pharmacy Education: Development of a Serious Games for Teaching Pharmacist Communication and Drug Administration in a Virtual Hospital Setting
- Author
-
Rene Tjell Lambertsen, Jonathan Davies, Charles W. Morecroft, and Stephen Tang
- Subjects
Medical education ,020205 medical informatics ,Multimedia ,business.industry ,05 social sciences ,Pharmacist ,050301 education ,Pharmacy education ,Drug administration ,Pharmacy ,02 engineering and technology ,Serious game ,computer.software_genre ,Virtual patient ,Virtual hospital ,Virtual machine ,0202 electrical engineering, electronic engineering, information engineering ,business ,Psychology ,0503 education ,computer - Abstract
Practical experience is crucial in pharmacy education, but it can be difficult to provide pharmacy students with a sufficient level of experience during their education due to a number of challenges. Video games might provide a platform where students can gain positive learning experience in a virtual environment. Serious games have been used successfully across many industries, which suggest that a well-designed serious game can have positive learning outcomes. Increased engagement and motivation are mentioned by experts as some of the main benefits of serious games. Being able to practise skills before utilising them in real-world scenarios is another advantage identified. In this paper, we present a virtual patient simulator which is designed specifically teaching pharmacy students patient communication and administration of drugs. A pilot study and an expert review were carried out to evaluate the effectiveness of the application and its findings are presented.
- Published
- 2016
- Full Text
- View/download PDF
37. Practising Professionalism: Observations from an Empirical Study of New Australian Lawyers
- Author
-
Margie Rowe, Tony Foley, Vivien Holmes, and Stephen Tang
- Subjects
Philosophy ,Legal ethics ,Empirical research ,Law ,Sociology - Abstract
(2012). Practising Professionalism: Observations from an Empirical Study of New Australian Lawyers. Legal Ethics: Vol. 15, No. 1, pp. 29-55.
- Published
- 2012
- Full Text
- View/download PDF
38. No time to lose: Negative impact on law student wellbeing may begin in year one
- Author
-
Molly Townes O'Brien, Kath Hall, and Stephen Tang
- Subjects
Distress ,Adversarial system ,lcsh:Theory and practice of education ,law student, first year, stress ,Law ,Stress (linguistics) ,Psychology ,Curriculum ,Emotionally detached ,lcsh:LB5-3640 ,Stress level ,Cognitive style - Abstract
Preliminary results of a pilot study of law students suggest that, during the first year of law study, students may experience changes in thinking styles, stress levels, and satisfaction with life. Although further inquiry into the cause of law student distress is necessary, the authors consider certain assumptions underlying the legal curriculum—particularly the conception of a lawyer as adversarial, emotionally detached, and competitive—to be possible sources of the negative impact on student wellbeing. It is suggested that legal educators should re-examine their curricula, particularly their conception of what it means to be a lawyer, and think creatively about ways that law schools may encourage healthier approaches to the study of law.
- Published
- 2011
39. Toward Improved Public Confidence in Farmed Fish: A Canadian Perspective on Fish Welfare during Marine Transport
- Author
-
Miki Nomura, Stephen Tang, Anthony P. Farrell, and Colin J. Brauner
- Subjects
Ecology ,business.industry ,media_common.quotation_subject ,Fish farming ,Aquatic animal ,Aquatic Science ,Biology ,biology.organism_classification ,Game fish ,Fishery ,Aquaculture ,Fish hatchery ,Juvenile ,Salmo ,business ,Agronomy and Crop Science ,Welfare ,media_common - Abstract
One of the advantages of farmed salmon is the consistent nature of the product and its availability. Because of the remote locations of salmon farms in British Columbia (BC), Canada, providing the freshest salmon products on a daily basis and in a cost-effective manner requires regular transport of live, market-sized adult fish at very high densities from farm sites to processing plants. Live-hauling also occurs annually when salmon smolts are moved to the farms from freshwater hatcheries and when fish are moved among farms. This article has two parts. The first part considers recent published works assessing Atlantic salmon, Salmo salar, welfare during live-haul transport between commercial aquaculture sites in BC, Canada, trips that can last for 2-12 h. These assessments involved novel methodologies, which are highlighted here. The results show that while juvenile and adult Atlantic salmon are stressed during loading into a live-haul vessel, open-hold transport in a state-of-the-art vessel promotes fish recovery, thereby alleviating some of the concerns regarding fish welfare during high-density transport. The second part of the article presents novel unpublished data on the effects on the flesh quality of Atlantic salmon of high carbon dioxide concentrations, levels that simulate those that might be encountered during closed-hold transport.
- Published
- 2010
- Full Text
- View/download PDF
40. Updating the Approaches in the NWRI/AwwaRF UV Guidelines: The Impacts of Water Quality and Recirculation Mode Testing on UV Validation
- Author
-
O. Karl Scheible, Brian Petri, Chengyue Shen, and Stephen Tang
- Subjects
business.industry ,General Engineering ,Mode (statistics) ,Environmental science ,Water quality ,Process engineering ,business - Published
- 2010
- Full Text
- View/download PDF
41. An Application of Game Technology to Virtual University Campus Tour and Interior Navigation
- Author
-
Curtis L. Maines and Stephen Tang
- Subjects
Engineering ,Virtual campus ,Multimedia ,business.industry ,Human–computer interaction ,Virtual university ,business ,computer.software_genre ,Metaverse ,computer ,Graphical user interface - Abstract
Many applications optimistically claim the title of virtual campus tour nowadays with a small minority deserving it. Throughout this paper various virtual campus tours are explored and analysed along with the problems of interior navigation. The technologies that support development of virtual worlds for computer games are studied and a solution to interior navigation and virtual campus tour derived from this technology is proposed.
- Published
- 2015
- Full Text
- View/download PDF
42. Using Serious Games to Create Awareness on Visual Impairments
- Author
-
John Melthis, Stephen Tang, Alex Brown, and Martin Hanneghan
- Subjects
QA75 ,Blindness ,Computer science ,Human–computer interaction ,Process (engineering) ,Visual impairment ,medicine ,ComputingMilieux_COMPUTERSANDSOCIETY ,medicine.symptom ,medicine.disease ,Visualization - Abstract
Visual impairments define a wide spectrum of disabilities that vary in severity, from the need to wear glasses, to permanent loss of vision or blindness. This paper discusses the process undertaken in creating two simulators, one which emulates partially-sighted visual impairment and another focused on full -blindness. In order to create the simulators, extensive research was conducted surrounding the effects of partially-sightedness and blindness, highlighting existing software and games that promote awareness for visual impairments. This paper underlines the necessity of raising awareness for visual impairments and the effectiveness of applying serious games for this very goal. After developing the simulators, experiments were conducted to evaluate the effectiveness of it. Findings from the experiments were analysed and documented.
- Published
- 2015
- Full Text
- View/download PDF
43. Passive Indoor Positioning System (PIPS) Using Near Field Communication (NFC) Technology
- Author
-
Stephen Tang, Martin Hanneghan, and BeeLing Tok
- Subjects
QA75 ,Engineering ,Indoor positioning system ,business.industry ,Hybrid positioning system ,Global Positioning System ,Satellite navigation ,Mobile telephony ,Navigational aid ,business ,Telecommunications ,Mobile device ,Near field communication - Abstract
Travel can be an enjoyable experience but it can also be stressful when one is unable to get to the destination in timely manner. Satellite navigation systems (satnav) such as the ubiquitous Global Positioning System (GPS) provide an aid to locating unfamiliar places without hassle. However, the effectiveness of satnav stops at the doorstep of the building due to its requirement for line of sight with orbiting satellites. Within a large complex building, navigation typically relies on building signage, information from kiosks and getting assistance from information desks. The advancement of mobile devices and wireless technology offer an interesting proposition for the development of indoor positioning systems. In this paper, we propose a passive indoor positioning system to provide navigational aid and discuss findings from our pilot experiment using NFC technology.
- Published
- 2015
- Full Text
- View/download PDF
44. A Cyber Security Ontology for BPMN-Security Extensions
- Author
-
David Llewellyn-Jones, Bo Zhou, Curtis L. Maines, and Stephen Tang
- Subjects
Security engineering ,Cloud computing security ,Security service ,Computer science ,Security through obscurity ,Security convergence ,Computer security model ,Computer security ,computer.software_genre ,computer ,Security information and event management ,Security testing - Abstract
Every so often a paper is published presenting a new extension for modelling cyber security requirements in Business Process Model and Notation (BPMN). The frequent production of new extensions by experts belies the need for a richer and more expressive representation of security requirements in BPMN processes. One reason for this is that current extensions focus on only specific areas and so fail to provide adequate coverage of the cyber security domain. In this paper, we present our work considering an analysis of existing extensions and identify the security concepts used within each of them. We discuss how there is as yet no single extension which covers a comprehensive range of cyber security concepts. Consequently there is no adequate solution for accurately specifying cyber security requirements within BPMN. In order to address this, we propose a new comprehensive ontology which includes all concepts potentially modellable in BPMN related to cyber security. We explain how this ontology can be used as the basis for developing future BPMN-security extensions, and explore the challenges that must be overcome in order to develop a representation that is both effective and with adequate coverage of security requirements.
- Published
- 2015
- Full Text
- View/download PDF
45. Designing Educational Games
- Author
-
Martin Hanneghan and Stephen Tang
- Subjects
Computer science ,ComputingMilieux_COMPUTERSANDEDUCATION ,ComputingMilieux_PERSONALCOMPUTING - Abstract
Play has been an informal approach to teach young ones the skills of survival for centuries. With advancements in computing technology, many researchers believe that computer games1 can be used as a viable teaching and learning tool to enhance a student’s learning. It is important that the educational content of these games is well designed with meaningful game-play based on pedagogically sound theories to ensure constructive learning. This chapter features theoretical aspects of game design from a pedagogical perspective. It serves as a useful guide for educational game designers to design better educational games for use in game-based learning. The chapter provides a brief overview of educational games and game-based learning before highlighting theories of learning that are relevant to educational games. Selected theories of learning are then integrated into conventional game design practices to produce a set of guidelines for educational games design.
- Published
- 2015
- Full Text
- View/download PDF
46. Roles of Ras-Erk in Apoptosis of PC12 Cells Induced by Trophic Factor Withdrawal or Oxidative Stress
- Author
-
Subhash C. Gautam, Alba I. Rodriguez, Robert A. Levine, Stephen Tang, Lijie Zhang, Tangella Jackson Hunter, Jarret Kuo, Philip Lazarovici, Hao Jiang, David Koubi, and Laurent Groc
- Subjects
MAPK/ERK pathway ,Programmed cell death ,MAP Kinase Signaling System ,Gene Expression ,Apoptosis ,Caspase 3 ,PC12 Cells ,Culture Media, Serum-Free ,Cellular and Molecular Neuroscience ,Nitriles ,Butadienes ,Animals ,Enzyme Inhibitors ,Phosphorylation ,Protein kinase A ,Caspase ,Mitogen-Activated Protein Kinase 1 ,Neurons ,Mitogen-Activated Protein Kinase 3 ,biology ,Hydrogen Peroxide ,General Medicine ,MAP Kinase Kinase Kinases ,Oxidants ,Rats ,Cell biology ,Oxidative Stress ,Genes, ras ,Biochemistry ,Cell culture ,Caspases ,biology.protein ,DNA fragmentation - Abstract
To understand the role of Ras-MAPK (mitogen-activated protein kinase) in trophic factor withdrawal- and oxidative stress-induced apoptotic cell death processes, undifferentiated rat pheochromocytoma PC12 cells and a PC12 variant cell line stably expressing the Ras dominant-negative mutant (M-M17-26) were subjected to serum withdrawal in the absence or presence of H2O2 treatment. The extent of cell death was analyzed by lactate dehydrogenase release, internucleosomal DNA fragmentation, and caspase-3 assays. Both serum with-drawal and H2O2 treatment induced apoptotic cell death in PC12 cells, and the extent of cell death was greatly enhanced in M-M17-26 cells. DNA fragmentation induced by serum withdrawal or H2O2 treatment was blocked completely by a general caspase inhibitor, Z-VAD-FMK. A selective MAPK kinase inhibitor, U0126, blocked the H2O2-induced phosphorylation of Erk1/2 (extracellular signal-regulated kinase) in PC12 cells and increased the levels of active caspase-3 in M-M17-26 under serum withdrawal or H2O2 treatment. In addition, the short-term H2O2 treatment (5–30 min) was sufficient to cause DNA fragmentation in M-M17-26 cells even though H2O2 was removed and cells were incubated in regular growth medium with complete serum for 24 h. However, similar, short-term H2O2 treatment of PC12 cells did not induce DNA fragmentation 24 h later. These results suggest that the Ras-Erk pathway is critical in mediating protection against apoptotic cell death induced by either trophic factor withdrawal or increased oxidative stress.
- Published
- 2005
- Full Text
- View/download PDF
47. The Possibility Of Wellbeing: Preliminary Results From Surveys Of Australian Professional Legal Education Students
- Author
-
Stephen Tang and Anneka Ferguson
- Subjects
Distress ,Law ,education ,Psychological distress ,Identity (social science) ,Legal education ,General Medicine ,Psychology ,health care economics and organizations ,humanities ,Depressive symptoms ,Clinical psychology - Abstract
Surveys of students in the Australian National University’s Legal Workshop Professional Legal Education (PLE) programme showed that students began and ended a core course with low levels of psychological distress. In contrast to other studies, we found no evidence of elevated symptoms of depressive symptoms and no signs that this PLE programme may impair wellbeing. While small increases in average stress symptoms were observed, this was associated with a more positive course experience. Self-perceptions of professional identity and concurrent legal employment predicted lower distress, suggesting that wellbeing is enhanced by building meaningful connections between legal education and students’ wider identities.
- Published
- 2014
- Full Text
- View/download PDF
48. Comparison of human cervical mucus and artificial sperm penetration media
- Author
-
H.W. Gordon Baker, Stephen Tang, and Claire Garrett
- Subjects
Male ,Semen ,Biology ,Antibodies ,Andrology ,fluids and secretions ,Egg White ,Albumins ,Humans ,Hyaluronic Acid ,Sperm motility ,Sperm-Ovum Interactions ,Rehabilitation ,Albumin ,Obstetrics and Gynecology ,Penetration (firestop) ,Spermatozoa ,Sperm ,Mucus ,Solutions ,Reproductive Medicine ,Immunology ,Cervix Mucus ,Sperm Motility ,Female ,Indicators and Reagents ,Egg white - Abstract
The cervical mucus penetration tests aid research and determine the clinical importance of positive sperm antibody tests. Limited availability and variability of human cervical mucus have instigated the search for mucus substitutes for these tests. This study compares sperm migration in cervical mucus with that in artificial media including hyaluronate solution, egg white and albumin Tyrode solution. Results were quantified by measuring the migration distance (the maximum distance of capillary migration from a semen reservoir by spermatozoa after 1 h) and the sperm concentration at half the migration distance. The mean of both measures for cervical mucus and hyaluronate solution were equivalent [4.4 +/- 1.1 (SD) versus 4.3 +/- 1.0 cm and 118 +/- 51 versus 111 +/- 44x10(3)/ml], and higher than in egg white and albumin Tyrode solution. Antisperm antibodies impaired sperm penetration in cervical mucus and hyaluronate solution in a similar manner (r = 0.92). These results suggest that hyaluronate solution sufficiently resembles human cervical mucus in terms of penetrability that it may be used as a substitute for mucus in capillary tube tests of sperm function. The higher penetrability of cervical mucus and hyaluronate solution is probably related to a channelling effect due to their polymeric structure.
- Published
- 1999
- Full Text
- View/download PDF
49. Game Content Model: An Ontology for Documenting Serious Game Design
- Author
-
Stephen Tang and Martin Hanneghan
- Subjects
Game art design ,Game mechanics ,Multimedia ,Video game development ,Game design document ,Computer science ,ComputingMilieux_PERSONALCOMPUTING ,computer.software_genre ,Game design ,Human–computer interaction ,Game development tool ,Video game design ,Game Developer ,computer - Abstract
Computer games is a form of real-time interactive software wrapped in creatively crafted media that offers game-players engaging, goal-directed play. Designing computer games requires adequate experience and great attention to detail to describe the rules, play and aesthetics that compose the interactive experience. For inexperienced game designers, formalised methods such as game design languages and game meta-models can provide a guide and language to produce a game design specification correct by design. This paper introduces a new game content model that can aid game designers document specification of game design.
- Published
- 2011
- Full Text
- View/download PDF
50. A Model-Driven Framework to Support Development of Serious Games for Game-based Learning
- Author
-
Martin Hanneghan and Stephen Tang
- Subjects
Game mechanics ,Game art design ,Game testing ,Game design ,Game design document ,Human–computer interaction ,Computer science ,ComputingMilieux_PERSONALCOMPUTING ,Emergent gameplay ,Model-driven architecture ,Game Developer ,computer ,computer.programming_language - Abstract
Computer games, predominantly a form of interactive entertainment, have been repurposed for game-based learning in recent years. Many studies have presented the educational value that computer games possess with evidence that supports the positive experiences of game-based learning. Game-based learning could be an invaluable learning approach for the 21st century, but is currently hindered by the lack of availability of serious games to support this innovative approach. Developments in software engineering that enable automatic generation of software artefacts through modelling promises new hope for game-based learning adopters, especially those with little or no technical knowledge, to produce their own serious games for use in game-based learning. This paper presents a new framework based on a model-driven approach designed to aid non-technical domain experts in the production of serious games.
- Published
- 2010
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.